ee7f8b21a4dbcf2a82e9438a4df1d3d7cf7409cb9fc4bf15154396a7fa00e563f29824e5bf360a70b1bba127ceb526f46806b4c652f1e38257acc9091569253b5b4adb5e65f01238701b29ce52d763bdd50c4077ce29958222b8e4bf04fbdd5f974833269182867818c33d926f2a4a7d0a0d40d22f0530efeb5caa7dc8b0dae17696ea105f07c258c6162ca5a93c59aa6271508cd2e5c8469f12923a867b155154372938e0fa3a04e51b80d5426e787056b5a64353f48cf8e5fe2febc317e33f062f9d2937d69279756b4b8830b01afc73a963fbbb9f45fab7d1d726a0e4fa8b0bcdebf12c0045d27f9d79f6a942f2252f09207557207ec89d565a479641cd1d0441c08af23b539f0c1d3c16e6fb865e21d35fdc54878c403a3426714f7906f7efbad5eb17c16293366ddc2c0ae2ebd8a85eb327bad593a57f4fbe90ae46640836aee46bf2cb137ecf2de8712542ad5cd7c6a786c2a0cfbf349dd7d6e768d5193606d9f0bae60cd7cf6bacbf7a71c79965108344b8f454f354a8a9dbe618b07559cc687e4f68da360cabc3046eb86bcd8fb2c1dc30d5309b7ade9b6e800271e06e14d30d8e64617d057c8489a85a60264fdac73b92e708a20ee4d5ca5ae1b530fdba9b84557dbe08c9182e05f199c3008d233acc7a229e5aea0b7bd1bf87be3065cefdc2c5f82a8c6ee04dcd155c017d4f14b3a17323333d0527a08aa006330b467a1e8a3cee2bd148081874f7f51250ac10b1b19186e988686d7031074f13c00ddcc63b0cef93f1efaf99646ee760ef3388ece40f1a920c833daf7c229a49fdf615682e3680ce24774c614f2b8f6bb9b1ea5bfe402043df3cdf263c62ab9d9cdc62e74b6192cb52a8782725c8ba3fa48e3fd178b579fb211a6613a6bf5fd4b93289f6427bc36506aef6d077910d0c197c0d93ba7032eb31e3d5b5d96d94f3c6186b1027cd430ea1b7a4acee46e3c047ecae8ba23723e78436ea3c888586b9f76f830058be195f20654b7745f4a45fbf3d3d8cca89866da9647496f6b6cb7a3a97773499d43c7a647017b1250e183220a1b65bd0a78e3ec99e001ad4482bae56b4784d949cae27195985fce3f9197689c0ecbe727ec9e610d078f4db8bdb351980493ae88823ff5ff3b4f5a1e1214c866970d782da52ea4ac2c6d5394969726cbc1e7919e455ed12aafd3459bf14bf7907178bc04eb5486b7bd294f790f8ad70fa72744e3993bf4ffd79f60d37e909be6f3c3f3cd3eed30686cee9769fceb12e5e632ae93a170c328ff7921e88ab377c18e5b1b0180e68e4566c867ebef61542c76079858683b1ba5fcc47da1b1bf1cb8cbff2d3c89c02423e8e7b93561bfdf64dc59e468944fab6f0e2a9b6f94d201f07f2c8b84d130cb4c90f275d5ea51ab88ba6bbdc3364bd7955277905ae21990aec5854646e05d8f4420b86312780f9a03575c3e935090b4346228ac32ea852fd307bb3df7ba45135fd2f4f57c4ae4973435b7014f03cd1b029fe7de5754fdbc23cba16b40a277dea6a6e85b529a052b25467329d7a05df582a1093eb964be6c28170c0ed3c1892f3394a88d460f22005f426a2c7af7a87917493468beda3495981ac2305d4221b27bc6daafe5c4aa9169a36774c2b66e0c3b51f33575effbee4b64b483a04cc2390703f73b5b9d2a92e928114e831e633e031b8bcb20e2aafc62d235eb9a5c963ee9a8508aa85b8b7cd2d740a536593eeaaba66b3434d95c08b361f3d53bf8465151d04896915cd0752a8fe34437cb219baaa9987b96a6bbe96c61e612c0e1e95a04f0b00e69aa2e7b176fd8022a77ca68f99eff9cc15e8c7e54ec017fb0c1c8e422e83ab0f49e89fc18031d472f9dac4b781757444fb236d87b1d026fa9a5de63525bff533b1f08a723a7053eaf1", 0x1000}], 0x4, 0x2, 0x1, {0x2}}, 0xfffffffb)
[ 3399.657102][T26858] device batadv0 entered promiscuous mode
[ 3399.665630][T26831] device batadv0 left promiscuous mode
[ 3399.711724][T26871] loop1: detected capacity change from 0 to 512
22:06:54 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xec4}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3399.758462][T26871] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3399.768980][T26871] EXT4-fs (loop1): mount failed
22:06:54 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x88480000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3399.804305][T26871] loop1: detected capacity change from 0 to 512
[ 3399.812467][T26977] loop2: detected capacity change from 0 to 242945
[ 3399.826095][T26871] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3399.832737][T26871] EXT4-fs (loop1): mount failed
[ 3399.834582][T26977] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3399.844925][T26980] FAULT_INJECTION: forcing a failure.
[ 3399.844925][T26980] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 3399.858027][T26980] CPU: 1 PID: 26980 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0
[ 3399.866784][T26980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3399.876870][T26980] Call Trace:
[ 3399.880144][T26980]
[ 3399.883066][T26980] dump_stack_lvl+0xd6/0x122
[ 3399.887775][T26980] dump_stack+0x11/0x1b
[ 3399.891961][T26980] should_fail+0x23c/0x250
[ 3399.896374][T26980] should_fail_usercopy+0x16/0x20
[ 3399.901404][T26980] _copy_from_user+0x1c/0xd0
[ 3399.905999][T26980] do_recvmmsg+0x2c3/0xae0
[ 3399.910431][T26980] ? cx23885_dif_setup+0xfd20/0x39870
[ 3399.915857][T26980] ? get_timespec64+0xff/0x130
[ 3399.920623][T26980] __x64_sys_recvmmsg+0xf5/0x160
[ 3399.925562][T26980] do_syscall_64+0x44/0xd0
[ 3399.929980][T26980] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3399.935924][T26980] RIP: 0033:0x7f553bc44af9
[ 3399.940332][T26980] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3399.959942][T26980] RSP: 002b:00007f553b3bb188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 3399.968381][T26980] RAX: ffffffffffffffda RBX: 00007f553bd57f60 RCX: 00007f553bc44af9
[ 3399.976375][T26980] RDX: 04000000000003b4 RSI: 00000000200037c0 RDI: 0000000000000003
[ 3399.984345][T26980] RBP: 00007f553b3bb1d0 R08: 0000000020003700 R09: 0000000000000000
[ 3399.992372][T26980] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
22:06:54 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) (fail_nth: 44)
22:06:54 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xad390200}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:06:54 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000018a00d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3400.000333][T26980] R13: 00007ffd3a6ac3af R14: 00007f553b3bb300 R15: 0000000000022000
[ 3400.008300][T26980]
22:06:54 executing program 4:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000002c0)=ANY=[@ANYBLOB="4c0000001000030400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012800b0001006970766c616e00000c000280060002000000000008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2, @ANYBLOB="e7afc0d9f46c97e51b028b6e747168d03db4794c3c6246b356874f48bfa9bfe51e7e25d739a45c6a07a7b348257bb9ea2185058e79f925eb7e40d7e8e58dc6a9d2dae916d8f92d6dac5a5e5fd73c579ec4a4544bfbdab31d77f0c9a692ecebc31da24477cb8fd5c2f0c979cef9874dbb13c7fcf3151b565ca745ba698cd5ce128fef8a3ea5115d80b9dc4423fc4f94adfb3a52d0e47a6b369b0d448e5d28348065dce4bf7cdca04d43e03485c4c828e4e3266f5e46"], 0x4c}}, 0x0)
[ 3400.273099][T26990] FAULT_INJECTION: forcing a failure.
[ 3400.273099][T26990] name failslab, interval 1, probability 0, space 0, times 0
[ 3400.285746][T26990] CPU: 1 PID: 26990 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0
[ 3400.294597][T26990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3400.304645][T26990] Call Trace:
[ 3400.307920][T26990]
[ 3400.310844][T26990] dump_stack_lvl+0xd6/0x122
[ 3400.315499][T26990] dump_stack+0x11/0x1b
[ 3400.319653][T26990] should_fail+0x23c/0x250
[ 3400.324165][T26990] __should_failslab+0x81/0x90
[ 3400.328928][T26990] should_failslab+0x5/0x20
[ 3400.333515][T26990] kmem_cache_alloc_node+0x61/0x2d0
[ 3400.338734][T26990] ? __alloc_skb+0xf0/0x450
[ 3400.343281][T26990] __alloc_skb+0xf0/0x450
[ 3400.347659][T26990] netlink_dump+0x118/0x6b0
[ 3400.352624][T26990] ? __kfree_skb+0xfe/0x150
[ 3400.357130][T26990] netlink_recvmsg+0x486/0x810
[ 3400.361981][T26990] ? netlink_sendmsg+0x840/0x840
[ 3400.366920][T26990] ____sys_recvmsg+0x16c/0x320
[ 3400.371709][T26990] do_recvmmsg+0x3f5/0xae0
[ 3400.376138][T26990] ? cx23885_dif_setup+0xfd20/0x39870
[ 3400.381540][T26990] ? get_timespec64+0xff/0x130
[ 3400.386560][T26990] __x64_sys_recvmmsg+0xf5/0x160
[ 3400.391514][T26990] do_syscall_64+0x44/0xd0
[ 3400.395928][T26990] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3400.401824][T26990] RIP: 0033:0x7f553bc44af9
[ 3400.406232][T26990] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3400.425946][T26990] RSP: 002b:00007f553b3bb188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 3400.434431][T26990] RAX: ffffffffffffffda RBX: 00007f553bd57f60 RCX: 00007f553bc44af9
[ 3400.442415][T26990] RDX: 04000000000003b4 RSI: 00000000200037c0 RDI: 0000000000000003
[ 3400.450381][T26990] RBP: 00007f553b3bb1d0 R08: 0000000020003700 R09: 0000000000000000
[ 3400.458357][T26990] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
22:06:55 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xf00}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:06:55 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x88a8ffff}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3400.466349][T26990] R13: 00007ffd3a6ac3af R14: 00007f553b3bb300 R15: 0000000000022000
[ 3400.474356][T26990]
22:06:55 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) (fail_nth: 45)
[ 3400.546088][T27092] loop2: detected capacity change from 0 to 256258
[ 3400.571806][T27092] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:06:55 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xae390200}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3400.600513][T27093] bridge0: port 3(ipvlan38) entered blocking state
[ 3400.607051][T27093] bridge0: port 3(ipvlan38) entered disabled state
[ 3400.638147][T27094] loop1: detected capacity change from 0 to 512
[ 3400.664253][T27094] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3400.670916][T27094] EXT4-fs (loop1): mount failed
[ 3400.680591][T27097] bridge0: port 3(ipvlan38) entered blocking state
[ 3400.687124][T27097] bridge0: port 3(ipvlan38) entered disabled state
22:06:55 executing program 4:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x7fff}}, './bus\x00'})
sendmsg$nl_route(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv6_deladdrlabel={0x50, 0x49, 0x1, 0x70bd29, 0x25dfdbfb, {0xa, 0x0, 0x0, 0x0, r2, 0x5e}, [@IFAL_LABEL={0x8, 0x2, 0x5}, @IFAL_LABEL={0x8, 0x2, 0x4}, @IFAL_LABEL={0x8, 0x2, 0x2}, @IFAL_LABEL={0x8, 0x2, 0xb}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}]}, 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x2000c841)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000140)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x4c}}, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)=0x7, 0x12)
r4 = creat(&(0x7f00000001c0)='./bus\x00', 0x102)
ioctl$SG_SET_COMMAND_Q(r4, 0x2284, &(0x7f0000000040)=0xfffffffe)
setsockopt$netlink_NETLINK_CAP_ACK(r4, 0x10e, 0xa, &(0x7f0000000040)=0x1, 0x4)
bind$inet6(r4, &(0x7f0000000100)={0xa, 0x4e20, 0x1000, @local, 0x4}, 0x1c)
22:06:55 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x9effffff}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3400.714068][T27094] loop1: detected capacity change from 0 to 512
[ 3400.721896][T27094] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3400.728424][T27094] EXT4-fs (loop1): mount failed
[ 3400.796253][T27104] FAULT_INJECTION: forcing a failure.
[ 3400.796253][T27104] name failslab, interval 1, probability 0, space 0, times 0
[ 3400.808938][T27104] CPU: 0 PID: 27104 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0
[ 3400.817774][T27104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3400.827824][T27104] Call Trace:
[ 3400.831096][T27104]
[ 3400.834018][T27104] dump_stack_lvl+0xd6/0x122
[ 3400.838641][T27104] dump_stack+0x11/0x1b
[ 3400.842805][T27104] should_fail+0x23c/0x250
[ 3400.847306][T27104] __should_failslab+0x81/0x90
[ 3400.852089][T27104] should_failslab+0x5/0x20
[ 3400.856597][T27104] kmem_cache_alloc_node_trace+0x61/0x310
[ 3400.862372][T27104] ? __kmalloc_node_track_caller+0x30/0x40
[ 3400.868259][T27104] __kmalloc_node_track_caller+0x30/0x40
[ 3400.873971][T27104] ? netlink_dump+0x118/0x6b0
[ 3400.878709][T27104] __alloc_skb+0x19d/0x450
[ 3400.883161][T27104] netlink_dump+0x118/0x6b0
[ 3400.887714][T27104] ? __kfree_skb+0xfe/0x150
[ 3400.892470][T27104] netlink_recvmsg+0x486/0x810
[ 3400.897395][T27104] ? netlink_sendmsg+0x840/0x840
[ 3400.902527][T27104] ____sys_recvmsg+0x16c/0x320
[ 3400.907332][T27104] do_recvmmsg+0x3f5/0xae0
[ 3400.911835][T27104] ? cx23885_dif_setup+0xfd20/0x39870
[ 3400.917236][T27104] ? get_timespec64+0xff/0x130
[ 3400.922020][T27104] __x64_sys_recvmmsg+0xf5/0x160
[ 3400.926956][T27104] do_syscall_64+0x44/0xd0
[ 3400.931410][T27104] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3400.937324][T27104] RIP: 0033:0x7f553bc44af9
[ 3400.941735][T27104] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3400.944870][T27111] loop2: detected capacity change from 0 to 264192
[ 3400.961338][T27104] RSP: 002b:00007f553b3bb188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 3400.961362][T27104] RAX: ffffffffffffffda RBX: 00007f553bd57f60 RCX: 00007f553bc44af9
[ 3400.961374][T27104] RDX: 04000000000003b4 RSI: 00000000200037c0 RDI: 0000000000000003
22:06:55 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000018b00d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:06:55 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) (fail_nth: 46)
22:06:55 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0xeaffffff}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3400.961398][T27104] RBP: 00007f553b3bb1d0 R08: 0000000020003700 R09: 0000000000000000
[ 3400.961410][T27104] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3400.961421][T27104] R13: 00007ffd3a6ac3af R14: 00007f553b3bb300 R15: 0000000000022000
[ 3400.961437][T27104]
[ 3401.011534][T27109] bridge0: port 3(ipvlan38) entered blocking state
[ 3401.026352][T27109] bridge0: port 3(ipvlan38) entered disabled state
[ 3401.037463][T27111] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:06:55 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xaf390200}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:06:55 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xf56}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3401.078761][T27113] bridge0: port 3(ipvlan38) entered blocking state
[ 3401.085355][T27113] bridge0: port 3(ipvlan38) entered disabled state
22:06:55 executing program 4:
r0 = socket$nl_route(0x10, 0x3, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'vlan1\x00', 0x0})
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000140)=ANY=[@ANYBLOB="4c0000001000030400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012800b0001006970766c616e04000c000280060002000000000008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2, @ANYBLOB], 0x4c}}, 0x0)
[ 3401.187026][T27216] FAULT_INJECTION: forcing a failure.
[ 3401.187026][T27216] name failslab, interval 1, probability 0, space 0, times 0
[ 3401.199698][T27216] CPU: 0 PID: 27216 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0
[ 3401.208499][T27216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3401.218551][T27216] Call Trace:
[ 3401.221825][T27216]
[ 3401.224780][T27216] dump_stack_lvl+0xd6/0x122
[ 3401.229381][T27216] dump_stack+0x11/0x1b
[ 3401.233674][T27216] should_fail+0x23c/0x250
[ 3401.238085][T27216] ? skb_clone+0x12c/0x1f0
[ 3401.242532][T27216] __should_failslab+0x81/0x90
[ 3401.247319][T27216] should_failslab+0x5/0x20
[ 3401.251836][T27216] kmem_cache_alloc+0x4f/0x320
[ 3401.256690][T27216] skb_clone+0x12c/0x1f0
[ 3401.260945][T27216] netlink_deliver_tap+0x2da/0x510
[ 3401.266066][T27216] netlink_dump+0x4ba/0x6b0
[ 3401.269240][T27223] loop2: detected capacity change from 0 to 264192
[ 3401.270576][T27216] netlink_recvmsg+0x486/0x810
[ 3401.270630][T27216] ? netlink_sendmsg+0x840/0x840
[ 3401.284567][T27223] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3401.286791][T27216] ____sys_recvmsg+0x16c/0x320
[ 3401.286819][T27216] do_recvmmsg+0x3f5/0xae0
[ 3401.302524][T27216] ? cx23885_dif_setup+0xfd20/0x39870
[ 3401.307919][T27216] ? get_timespec64+0xff/0x130
[ 3401.312778][T27216] __x64_sys_recvmmsg+0xf5/0x160
[ 3401.317731][T27216] do_syscall_64+0x44/0xd0
[ 3401.322257][T27216] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3401.328295][T27216] RIP: 0033:0x7f553bc44af9
[ 3401.332702][T27216] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3401.352409][T27216] RSP: 002b:00007f553b3bb188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 3401.360893][T27216] RAX: ffffffffffffffda RBX: 00007f553bd57f60 RCX: 00007f553bc44af9
[ 3401.368899][T27216] RDX: 04000000000003b4 RSI: 00000000200037c0 RDI: 0000000000000003
[ 3401.376937][T27216] RBP: 00007f553b3bb1d0 R08: 0000000020003700 R09: 0000000000000000
22:06:55 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0xefffffff}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:06:55 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0xf0ffffff}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:06:56 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xb0390200}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:06:56 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0xfeffffff}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:06:56 executing program 4:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
r3 = socket(0x11, 0x800000003, 0x0)
ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0})
setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000140)={r4, 0x1, 0x6, @remote}, 0x10)
setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000180)={r4, 0x2, 0x6, @remote}, 0x10)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f00000000c0)={'syztnl0\x00', r4, 0x29, 0x9, 0x1, 0x5, 0x33, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @loopback, 0x8, 0x40, 0x7f, 0x6}})
r5 = socket(0x11, 0x800000003, 0x0)
ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0})
setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000140)={0x0, 0x1, 0x6, @remote}, 0x10)
setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x2, 0x6, @remote}, 0x10)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f00000000c0)={'syztnl0\x00', 0x0, 0x29, 0x9, 0x1, 0x5, 0x33, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @loopback, 0x8, 0x40, 0x7f, 0x6}})
sendmsg$nl_route_sched(r3, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000003c0)={&(0x7f00000002c0)=@delqdisc={0xf4, 0x25, 0x720, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0xfff2, 0xe}, {0xc, 0x1}, {0x7}}, [@TCA_RATE={0x6, 0x5, {0x5, 0x1}}, @TCA_RATE={0x6, 0x5, {0x1, 0x81}}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0xffff0a85}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x9, 0x5, 0xfff8, 0x1, 0x0, 0x81, 0x7, 0x2}}, {0x8, 0x2, [0x8, 0x5b75]}}]}, @TCA_STAB={0x80, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x40, 0x0, 0x780, 0x5, 0x1, 0xff, 0x2, 0x2}}, {0x8, 0x2, [0x3, 0xd333]}}, {{0x1c, 0x1, {0x1f, 0x3, 0x5, 0x10000, 0x0, 0xfffffc00, 0xffffffff, 0x5}}, {0xe, 0x2, [0xf4, 0x800, 0x2, 0xff7f, 0x6]}}, {{0x1c, 0x1, {0x7, 0x5a, 0x7, 0x400, 0x2, 0x7, 0x5, 0x5}}, {0xe, 0x2, [0x1, 0x13d, 0x400, 0x1000, 0xce]}}]}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x3f28}, @TCA_RATE={0x6, 0x5, {0x3, 0xb}}]}, 0xf4}}, 0x804)
setsockopt$packet_add_memb(r5, 0x107, 0x1, &(0x7f0000000140)={r6, 0x1, 0x6, @remote}, 0x10)
setsockopt$packet_add_memb(r5, 0x107, 0x1, &(0x7f0000000180)={r6, 0x2, 0x6, @remote}, 0x10)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f00000000c0)={'syztnl0\x00', r6, 0x29, 0x9, 0x1, 0x5, 0x33, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @loopback, 0x8, 0x40, 0x7f, 0x6}})
sendmsg$nl_route(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)=@RTM_NEWMDB={0x78, 0x54, 0x20, 0x70bd2c, 0x25dfdbfb, {0x7, r2}, [@MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x0, 0x0, 0x1, {@ip4=@broadcast}}}, @MDBA_SET_ENTRY={0x20, 0x1, {r4, 0x1, 0x3, 0x2, {@in6_addr=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x86dd}}}, @MDBA_SET_ENTRY={0x20, 0x1, {r6, 0x1, 0x2, 0x1, {@ip4=@rand_addr=0x64010100, 0x800}}}]}, 0x78}}, 0x44)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000140)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x4c}}, 0x0)
22:06:56 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) (fail_nth: 47)
[ 3401.384911][T27216] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3401.392969][T27216] R13: 00007ffd3a6ac3af R14: 00007f553b3bb300 R15: 0000000000022000
[ 3401.400942][T27216]
[ 3401.471102][T27233] loop1: detected capacity change from 0 to 512
[ 3401.504740][T27233] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3401.512929][T27233] EXT4-fs (loop1): mount failed
22:06:56 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x1100}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:06:56 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000018c00d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3401.533951][T27233] loop1: detected capacity change from 0 to 512
[ 3401.545652][T27233] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3401.555036][T27233] EXT4-fs (loop1): mount failed
[ 3401.623527][T27341] device batadv0 entered promiscuous mode
[ 3401.630265][T27342] loop2: detected capacity change from 0 to 264192
[ 3401.645347][T27341] bridge0: port 3(ipvlan38) entered blocking state
[ 3401.651885][T27341] bridge0: port 3(ipvlan38) entered disabled state
[ 3401.663655][T27342] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3401.674190][T27344] FAULT_INJECTION: forcing a failure.
[ 3401.674190][T27344] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 3401.687478][T27344] CPU: 0 PID: 27344 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0
[ 3401.696251][T27344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3401.706313][T27344] Call Trace:
[ 3401.709594][T27344]
[ 3401.712521][T27344] dump_stack_lvl+0xd6/0x122
[ 3401.717173][T27344] dump_stack+0x11/0x1b
[ 3401.721991][T27344] should_fail+0x23c/0x250
[ 3401.726443][T27344] should_fail_usercopy+0x16/0x20
[ 3401.731469][T27344] _copy_from_user+0x1c/0xd0
[ 3401.736058][T27344] do_recvmmsg+0x2c3/0xae0
[ 3401.740474][T27344] ? cx23885_dif_setup+0xfd20/0x39870
[ 3401.745856][T27344] ? get_timespec64+0xff/0x130
[ 3401.750613][T27344] __x64_sys_recvmmsg+0xf5/0x160
[ 3401.755587][T27344] do_syscall_64+0x44/0xd0
[ 3401.760334][T27344] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3401.766238][T27344] RIP: 0033:0x7f553bc44af9
22:06:56 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0xffffa888}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3401.770651][T27344] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3401.790258][T27344] RSP: 002b:00007f553b3bb188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 3401.798736][T27344] RAX: ffffffffffffffda RBX: 00007f553bd57f60 RCX: 00007f553bc44af9
[ 3401.806777][T27344] RDX: 04000000000003b4 RSI: 00000000200037c0 RDI: 0000000000000003
[ 3401.814742][T27344] RBP: 00007f553b3bb1d0 R08: 0000000020003700 R09: 0000000000000000
22:06:56 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) (fail_nth: 48)
[ 3401.822706][T27344] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3401.830672][T27344] R13: 00007ffd3a6ac3af R14: 00007f553b3bb300 R15: 0000000000022000
[ 3401.838638][T27344]
22:06:56 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xb1390200}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:06:56 executing program 4:
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee01, 0xee00}}, './file0\x00'})
ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="000000010000d21cf76e66696c653000"])
socket$nl_route(0x10, 0x3, 0x0)
r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0})
r3 = creat(&(0x7f00000001c0)='./bus\x00', 0x102)
ioctl$SG_SET_COMMAND_Q(r3, 0x2284, &(0x7f0000000040)=0xfffffffe)
setsockopt$inet6_icmp_ICMP_FILTER(r3, 0x1, 0x1, &(0x7f0000000340)={0xfffffffa}, 0x4)
bind$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x6, r2, 0x1, 0x2, 0x6, @multicast}, 0x14)
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000140), 0x280002, 0x0)
r5 = socket(0x11, 0x800000003, 0x0)
ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0})
setsockopt$packet_add_memb(r5, 0x107, 0x1, &(0x7f0000000140)={r6, 0x1, 0x6, @remote}, 0x10)
setsockopt$packet_add_memb(r5, 0x107, 0x1, &(0x7f0000000180)={r6, 0x2, 0x6, @remote}, 0x10)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f00000000c0)={'syztnl0\x00', r6, 0x29, 0x9, 0x1, 0x5, 0x33, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @loopback, 0x8, 0x40, 0x7f, 0x6}})
sendmsg$nl_route(r4, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2010}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)=@newlinkprop={0xf4, 0x6c, 0x400, 0x70bd29, 0x25dfdbfb, {0x0, 0x0, 0x0, r6, 0x49204, 0x100}, [@IFLA_BROADCAST={0xa, 0x2, @broadcast}, @IFLA_IFALIAS={0x14, 0x14, 'ip6erspan0\x00'}, @IFLA_TXQLEN={0x8, 0xd, 0x2}, @IFLA_VFINFO_LIST={0xac, 0x16, 0x0, 0x1, [{0xa8, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x90, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x8, 0x978, 0x1, 0x8100}}, {0x14, 0x1, {0x8, 0xae7, 0x101, 0x88a8}}, {0x14, 0x1, {0x96b, 0xc16, 0x8000, 0x88a8}}, {0x14, 0x1, {0x1, 0x19f, 0x7fff, 0x8100}}, {0x14, 0x1, {0x8001, 0xc36, 0x7e, 0x8100}}, {0x14, 0x1, {0x7, 0x354, 0xb7, 0x88a8}}, {0x14, 0x1, {0x7b, 0xb74, 0x0, 0x88a8}}]}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8e, 0x2}}]}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x41}, 0x4000004)
[ 3401.866755][T27337] device batadv0 left promiscuous mode
[ 3401.873728][T27346] device batadv0 entered promiscuous mode
[ 3401.882209][T27341] device batadv0 left promiscuous mode
22:06:56 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x1200}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3402.054192][T27454] loop1: detected capacity change from 0 to 512
[ 3402.064896][T27456] FAULT_INJECTION: forcing a failure.
[ 3402.064896][T27456] name failslab, interval 1, probability 0, space 0, times 0
[ 3402.077595][T27456] CPU: 1 PID: 27456 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0
[ 3402.086418][T27456] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3402.096483][T27456] Call Trace:
[ 3402.099959][T27456]
[ 3402.102883][T27456] dump_stack_lvl+0xd6/0x122
[ 3402.107507][T27456] dump_stack+0x11/0x1b
[ 3402.111724][T27456] should_fail+0x23c/0x250
[ 3402.116208][T27456] __should_failslab+0x81/0x90
[ 3402.121144][T27456] should_failslab+0x5/0x20
[ 3402.125704][T27456] kmem_cache_alloc_node+0x61/0x2d0
[ 3402.130987][T27456] ? __alloc_skb+0xf0/0x450
[ 3402.135523][T27456] __alloc_skb+0xf0/0x450
[ 3402.139852][T27456] netlink_dump+0x118/0x6b0
[ 3402.144397][T27456] ? __kfree_skb+0xfe/0x150
[ 3402.148919][T27456] netlink_recvmsg+0x486/0x810
[ 3402.153696][T27456] ? xfd_validate_state+0x4e/0xf0
[ 3402.158736][T27456] ? netlink_sendmsg+0x840/0x840
[ 3402.163705][T27456] ____sys_recvmsg+0x16c/0x320
[ 3402.168531][T27456] do_recvmmsg+0x3f5/0xae0
[ 3402.172961][T27456] ? cx23885_dif_setup+0xfd20/0x39870
[ 3402.178362][T27456] ? get_timespec64+0xff/0x130
[ 3402.183173][T27456] __x64_sys_recvmmsg+0xf5/0x160
[ 3402.188107][T27456] do_syscall_64+0x44/0xd0
[ 3402.192591][T27456] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3402.198486][T27456] RIP: 0033:0x7f553bc44af9
[ 3402.202916][T27456] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3402.222567][T27456] RSP: 002b:00007f553b3bb188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 3402.230978][T27456] RAX: ffffffffffffffda RBX: 00007f553bd57f60 RCX: 00007f553bc44af9
[ 3402.239013][T27456] RDX: 04000000000003b4 RSI: 00000000200037c0 RDI: 0000000000000003
[ 3402.246981][T27456] RBP: 00007f553b3bb1d0 R08: 0000000020003700 R09: 0000000000000000
22:06:56 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0xffffff7f}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3402.254947][T27456] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3402.263077][T27456] R13: 00007ffd3a6ac3af R14: 00007f553b3bb300 R15: 0000000000022000
[ 3402.271049][T27456]
22:06:56 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) (fail_nth: 49)
[ 3402.296604][T27454] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3402.309857][T27454] EXT4-fs (loop1): mount failed
[ 3402.320524][T27460] loop2: detected capacity change from 0 to 264192
[ 3402.330568][T27461] device batadv0 entered promiscuous mode
[ 3402.336848][T27453] device batadv0 left promiscuous mode
22:06:57 executing program 4:
r0 = signalfd(0xffffffffffffffff, &(0x7f0000002800)={[0x1]}, 0x8)
ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000002880)={'wlan1\x00', 0x0})
sendmsg$NL80211_CMD_START_NAN(r0, &(0x7f0000002940)={&(0x7f0000002840)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000002900)={&(0x7f00000028c0)={0x2c, 0x0, 0x1, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x1}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0xff}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000)
r2 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x2c, 0x29, 0x800, 0x70bd2d, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, {0x0, 0x9}, {0x4, 0xb}, {0x10, 0xe}}, [@TCA_RATE={0x6, 0x5, {0x9, 0x1}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40000}, 0x24040045)
r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000140)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x0)
[ 3402.339709][T27460] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3402.355774][T27462] device batadv0 entered promiscuous mode
[ 3402.373803][T27461] device batadv0 left promiscuous mode
[ 3402.382478][T27454] loop1: detected capacity change from 0 to 512
22:06:57 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xbdb80100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3402.391871][T27454] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3402.398345][T27454] EXT4-fs (loop1): mount failed
22:06:57 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0xffffff81}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3402.486931][T27473] FAULT_INJECTION: forcing a failure.
[ 3402.486931][T27473] name failslab, interval 1, probability 0, space 0, times 0
[ 3402.499644][T27473] CPU: 0 PID: 27473 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0
[ 3402.508451][T27473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3402.518511][T27473] Call Trace:
[ 3402.521786][T27473]
[ 3402.524809][T27473] dump_stack_lvl+0xd6/0x122
[ 3402.529404][T27473] dump_stack+0x11/0x1b
22:06:57 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000018d00d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3402.533558][T27473] should_fail+0x23c/0x250
[ 3402.537981][T27473] __should_failslab+0x81/0x90
[ 3402.542812][T27473] should_failslab+0x5/0x20
[ 3402.547318][T27473] kmem_cache_alloc_node_trace+0x61/0x310
[ 3402.553043][T27473] ? __kmalloc_node_track_caller+0x30/0x40
[ 3402.558889][T27473] __kmalloc_node_track_caller+0x30/0x40
[ 3402.564533][T27473] ? netlink_dump+0x118/0x6b0
[ 3402.569283][T27473] __alloc_skb+0x19d/0x450
[ 3402.573719][T27473] netlink_dump+0x118/0x6b0
[ 3402.578230][T27473] ? __kfree_skb+0xfe/0x150
[ 3402.582792][T27473] netlink_recvmsg+0x486/0x810
[ 3402.587567][T27473] ? netlink_sendmsg+0x840/0x840
[ 3402.592606][T27473] ____sys_recvmsg+0x16c/0x320
[ 3402.597385][T27473] do_recvmmsg+0x3f5/0xae0
[ 3402.601799][T27473] ? cx23885_dif_setup+0xfd20/0x39870
[ 3402.607237][T27473] ? get_timespec64+0xff/0x130
[ 3402.612004][T27473] __x64_sys_recvmmsg+0xf5/0x160
[ 3402.616944][T27473] do_syscall_64+0x44/0xd0
[ 3402.621380][T27473] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3402.627362][T27473] RIP: 0033:0x7f553bc44af9
[ 3402.631768][T27473] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3402.651375][T27473] RSP: 002b:00007f553b3bb188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 3402.655232][T27477] loop2: detected capacity change from 0 to 264192
[ 3402.659836][T27473] RAX: ffffffffffffffda RBX: 00007f553bd57f60 RCX: 00007f553bc44af9
[ 3402.659853][T27473] RDX: 04000000000003b4 RSI: 00000000200037c0 RDI: 0000000000000003
22:06:57 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xbfbc0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:06:57 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) (fail_nth: 50)
[ 3402.682333][T27473] RBP: 00007f553b3bb1d0 R08: 0000000020003700 R09: 0000000000000000
[ 3402.682538][T27477] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3402.690303][T27473] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3402.704797][T27473] R13: 00007ffd3a6ac3af R14: 00007f553b3bb300 R15: 0000000000022000
[ 3402.712769][T27473]
22:06:57 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x1400}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:06:57 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0xffffff9e}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3402.765345][T27545] bridge0: port 3(ipvlan38) entered blocking state
[ 3402.772035][T27545] bridge0: port 3(ipvlan38) entered disabled state
[ 3402.789042][T27581] loop1: detected capacity change from 0 to 512
[ 3402.805325][T27581] EXT4-fs (loop1): corrupt root inode, run e2fsck
22:06:57 executing program 4:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
getsockname(r0, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000100)=0x80)
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000140)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x4c}}, 0x0)
[ 3402.813466][T27581] EXT4-fs (loop1): mount failed
[ 3402.853109][T27581] loop1: detected capacity change from 0 to 512
[ 3402.864891][T27581] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3402.872696][T27581] EXT4-fs (loop1): mount failed
[ 3402.897151][T27591] FAULT_INJECTION: forcing a failure.
[ 3402.897151][T27591] name failslab, interval 1, probability 0, space 0, times 0
[ 3402.909848][T27591] CPU: 0 PID: 27591 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0
[ 3402.918617][T27591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3402.928673][T27591] Call Trace:
[ 3402.932019][T27591]
[ 3402.934945][T27591] dump_stack_lvl+0xd6/0x122
[ 3402.939536][T27591] dump_stack+0x11/0x1b
[ 3402.943808][T27591] should_fail+0x23c/0x250
[ 3402.948221][T27591] ? skb_clone+0x12c/0x1f0
[ 3402.952636][T27591] __should_failslab+0x81/0x90
[ 3402.957403][T27591] should_failslab+0x5/0x20
[ 3402.961913][T27591] kmem_cache_alloc+0x4f/0x320
[ 3402.966740][T27591] skb_clone+0x12c/0x1f0
[ 3402.970996][T27591] netlink_deliver_tap+0x2da/0x510
[ 3402.976145][T27591] netlink_dump+0x4ba/0x6b0
[ 3402.980654][T27591] netlink_recvmsg+0x486/0x810
[ 3402.985426][T27591] ? netlink_sendmsg+0x840/0x840
[ 3402.990368][T27591] ____sys_recvmsg+0x16c/0x320
[ 3402.995126][T27591] do_recvmmsg+0x3f5/0xae0
[ 3402.999585][T27591] ? cx23885_dif_setup+0xfd20/0x39870
[ 3403.005023][T27591] ? get_timespec64+0xff/0x130
[ 3403.009821][T27591] __x64_sys_recvmmsg+0xf5/0x160
[ 3403.014753][T27591] do_syscall_64+0x44/0xd0
[ 3403.019173][T27591] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3403.025066][T27591] RIP: 0033:0x7f553bc44af9
[ 3403.029485][T27591] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3403.032001][T27699] loop2: detected capacity change from 0 to 264192
[ 3403.049086][T27591] RSP: 002b:00007f553b3bb188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 3403.049178][T27591] RAX: ffffffffffffffda RBX: 00007f553bd57f60 RCX: 00007f553bc44af9
[ 3403.072036][T27591] RDX: 04000000000003b4 RSI: 00000000200037c0 RDI: 0000000000000003
[ 3403.080025][T27591] RBP: 00007f553b3bb1d0 R08: 0000000020003700 R09: 0000000000000000
[ 3403.087993][T27591] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
22:06:57 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x140b}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:06:57 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0xffffffea}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:06:57 executing program 4:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000140)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x4c}}, 0x0)
getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0x14)
22:06:57 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) (fail_nth: 51)
22:06:57 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed4100000000ef00d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3403.095956][T27591] R13: 00007ffd3a6ac3af R14: 00007f553b3bb300 R15: 0000000000022000
[ 3403.103927][T27591]
[ 3403.106209][T27699] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:06:57 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0000100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3403.261251][T27707] FAULT_INJECTION: forcing a failure.
[ 3403.261251][T27707] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 3403.267644][T27708] bridge0: port 3(ipvlan38) entered blocking state
[ 3403.274392][T27707] CPU: 0 PID: 27707 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0
[ 3403.280924][T27708] bridge0: port 3(ipvlan38) entered disabled state
[ 3403.289626][T27707] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3403.306146][T27707] Call Trace:
[ 3403.309418][T27707]
[ 3403.312347][T27707] dump_stack_lvl+0xd6/0x122
[ 3403.316940][T27707] dump_stack+0x11/0x1b
[ 3403.321094][T27707] should_fail+0x23c/0x250
[ 3403.325563][T27707] should_fail_usercopy+0x16/0x20
[ 3403.330594][T27707] _copy_from_user+0x1c/0xd0
[ 3403.335222][T27707] do_recvmmsg+0x2c3/0xae0
[ 3403.339635][T27707] ? cx23885_dif_setup+0xfd20/0x39870
[ 3403.345013][T27707] ? get_timespec64+0xff/0x130
[ 3403.349882][T27707] __x64_sys_recvmmsg+0xf5/0x160
[ 3403.354821][T27707] do_syscall_64+0x44/0xd0
[ 3403.359234][T27707] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3403.365148][T27707] RIP: 0033:0x7f553bc44af9
[ 3403.369558][T27707] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3403.389175][T27707] RSP: 002b:00007f553b3bb188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 3403.397597][T27707] RAX: ffffffffffffffda RBX: 00007f553bd57f60 RCX: 00007f553bc44af9
22:06:58 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0xffffffef}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:06:58 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) (fail_nth: 52)
[ 3403.405590][T27707] RDX: 04000000000003b4 RSI: 00000000200037c0 RDI: 0000000000000003
[ 3403.413631][T27707] RBP: 00007f553b3bb1d0 R08: 0000000020003700 R09: 0000000000000000
[ 3403.421596][T27707] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3403.429584][T27707] R13: 00007ffd3a6ac3af R14: 00007f553b3bb300 R15: 0000000000022000
[ 3403.437597][T27707]
22:06:58 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x1900}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3403.479615][T27753] loop2: detected capacity change from 0 to 264192
[ 3403.492861][T27769] loop1: detected capacity change from 0 to 512
[ 3403.493798][T27710] bridge0: port 3(ipvlan38) entered blocking state
[ 3403.505665][T27710] bridge0: port 3(ipvlan38) entered disabled state
[ 3403.518027][T27753] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:06:58 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0010100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:06:58 executing program 4:
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000140)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x4c}}, 0x0)
[ 3403.528940][T27769] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3403.535620][T27769] EXT4-fs (loop1): mount failed
[ 3403.604696][T27769] loop1: detected capacity change from 0 to 512
[ 3403.613038][T27769] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3403.619837][T27769] EXT4-fs (loop1): mount failed
[ 3403.629166][T27819] FAULT_INJECTION: forcing a failure.
[ 3403.629166][T27819] name failslab, interval 1, probability 0, space 0, times 0
[ 3403.641867][T27819] CPU: 1 PID: 27819 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0
[ 3403.650633][T27819] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3403.660748][T27819] Call Trace:
[ 3403.664017][T27819]
[ 3403.666982][T27819] dump_stack_lvl+0xd6/0x122
[ 3403.671611][T27819] dump_stack+0x11/0x1b
[ 3403.675762][T27819] should_fail+0x23c/0x250
[ 3403.680173][T27819] __should_failslab+0x81/0x90
[ 3403.684944][T27819] should_failslab+0x5/0x20
[ 3403.689493][T27819] kmem_cache_alloc_node+0x61/0x2d0
[ 3403.694728][T27819] ? __alloc_skb+0xf0/0x450
[ 3403.699226][T27819] __alloc_skb+0xf0/0x450
[ 3403.703562][T27819] netlink_dump+0x118/0x6b0
[ 3403.708071][T27819] ? __kfree_skb+0xfe/0x150
[ 3403.712655][T27819] netlink_recvmsg+0x486/0x810
[ 3403.717425][T27819] ? xfd_validate_state+0x4e/0xf0
[ 3403.722462][T27819] ? netlink_sendmsg+0x840/0x840
[ 3403.727457][T27819] ____sys_recvmsg+0x16c/0x320
[ 3403.732837][T27819] do_recvmmsg+0x3f5/0xae0
[ 3403.737252][T27819] ? cx23885_dif_setup+0xfd20/0x39870
[ 3403.742669][T27819] ? get_timespec64+0xff/0x130
[ 3403.747503][T27819] __x64_sys_recvmmsg+0xf5/0x160
[ 3403.752440][T27819] do_syscall_64+0x44/0xd0
[ 3403.756857][T27819] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3403.762832][T27819] RIP: 0033:0x7f553bc44af9
[ 3403.767243][T27819] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3403.786914][T27819] RSP: 002b:00007f553b3bb188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 3403.795360][T27819] RAX: ffffffffffffffda RBX: 00007f553bd57f60 RCX: 00007f553bc44af9
22:06:58 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0xfffffff0}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3403.803355][T27819] RDX: 04000000000003b4 RSI: 00000000200037c0 RDI: 0000000000000003
[ 3403.811336][T27819] RBP: 00007f553b3bb1d0 R08: 0000000020003700 R09: 0000000000000000
[ 3403.819369][T27819] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3403.827372][T27819] R13: 00007ffd3a6ac3af R14: 00007f553b3bb300 R15: 0000000000022000
[ 3403.835378][T27819]
22:06:58 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) (fail_nth: 53)
22:06:58 executing program 4:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x1, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200200a0}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=@ipv4_getroute={0x1c, 0x1a, 0x400, 0x70bd28, 0x25dfdbff, {0x2, 0x20, 0x80, 0x6, 0x0, 0x0, 0xfd, 0xa, 0x100}, [""]}, 0x1c}}, 0x4800)
r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
r4 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10)
sendto(r4, &(0x7f00000001c0)="11aa63b4ebde90cdb727b7c462f4404f855df69602e285d69f0d200fcc1dfca7ad2a8849ab89b2a5e9482f587bb2718d38459edc444fa8ba4bd324efa3d6c03298ccdcbf03869936dc7e5defa65fa3120c784486a5cab0382943798848476a055b0b9b0821b0486927f7662cf67739539f486633d0ce3deec38660a4e9a2802a1e176de8c5ee0345d583286ceed790ff3eea430ac93d26d8af44401cd5d5e1cbefb0cf1efe8647cf44c5d5797ed802abc9aa7ab967b536c862103b41", 0xbc, 0x0, &(0x7f0000000040)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0xa2, 0x1, 0x3, 0x2, {0xa, 0x4e23, 0xfffffff8, @empty, 0x1000}}}, 0x80)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000005c0)=ANY=[@ANYBLOB="4c0000001000030400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012800b0001006970766c616e00000c000280060002000000000008000500", @ANYRES32=r3, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r3, @ANYBLOB="45d4484eeae53acdea164fc926934ca5a49b6accacb469c00439c3793b3595b4999bdc7cb201a89cafa88f176f666112761a7051ad04385ae1e544573cb939029a4a47cce8e000e90e03d48d38e58eb744a4469b861df790ca5f"], 0x4c}}, 0x0)
r5 = creat(&(0x7f00000001c0)='./bus\x00', 0x102)
ioctl$SG_SET_COMMAND_Q(r5, 0x2284, &(0x7f0000000040)=0xfffffffe)
r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000400), r1)
sendmsg$NL80211_CMD_CONNECT(r5, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x38, r6, 0x20, 0x70bd2b, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC_HINT={0xa, 0xc8, @random="20f34d01205b"}, @NL80211_ATTR_WIPHY_FREQ_HINT={0x8}, @NL80211_ATTR_WIPHY_FREQ_HINT={0x8}, @NL80211_ATTR_DISABLE_VHT={0x4}, @NL80211_ATTR_WANT_1X_4WAY_HS={0x4}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x10)
22:06:58 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed4100000000f000d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:06:58 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0xfffffffe}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:06:58 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x2000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:06:58 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0020100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3403.929270][T27826] loop2: detected capacity change from 0 to 264192
[ 3403.953098][T27826] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3404.016120][T27931] FAULT_INJECTION: forcing a failure.
[ 3404.016120][T27931] name failslab, interval 1, probability 0, space 0, times 0
[ 3404.029471][T27931] CPU: 1 PID: 27931 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0
[ 3404.038299][T27931] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3404.048569][T27931] Call Trace:
[ 3404.051851][T27931]
[ 3404.054775][T27931] dump_stack_lvl+0xd6/0x122
[ 3404.059414][T27931] dump_stack+0x11/0x1b
[ 3404.063565][T27931] should_fail+0x23c/0x250
[ 3404.067976][T27931] __should_failslab+0x81/0x90
[ 3404.072814][T27931] should_failslab+0x5/0x20
[ 3404.077317][T27931] kmem_cache_alloc_node_trace+0x61/0x310
[ 3404.083070][T27931] ? __kmalloc_node_track_caller+0x30/0x40
[ 3404.088914][T27931] __kmalloc_node_track_caller+0x30/0x40
[ 3404.094557][T27931] ? netlink_dump+0x118/0x6b0
[ 3404.099290][T27931] __alloc_skb+0x19d/0x450
[ 3404.103753][T27931] netlink_dump+0x118/0x6b0
[ 3404.108268][T27931] ? __kfree_skb+0xfe/0x150
[ 3404.112790][T27931] netlink_recvmsg+0x486/0x810
[ 3404.117566][T27931] ? xfd_validate_state+0x4e/0xf0
[ 3404.122669][T27931] ? netlink_sendmsg+0x840/0x840
[ 3404.127744][T27931] ____sys_recvmsg+0x16c/0x320
[ 3404.132706][T27931] do_recvmmsg+0x3f5/0xae0
[ 3404.137150][T27931] ? cx23885_dif_setup+0xfd20/0x39870
[ 3404.142535][T27931] ? get_timespec64+0xff/0x130
[ 3404.147307][T27931] __x64_sys_recvmmsg+0xf5/0x160
[ 3404.152272][T27931] do_syscall_64+0x44/0xd0
[ 3404.156690][T27931] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3404.162639][T27931] RIP: 0033:0x7f553bc44af9
[ 3404.167045][T27931] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3404.186704][T27931] RSP: 002b:00007f553b3bb188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 3404.195118][T27931] RAX: ffffffffffffffda RBX: 00007f553bd57f60 RCX: 00007f553bc44af9
[ 3404.203131][T27931] RDX: 04000000000003b4 RSI: 00000000200037c0 RDI: 0000000000000003
22:06:58 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) (fail_nth: 54)
[ 3404.211165][T27931] RBP: 00007f553b3bb1d0 R08: 0000000020003700 R09: 0000000000000000
[ 3404.219562][T27931] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3404.227546][T27931] R13: 00007ffd3a6ac3af R14: 00007f553b3bb300 R15: 0000000000022000
[ 3404.235541][T27931]
[ 3404.276603][T27932] bridge0: port 3(ipvlan38) entered blocking state
[ 3404.283608][T27932] bridge0: port 3(ipvlan38) entered disabled state
22:06:59 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3404.337334][T27935] bridge0: port 3(ipvlan38) entered blocking state
[ 3404.343956][T27935] bridge0: port 3(ipvlan38) entered disabled state
22:06:59 executing program 4:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00'})
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000040)=@ipv6_getrule={0x1c, 0x22, 0x8, 0x70bd2c, 0x25dfdbfd, {0xa, 0x14, 0x0, 0x5e, 0x2, 0x0, 0x0, 0x2}}, 0x1c}, 0x1, 0x0, 0x0, 0x4c050}, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
[ 3404.397712][T27941] loop2: detected capacity change from 0 to 264192
[ 3404.433352][T27941] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3404.442495][T27953] FAULT_INJECTION: forcing a failure.
[ 3404.442495][T27953] name failslab, interval 1, probability 0, space 0, times 0
[ 3404.455642][T27953] CPU: 0 PID: 27953 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0
[ 3404.464434][T27953] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3404.474488][T27953] Call Trace:
[ 3404.477765][T27953]
[ 3404.481123][T27953] dump_stack_lvl+0xd6/0x122
[ 3404.485735][T27953] dump_stack+0x11/0x1b
[ 3404.489905][T27953] should_fail+0x23c/0x250
22:06:59 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x200c}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3404.494404][T27953] ? skb_clone+0x12c/0x1f0
[ 3404.498903][T27953] __should_failslab+0x81/0x90
[ 3404.503671][T27953] should_failslab+0x5/0x20
[ 3404.508172][T27953] kmem_cache_alloc+0x4f/0x320
[ 3404.512933][T27953] skb_clone+0x12c/0x1f0
[ 3404.517192][T27953] netlink_deliver_tap+0x2da/0x510
[ 3404.522572][T27953] netlink_dump+0x4ba/0x6b0
[ 3404.527085][T27953] netlink_recvmsg+0x486/0x810
[ 3404.531908][T27953] ? netlink_sendmsg+0x840/0x840
[ 3404.536920][T27953] ____sys_recvmsg+0x16c/0x320
[ 3404.541691][T27953] do_recvmmsg+0x3f5/0xae0
[ 3404.546106][T27953] ? cx23885_dif_setup+0xfd20/0x39870
[ 3404.549502][T28045] loop1: detected capacity change from 0 to 512
[ 3404.551502][T27953] ? get_timespec64+0xff/0x130
[ 3404.551557][T27953] __x64_sys_recvmmsg+0xf5/0x160
[ 3404.567439][T27953] do_syscall_64+0x44/0xd0
[ 3404.571937][T27953] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3404.577898][T27953] RIP: 0033:0x7f553bc44af9
[ 3404.582306][T27953] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3404.601914][T27953] RSP: 002b:00007f553b3bb188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 3404.610360][T27953] RAX: ffffffffffffffda RBX: 00007f553bd57f60 RCX: 00007f553bc44af9
[ 3404.618518][T27953] RDX: 04000000000003b4 RSI: 00000000200037c0 RDI: 0000000000000003
[ 3404.626486][T27953] RBP: 00007f553b3bb1d0 R08: 0000000020003700 R09: 0000000000000000
[ 3404.634472][T27953] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
22:06:59 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0030100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:06:59 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x2}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:06:59 executing program 4:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000140)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x4c}}, 0x0)
r3 = creat(&(0x7f00000001c0)='./bus\x00', 0x102)
ioctl$SG_SET_COMMAND_Q(r3, 0x2284, &(0x7f0000000040)=0xfffffffe)
accept(r3, &(0x7f0000000040)=@generic, &(0x7f0000000100)=0x80)
[ 3404.642506][T27953] R13: 00007ffd3a6ac3af R14: 00007f553b3bb300 R15: 0000000000022000
[ 3404.650477][T27953]
22:06:59 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) (fail_nth: 55)
[ 3404.702701][T28045] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3404.709141][T28045] EXT4-fs (loop1): mount failed
[ 3404.743155][T28045] loop1: detected capacity change from 0 to 512
[ 3404.752062][T28045] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3404.759433][T28045] EXT4-fs (loop1): mount failed
22:06:59 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed4100000000f100d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:06:59 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x280b}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:06:59 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x3}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3404.808374][T28159] loop2: detected capacity change from 0 to 264192
[ 3404.827744][T28159] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3404.838453][T28161] bridge0: port 3(ipvlan38) entered blocking state
[ 3404.845134][T28161] bridge0: port 3(ipvlan38) entered disabled state
[ 3404.858747][T28162] FAULT_INJECTION: forcing a failure.
[ 3404.858747][T28162] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 3404.871880][T28162] CPU: 0 PID: 28162 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0
[ 3404.880675][T28162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3404.890837][T28162] Call Trace:
[ 3404.894156][T28162]
[ 3404.897083][T28162] dump_stack_lvl+0xd6/0x122
[ 3404.901680][T28162] dump_stack+0x11/0x1b
22:06:59 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x4}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3404.905836][T28162] should_fail+0x23c/0x250
[ 3404.910250][T28162] should_fail_usercopy+0x16/0x20
[ 3404.915272][T28162] _copy_from_user+0x1c/0xd0
[ 3404.919868][T28162] do_recvmmsg+0x2c3/0xae0
[ 3404.924285][T28162] ? cx23885_dif_setup+0xfd20/0x39870
[ 3404.929729][T28162] ? get_timespec64+0xff/0x130
[ 3404.934496][T28162] __x64_sys_recvmmsg+0xf5/0x160
[ 3404.939434][T28162] do_syscall_64+0x44/0xd0
[ 3404.943849][T28162] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3404.949746][T28162] RIP: 0033:0x7f553bc44af9
[ 3404.954158][T28162] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3404.973762][T28162] RSP: 002b:00007f553b3bb188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 3404.982174][T28162] RAX: ffffffffffffffda RBX: 00007f553bd57f60 RCX: 00007f553bc44af9
[ 3404.990182][T28162] RDX: 04000000000003b4 RSI: 00000000200037c0 RDI: 0000000000000003
[ 3404.998167][T28162] RBP: 00007f553b3bb1d0 R08: 0000000020003700 R09: 0000000000000000
22:06:59 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0040100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:06:59 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) (fail_nth: 56)
22:06:59 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x5}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3405.006141][T28162] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3405.014111][T28162] R13: 00007ffd3a6ac3af R14: 00007f553b3bb300 R15: 0000000000022000
[ 3405.022084][T28162]
[ 3405.059891][T28171] bridge0: port 3(ipvlan38) entered blocking state
[ 3405.066571][T28171] bridge0: port 3(ipvlan38) entered disabled state
[ 3405.080720][T28172] loop1: detected capacity change from 0 to 512
22:06:59 executing program 4:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000140)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x4c}}, 0x0)
set_mempolicy(0x8000, &(0x7f0000000040)=0x800, 0xf613)
[ 3405.132168][T28172] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3405.139522][T28172] EXT4-fs (loop1): mount failed
[ 3405.164719][T28271] FAULT_INJECTION: forcing a failure.
[ 3405.164719][T28271] name failslab, interval 1, probability 0, space 0, times 0
[ 3405.177426][T28271] CPU: 0 PID: 28271 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0
[ 3405.186281][T28271] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3405.196327][T28271] Call Trace:
[ 3405.199598][T28271]
[ 3405.202526][T28271] dump_stack_lvl+0xd6/0x122
[ 3405.207188][T28271] dump_stack+0x11/0x1b
[ 3405.211346][T28271] should_fail+0x23c/0x250
[ 3405.215890][T28271] __should_failslab+0x81/0x90
[ 3405.220653][T28271] should_failslab+0x5/0x20
[ 3405.225248][T28271] kmem_cache_alloc_node+0x61/0x2d0
[ 3405.230493][T28271] ? __alloc_skb+0xf0/0x450
[ 3405.234994][T28271] __alloc_skb+0xf0/0x450
[ 3405.239323][T28271] netlink_dump+0x118/0x6b0
[ 3405.243902][T28271] ? __kfree_skb+0xfe/0x150
[ 3405.248405][T28271] netlink_recvmsg+0x486/0x810
[ 3405.253263][T28271] ? netlink_sendmsg+0x840/0x840
[ 3405.258229][T28271] ____sys_recvmsg+0x16c/0x320
[ 3405.263083][T28271] do_recvmmsg+0x3f5/0xae0
[ 3405.267505][T28271] ? cx23885_dif_setup+0xfd20/0x39870
[ 3405.272890][T28271] ? get_timespec64+0xff/0x130
[ 3405.277654][T28271] __x64_sys_recvmmsg+0xf5/0x160
[ 3405.282595][T28271] do_syscall_64+0x44/0xd0
[ 3405.287025][T28271] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3405.292926][T28271] RIP: 0033:0x7f553bc44af9
[ 3405.297341][T28271] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3405.317048][T28271] RSP: 002b:00007f553b3bb188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
22:07:00 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x4000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:00 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x6}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3405.325497][T28271] RAX: ffffffffffffffda RBX: 00007f553bd57f60 RCX: 00007f553bc44af9
[ 3405.333474][T28271] RDX: 04000000000003b4 RSI: 00000000200037c0 RDI: 0000000000000003
[ 3405.341540][T28271] RBP: 00007f553b3bb1d0 R08: 0000000020003700 R09: 0000000000000000
[ 3405.347032][T28283] loop2: detected capacity change from 0 to 264192
[ 3405.349515][T28271] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3405.349530][T28271] R13: 00007ffd3a6ac3af R14: 00007f553b3bb300 R15: 0000000000022000
[ 3405.373081][T28271]
[ 3405.387271][T28283] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3405.397831][T28281] bridge0: port 3(ipvlan38) entered blocking state
[ 3405.404826][T28281] bridge0: port 3(ipvlan38) entered disabled state
[ 3405.417735][T28172] loop1: detected capacity change from 0 to 512
22:07:00 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) (fail_nth: 57)
22:07:00 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0050100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:00 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed4100000000f200d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3405.436279][T28172] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3405.443706][T28172] EXT4-fs (loop1): mount failed
[ 3405.458124][T28286] bridge0: port 3(ipvlan38) entered blocking state
[ 3405.464791][T28286] bridge0: port 3(ipvlan38) entered disabled state
22:07:00 executing program 4:
r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x102)
ioctl$SG_SET_COMMAND_Q(r0, 0x2284, &(0x7f0000000040)=0xfffffffe)
r1 = socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x800, 0x0, 0x103, 0x1}, 0x20)
setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4)
sendmsg$inet6(r1, &(0x7f0000000080)={&(0x7f0000000040)={0xa, 0x4e25, 0x80000, @remote, 0xfffffffc}, 0x1c, 0x0, 0x0, &(0x7f0000000100)=[@pktinfo={{0x24, 0x29, 0x32, {@private0}}}], 0x28}, 0x0)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000240)={0x0, r0}, 0x10)
r3 = fcntl$getown(r2, 0x9)
r4 = creat(&(0x7f00000001c0)='./bus\x00', 0x102)
ioctl$SG_SET_COMMAND_Q(r4, 0x2284, &(0x7f0000000040)=0xfffffffe)
perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x8, 0x3, 0x8, 0xc9, 0x0, 0x9, 0x1f680, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0xd4, 0x2, @perf_bp={&(0x7f0000000200), 0x2}, 0x2, 0x4, 0x9, 0x2, 0x7, 0x9d, 0xe6, 0x0, 0x2, 0x0, 0x4}, r3, 0xc, r4, 0x0)
r5 = socket$nl_route(0x10, 0x3, 0x0)
r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000140)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}}, 0x0)
sendmsg$nl_route(r6, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f0000000340)=ANY=[@ANYBLOB="140001003a000400f70a0000fddbdf250a00ff016c79aaa39221123aa64827dc85fe9aae249451f26b092062fb81917c7cb66f06251f6a2bf0c504d1032ee2b6ca020c47c6d2b85be73b7f6161ae5eeb970fd53e467d92996a5b45a8bdaf12370391297e6cde907a107dc7acf3443dd6bfcfcd58382e1422d972b99689efa6146bd692000000a5d055c79018589ed16327e0abd1be873407d82ea10f6a711aaded1d800dba7314c4b424052998d39bb816263d21829191557ccffd550e050e7849d31c3335513cbeff534d0142c3fea9e8fa5a8fbc29c33fc61e18d5fd1314c0bbd2878d0e9f9d01c816f21e21a97256a52b9fdf38"], 0x14}, 0x1, 0x0, 0x0, 0x4000020}, 0x0)
22:07:00 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x7}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3405.578824][T28292] FAULT_INJECTION: forcing a failure.
[ 3405.578824][T28292] name failslab, interval 1, probability 0, space 0, times 0
[ 3405.591538][T28292] CPU: 0 PID: 28292 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0
[ 3405.600467][T28292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3405.610775][T28292] Call Trace:
[ 3405.614047][T28292]
[ 3405.616969][T28292] dump_stack_lvl+0xd6/0x122
[ 3405.621569][T28292] dump_stack+0x11/0x1b
[ 3405.625724][T28292] should_fail+0x23c/0x250
[ 3405.630133][T28292] __should_failslab+0x81/0x90
[ 3405.634944][T28292] should_failslab+0x5/0x20
[ 3405.639470][T28292] kmem_cache_alloc_node_trace+0x61/0x310
[ 3405.645201][T28292] ? __kmalloc_node_track_caller+0x30/0x40
[ 3405.651070][T28292] __kmalloc_node_track_caller+0x30/0x40
[ 3405.656718][T28292] ? netlink_dump+0x118/0x6b0
[ 3405.661418][T28292] __alloc_skb+0x19d/0x450
[ 3405.665889][T28292] netlink_dump+0x118/0x6b0
[ 3405.670450][T28292] ? __kfree_skb+0xfe/0x150
[ 3405.675004][T28292] netlink_recvmsg+0x486/0x810
[ 3405.676924][T28295] loop2: detected capacity change from 0 to 264192
[ 3405.679776][T28292] ? netlink_sendmsg+0x840/0x840
[ 3405.691195][T28292] ____sys_recvmsg+0x16c/0x320
[ 3405.695965][T28292] do_recvmmsg+0x3f5/0xae0
[ 3405.700417][T28292] ? cx23885_dif_setup+0xfd20/0x39870
[ 3405.705800][T28292] ? get_timespec64+0xff/0x130
[ 3405.705878][T28295] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3405.710613][T28292] __x64_sys_recvmmsg+0xf5/0x160
[ 3405.710636][T28292] do_syscall_64+0x44/0xd0
[ 3405.710655][T28292] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3405.710682][T28292] RIP: 0033:0x7f553bc44af9
[ 3405.710697][T28292] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3405.756468][T28292] RSP: 002b:00007f553b3bb188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 3405.764981][T28292] RAX: ffffffffffffffda RBX: 00007f553bd57f60 RCX: 00007f553bc44af9
22:07:00 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x8}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3405.773558][T28292] RDX: 04000000000003b4 RSI: 00000000200037c0 RDI: 0000000000000003
[ 3405.781586][T28292] RBP: 00007f553b3bb1d0 R08: 0000000020003700 R09: 0000000000000000
[ 3405.789556][T28292] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3405.797529][T28292] R13: 00007ffd3a6ac3af R14: 00007f553b3bb300 R15: 0000000000022000
[ 3405.805537][T28292]
22:07:00 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0060100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:00 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x440b}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:00 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) (fail_nth: 58)
[ 3405.849756][T28345] bridge0: port 3(ipvlan38) entered blocking state
[ 3405.856333][T28345] bridge0: port 3(ipvlan38) entered disabled state
[ 3405.896349][T28400] loop1: detected capacity change from 0 to 512
[ 3405.914899][T28400] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3405.925628][T28400] EXT4-fs (loop1): mount failed
22:07:00 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x9}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:00 executing program 4:
r0 = socket$nl_route(0x10, 0x3, 0x0)
setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000140)={0x0, 0x1, 0x6, @remote}, 0x10)
setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x2, 0x6, @remote}, 0x10)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f00000000c0)={'syztnl0\x00', 0x0, 0x29, 0x9, 0x1, 0x5, 0x33, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @loopback, 0x8, 0x40, 0x7f, 0x6}})
ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000240)={'syztnl2\x00', &(0x7f00000002c0)={'ip6gre0\x00', 0x0, 0x29, 0x4, 0x1, 0x8000, 0x6e06687447986e45, @private1, @local, 0x20, 0x20, 0x8001, 0x81}})
r2 = socket(0x11, 0x800000003, 0x0)
ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0})
setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000140)={r3, 0x1, 0x6, @remote}, 0x10)
setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000180)={r3, 0x2, 0x6, @remote}, 0x10)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f00000000c0)={'syztnl0\x00', r3, 0x29, 0x9, 0x1, 0x5, 0x33, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @loopback, 0x8, 0x40, 0x7f, 0x6}})
ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000003c0)={'ip6tnl0\x00', &(0x7f0000000340)={'ip6gre0\x00', 0x0, 0x39, 0x2, 0x3, 0x2, 0x2, @dev={0xfe, 0x80, '\x00', 0x8}, @mcast2, 0x1, 0x40}})
ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000005c0)={'syztnl1\x00', &(0x7f0000000400)={'syztnl0\x00', 0x0, 0x10, 0x20, 0x20, 0xfffff35f, {{0x4b, 0x4, 0x3, 0x2f, 0x12c, 0x64, 0x0, 0x4, 0x4, 0x0, @multicast2, @broadcast, {[@timestamp_addr={0x44, 0x1c, 0x46, 0x1, 0x5, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3}, {@dev={0xac, 0x14, 0x14, 0x41}, 0x1}, {@dev={0xac, 0x14, 0x14, 0x16}, 0x7}]}, @lsrr={0x83, 0xf, 0x1a, [@rand_addr=0x64010102, @remote, @multicast2]}, @timestamp_prespec={0x44, 0x24, 0x17, 0x3, 0x6, [{@dev={0xac, 0x14, 0x14, 0x24}, 0x9}, {@dev={0xac, 0x14, 0x14, 0x2e}, 0x9}, {@loopback, 0x6}, {@dev={0xac, 0x14, 0x14, 0x3c}, 0x9}]}, @timestamp_addr={0x44, 0x54, 0x78, 0x1, 0x6, [{@multicast2, 0x7fffffff}, {@local, 0x3f}, {@private=0xa010101, 0x10000}, {@loopback, 0x5}, {@dev={0xac, 0x14, 0x14, 0x13}, 0x9}, {@loopback, 0xfe}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x5}, {@remote, 0x9}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x6}, {@remote, 0x8}]}, @cipso={0x86, 0x28, 0xffffffffffffffff, [{0x6, 0xc, "b677369bb1bb49249cd3"}, {0x1, 0x6, "e1bb7f0e"}, {0x6, 0x10, "f959940da559fb72fc11ef1008c6"}]}, @timestamp_addr={0x44, 0x4c, 0x24, 0x1, 0x0, [{@remote, 0x8}, {@broadcast, 0x404000}, {@broadcast, 0x6}, {@multicast1, 0x7fff}, {@rand_addr=0x64010102, 0x4}, {@empty, 0x81}, {@dev={0xac, 0x14, 0x14, 0x41}, 0x4}, {@broadcast, 0x20}, {@multicast2, 0xdf}]}]}}}}})
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000740)={&(0x7f0000000600)=@RTM_DELMDB={0x118, 0x55, 0x400, 0x70bd26, 0x25dfdbfb, {}, [@MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x0, 0x1, 0x4, {@ip4=@local, 0x86dd}}}, @MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x0, 0x1, 0x3, {@ip4=@local, 0x8edd}}}, @MDBA_SET_ENTRY={0x20, 0x1, {r1, 0x0, 0x3, 0x3, {@in6_addr=@local, 0x8edd}}}, @MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x0, 0x1, 0x2, {@in6_addr=@private2, 0x800}}}, @MDBA_SET_ENTRY={0x20, 0x1, {r3, 0x1, 0x0, 0x3, {@ip4=@local, 0x86dd}}}, @MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x1, 0x2, 0x1, {@in6_addr=@private0, 0x55ce53ea8b739490}}}, @MDBA_SET_ENTRY={0x20, 0x1, {r4, 0x0, 0x0, 0x1, {@ip4=@local, 0xc00}}}, @MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x1, 0x3, 0x0, {@in6_addr=@ipv4={'\x00', '\xff\xff', @multicast1}, 0x800}}}]}, 0x118}, 0x1, 0x0, 0x0, 0x200080c0}, 0x4000000)
r6 = socket(0x0, 0x1, 0x0)
ioctl$EXT4_IOC_CHECKPOINT(r6, 0x4004662b, &(0x7f0000000100)=0x6)
sendmsg$nl_route(r6, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=@setneightbl={0x34, 0x43, 0x4, 0x70bd2a, 0x25dfdbfc, {0x7}, [@NDTA_GC_INTERVAL={0xc, 0x8, 0x5}, @NDTA_NAME={0x6, 0x1, ',\x00'}, @NDTA_GC_INTERVAL={0xc, 0x8, 0x400}]}, 0x34}, 0x1, 0x0, 0x0, 0x40004}, 0x4800)
r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000007c0)=ANY=[@ANYBLOB="4c0000001100030400000000199000000000000021d0765a757b5619242bab5ade11919f6e498416bf4b2c2f0fbd3ca10a587a825187c09e723e98a790a5a226cc70b1274890b6445ea1b628b1e07b16820ced22661ba116a79a33145ffcc88719595e2840f4b875d9819325a7574a6011a9a3bcf01b1a20", @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012800b0001006970766c616e00000c000280060002000000000008000500", @ANYRES32=r8, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r8, @ANYBLOB], 0x4c}}, 0x0)
[ 3405.945314][T28401] bridge0: port 3(ipvlan38) entered blocking state
[ 3405.951958][T28401] bridge0: port 3(ipvlan38) entered disabled state
[ 3405.972345][T28400] loop1: detected capacity change from 0 to 512
[ 3405.982038][T28400] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3405.989159][T28400] EXT4-fs (loop1): mount failed
22:07:00 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed4100000000f300d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3406.068722][T28410] FAULT_INJECTION: forcing a failure.
[ 3406.068722][T28410] name failslab, interval 1, probability 0, space 0, times 0
[ 3406.081439][T28410] CPU: 0 PID: 28410 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0
[ 3406.090236][T28410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3406.100401][T28410] Call Trace:
[ 3406.103676][T28410]
[ 3406.106631][T28410] dump_stack_lvl+0xd6/0x122
[ 3406.111231][T28410] dump_stack+0x11/0x1b
[ 3406.115396][T28410] should_fail+0x23c/0x250
[ 3406.119811][T28410] ? skb_clone+0x12c/0x1f0
[ 3406.124234][T28410] __should_failslab+0x81/0x90
[ 3406.129066][T28410] should_failslab+0x5/0x20
[ 3406.133632][T28410] kmem_cache_alloc+0x4f/0x320
[ 3406.138424][T28410] skb_clone+0x12c/0x1f0
[ 3406.142724][T28410] netlink_deliver_tap+0x2da/0x510
[ 3406.147937][T28410] netlink_dump+0x4ba/0x6b0
[ 3406.152516][T28410] netlink_recvmsg+0x486/0x810
[ 3406.157304][T28410] ? netlink_sendmsg+0x840/0x840
[ 3406.162250][T28410] ____sys_recvmsg+0x16c/0x320
[ 3406.167017][T28410] do_recvmmsg+0x3f5/0xae0
[ 3406.171438][T28410] ? cx23885_dif_setup+0xfd20/0x39870
[ 3406.177309][T28410] ? get_timespec64+0xff/0x130
[ 3406.182251][T28410] __x64_sys_recvmmsg+0xf5/0x160
[ 3406.187192][T28410] do_syscall_64+0x44/0xd0
[ 3406.191609][T28410] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3406.197530][T28410] RIP: 0033:0x7f553bc44af9
22:07:00 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x4600}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3406.201942][T28410] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3406.221805][T28410] RSP: 002b:00007f553b3bb188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 3406.230269][T28410] RAX: ffffffffffffffda RBX: 00007f553bd57f60 RCX: 00007f553bc44af9
[ 3406.238291][T28410] RDX: 04000000000003b4 RSI: 00000000200037c0 RDI: 0000000000000003
[ 3406.246319][T28410] RBP: 00007f553b3bb1d0 R08: 0000000020003700 R09: 0000000000000000
[ 3406.254292][T28410] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3406.262274][T28410] R13: 00007ffd3a6ac3af R14: 00007f553b3bb300 R15: 0000000000022000
[ 3406.270264][T28410]
[ 3406.278692][T28514] device batadv0 entered promiscuous mode
[ 3406.295032][T28517] loop2: detected capacity change from 0 to 264192
22:07:00 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0xa}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:00 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) (fail_nth: 59)
[ 3406.312387][T28514] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.4'.
[ 3406.322307][T28517] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3406.327429][T28513] device batadv0 left promiscuous mode
22:07:01 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0070100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:01 executing program 4:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x50, 0x0, 0x8, 0x70bd2b, 0x25dfdbfe, {}, [@GTPA_O_TEI={0x8, 0x9, 0x4}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_FLOW={0x6, 0x6, 0x4}, @GTPA_VERSION={0x8}, @GTPA_TID={0xc, 0x3, 0x3}, @GTPA_O_TEI={0x8, 0x9, 0x1}, @GTPA_I_TEI={0x8, 0x8, 0x1}]}, 0x50}, 0x1, 0x0, 0x0, 0x48004}, 0x10)
connect$unix(0xffffffffffffffff, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e)
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000140)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x4c}}, 0x0)
[ 3406.359971][T28514] device batadv0 entered promiscuous mode
[ 3406.381921][T28513] device batadv0 left promiscuous mode
22:07:01 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x4700}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:01 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0xb}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3406.425797][T28595] loop1: detected capacity change from 0 to 512
[ 3406.446074][T28595] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3406.452650][T28595] EXT4-fs (loop1): mount failed
[ 3406.474763][T28595] loop1: detected capacity change from 0 to 512
[ 3406.482852][T28595] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3406.491903][T28595] EXT4-fs (loop1): mount failed
[ 3406.502172][T28634] FAULT_INJECTION: forcing a failure.
[ 3406.502172][T28634] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 3406.515287][T28634] CPU: 1 PID: 28634 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0
[ 3406.524055][T28634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3406.534284][T28634] Call Trace:
[ 3406.537624][T28634]
[ 3406.540553][T28634] dump_stack_lvl+0xd6/0x122
[ 3406.545145][T28634] dump_stack+0x11/0x1b
[ 3406.549344][T28634] should_fail+0x23c/0x250
[ 3406.553750][T28634] should_fail_usercopy+0x16/0x20
[ 3406.558893][T28634] _copy_from_user+0x1c/0xd0
[ 3406.563644][T28634] do_recvmmsg+0x2c3/0xae0
[ 3406.568104][T28634] ? cx23885_dif_setup+0xfd20/0x39870
[ 3406.573481][T28634] ? get_timespec64+0xff/0x130
[ 3406.578373][T28634] __x64_sys_recvmmsg+0xf5/0x160
[ 3406.583830][T28634] do_syscall_64+0x44/0xd0
[ 3406.588279][T28634] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3406.594310][T28634] RIP: 0033:0x7f553bc44af9
[ 3406.598724][T28634] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3406.618326][T28634] RSP: 002b:00007f553b3bb188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
22:07:01 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) (fail_nth: 60)
22:07:01 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed4100000000f400d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3406.626742][T28634] RAX: ffffffffffffffda RBX: 00007f553bd57f60 RCX: 00007f553bc44af9
[ 3406.634727][T28634] RDX: 04000000000003b4 RSI: 00000000200037c0 RDI: 0000000000000003
[ 3406.642700][T28634] RBP: 00007f553b3bb1d0 R08: 0000000020003700 R09: 0000000000000000
[ 3406.650769][T28634] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3406.658731][T28634] R13: 00007ffd3a6ac3af R14: 00007f553b3bb300 R15: 0000000000022000
[ 3406.666955][T28634]
[ 3406.699234][T28636] bridge0: port 3(ipvlan38) entered blocking state
[ 3406.706050][T28636] bridge0: port 3(ipvlan38) entered disabled state
[ 3406.715161][T28637] loop2: detected capacity change from 0 to 264192
[ 3406.730079][T28637] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:01 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0080100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3406.758444][T28640] bridge0: port 3(ipvlan38) entered blocking state
[ 3406.765029][T28640] bridge0: port 3(ipvlan38) entered disabled state
22:07:01 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00')
bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x13, 0x9, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1ae3, 0x0, 0x0, 0x0, 0x80000001}, [@ldst={0x3, 0x1, 0x3, 0x9, 0x6, 0x2, 0x1c}, @exit, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}, @generic={0x1, 0x0, 0x2, 0xf001, 0xffffffff}, @jmp={0x5, 0x0, 0x8, 0x8, 0x1, 0x18, 0xfffffffffffffffc}]}, &(0x7f0000000080)='syzkaller\x00', 0x8, 0x16, &(0x7f0000000100)=""/22, 0x41100, 0x10, '\x00', r1, 0x12, r2, 0x8, &(0x7f0000000240)={0x3, 0x4}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x10, 0x8, 0x5}, 0x10, 0xffffffffffffffff, r2}, 0x78)
r3 = socket(0x11, 0x800000003, 0x0)
ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0})
setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000140)={r4, 0x1, 0x6, @remote}, 0x10)
setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000180)={r4, 0x2, 0x6, @remote}, 0x10)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f00000000c0)={'syztnl0\x00', r4, 0x29, 0x9, 0x1, 0x5, 0x33, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @loopback, 0x8, 0x40, 0x7f, 0x6}})
ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f00000004c0)={'gretap0\x00', &(0x7f00000003c0)={'ip_vti0\x00', r5, 0x80, 0x7, 0xd6, 0x2648, {{0x2c, 0x4, 0x3, 0x2f, 0xb0, 0x64, 0x0, 0x0, 0x4, 0x0, @local, @rand_addr=0x64010102, {[@lsrr={0x83, 0x23, 0x6b, [@dev={0xac, 0x14, 0x14, 0x38}, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, @local, @broadcast, @remote, @local, @empty]}, @ra={0x94, 0x4}, @timestamp_addr={0x44, 0x24, 0x81, 0x1, 0x4, [{@empty, 0x8}, {@remote, 0x2}, {@remote}, {@dev={0xac, 0x14, 0x14, 0x13}, 0x4}]}, @ssrr={0x89, 0x13, 0x90, [@dev={0xac, 0x14, 0x14, 0x1a}, @private=0xa010101, @remote, @local]}, @lsrr={0x83, 0x17, 0xf4, [@private=0xa010102, @local, @private=0xa010100, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @noop, @timestamp_prespec={0x44, 0x24, 0x65, 0x3, 0x8, [{@broadcast, 0xfffffff8}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0xfffffff9}, {@broadcast, 0x14000000}, {@empty, 0x110}]}]}}}}})
sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000500)=@setlink={0x44, 0x13, 0x300, 0x70bd27, 0x25dfdbfe, {0x0, 0x0, 0x0, r4, 0x8}, [@IFLA_LINK={0x8, 0x5, r6}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x80000001}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan0\x00'}]}, 0x44}}, 0x0)
22:07:01 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0xc}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:01 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x4788}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3406.887397][T28745] FAULT_INJECTION: forcing a failure.
[ 3406.887397][T28745] name failslab, interval 1, probability 0, space 0, times 0
[ 3406.900132][T28745] CPU: 1 PID: 28745 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0
[ 3406.908905][T28745] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3406.919048][T28745] Call Trace:
[ 3406.922393][T28745]
[ 3406.925319][T28745] dump_stack_lvl+0xd6/0x122
[ 3406.929943][T28745] dump_stack+0x11/0x1b
[ 3406.934133][T28745] should_fail+0x23c/0x250
[ 3406.938661][T28745] __should_failslab+0x81/0x90
[ 3406.943449][T28745] should_failslab+0x5/0x20
[ 3406.948021][T28745] kmem_cache_alloc_node+0x61/0x2d0
[ 3406.953239][T28745] ? __alloc_skb+0xf0/0x450
[ 3406.957772][T28745] __alloc_skb+0xf0/0x450
[ 3406.962098][T28745] netlink_dump+0x118/0x6b0
[ 3406.966607][T28745] ? __kfree_skb+0xfe/0x150
[ 3406.971199][T28745] netlink_recvmsg+0x486/0x810
[ 3406.975969][T28745] ? xfd_validate_state+0x4e/0xf0
[ 3406.980992][T28745] ? netlink_sendmsg+0x840/0x840
[ 3406.986025][T28745] ____sys_recvmsg+0x16c/0x320
[ 3406.990785][T28745] do_recvmmsg+0x3f5/0xae0
[ 3406.995215][T28745] ? cx23885_dif_setup+0xfd20/0x39870
[ 3407.000687][T28745] ? get_timespec64+0xff/0x130
[ 3407.005460][T28745] __x64_sys_recvmmsg+0xf5/0x160
[ 3407.010401][T28745] do_syscall_64+0x44/0xd0
[ 3407.014831][T28745] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3407.020725][T28745] RIP: 0033:0x7f553bc44af9
[ 3407.025133][T28745] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3407.044804][T28745] RSP: 002b:00007f553b3bb188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 3407.053281][T28745] RAX: ffffffffffffffda RBX: 00007f553bd57f60 RCX: 00007f553bc44af9
[ 3407.061406][T28745] RDX: 04000000000003b4 RSI: 00000000200037c0 RDI: 0000000000000003
[ 3407.069382][T28745] RBP: 00007f553b3bb1d0 R08: 0000000020003700 R09: 0000000000000000
[ 3407.077349][T28745] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
22:07:01 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) (fail_nth: 61)
[ 3407.085313][T28745] R13: 00007ffd3a6ac3af R14: 00007f553b3bb300 R15: 0000000000022000
[ 3407.093353][T28745]
[ 3407.153006][T28750] loop1: detected capacity change from 0 to 512
[ 3407.170284][T28750] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3407.176867][T28750] EXT4-fs (loop1): mount failed
[ 3407.180669][T28752] loop2: detected capacity change from 0 to 264192
22:07:01 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0xf}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:01 executing program 4:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x280b}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3407.201170][T28754] device batadv0 entered promiscuous mode
[ 3407.208451][T28752] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3407.208995][T28749] device batadv0 left promiscuous mode
[ 3407.229651][T28754] device batadv0 entered promiscuous mode
[ 3407.236848][T28750] loop1: detected capacity change from 0 to 512
[ 3407.245184][T28749] device batadv0 left promiscuous mode
[ 3407.257223][T28750] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3407.266593][T28750] EXT4-fs (loop1): mount failed
[ 3407.267199][T28759] FAULT_INJECTION: forcing a failure.
[ 3407.267199][T28759] name failslab, interval 1, probability 0, space 0, times 0
[ 3407.284113][T28759] CPU: 1 PID: 28759 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0
[ 3407.292962][T28759] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3407.303016][T28759] Call Trace:
[ 3407.306291][T28759]
[ 3407.309213][T28759] dump_stack_lvl+0xd6/0x122
[ 3407.313823][T28759] dump_stack+0x11/0x1b
[ 3407.318178][T28759] should_fail+0x23c/0x250
[ 3407.322592][T28759] __should_failslab+0x81/0x90
[ 3407.327447][T28759] should_failslab+0x5/0x20
[ 3407.332028][T28759] kmem_cache_alloc_node_trace+0x61/0x310
[ 3407.337746][T28759] ? __kmalloc_node_track_caller+0x30/0x40
[ 3407.343587][T28759] __kmalloc_node_track_caller+0x30/0x40
[ 3407.349219][T28759] ? netlink_dump+0x118/0x6b0
[ 3407.353981][T28759] __alloc_skb+0x19d/0x450
[ 3407.358409][T28759] netlink_dump+0x118/0x6b0
[ 3407.362948][T28759] ? __kfree_skb+0xfe/0x150
[ 3407.367511][T28759] netlink_recvmsg+0x486/0x810
[ 3407.372284][T28759] ? netlink_sendmsg+0x840/0x840
[ 3407.377223][T28759] ____sys_recvmsg+0x16c/0x320
[ 3407.381992][T28759] do_recvmmsg+0x3f5/0xae0
[ 3407.386407][T28759] ? cx23885_dif_setup+0xfd20/0x39870
[ 3407.391788][T28759] ? get_timespec64+0xff/0x130
[ 3407.396550][T28759] __x64_sys_recvmmsg+0xf5/0x160
[ 3407.402099][T28759] do_syscall_64+0x44/0xd0
[ 3407.406515][T28759] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3407.412409][T28759] RIP: 0033:0x7f553bc44af9
[ 3407.416818][T28759] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3407.436419][T28759] RSP: 002b:00007f553b3bb188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 3407.445008][T28759] RAX: ffffffffffffffda RBX: 00007f553bd57f60 RCX: 00007f553bc44af9
22:07:02 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0090100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3407.452997][T28759] RDX: 04000000000003b4 RSI: 00000000200037c0 RDI: 0000000000000003
[ 3407.460965][T28759] RBP: 00007f553b3bb1d0 R08: 0000000020003700 R09: 0000000000000000
[ 3407.468934][T28759] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3407.476901][T28759] R13: 00007ffd3a6ac3af R14: 00007f553b3bb300 R15: 0000000000022000
[ 3407.484870][T28759]
22:07:02 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) (fail_nth: 62)
22:07:02 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed4100000000f500d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:02 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x10}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:02 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x4800}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:02 executing program 4:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xb28}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3407.676214][T28866] loop2: detected capacity change from 0 to 264192
[ 3407.695409][T28866] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3407.728423][T28870] FAULT_INJECTION: forcing a failure.
[ 3407.728423][T28870] name failslab, interval 1, probability 0, space 0, times 0
[ 3407.741107][T28870] CPU: 1 PID: 28870 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0
[ 3407.749875][T28870] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3407.759921][T28870] Call Trace:
[ 3407.763195][T28870]
[ 3407.766160][T28870] dump_stack_lvl+0xd6/0x122
[ 3407.770810][T28870] dump_stack+0x11/0x1b
[ 3407.774962][T28870] should_fail+0x23c/0x250
[ 3407.779447][T28870] ? skb_clone+0x12c/0x1f0
[ 3407.783862][T28870] __should_failslab+0x81/0x90
[ 3407.788684][T28870] should_failslab+0x5/0x20
[ 3407.793216][T28870] kmem_cache_alloc+0x4f/0x320
[ 3407.797976][T28870] skb_clone+0x12c/0x1f0
[ 3407.802261][T28870] netlink_deliver_tap+0x2da/0x510
[ 3407.807385][T28870] netlink_dump+0x4ba/0x6b0
[ 3407.811912][T28870] netlink_recvmsg+0x486/0x810
[ 3407.816679][T28870] ? xfd_validate_state+0x4e/0xf0
[ 3407.821708][T28870] ? netlink_sendmsg+0x840/0x840
[ 3407.826706][T28870] ____sys_recvmsg+0x16c/0x320
[ 3407.831504][T28870] do_recvmmsg+0x3f5/0xae0
[ 3407.835919][T28870] ? cx23885_dif_setup+0xfd20/0x39870
[ 3407.841339][T28870] ? get_timespec64+0xff/0x130
[ 3407.846181][T28870] __x64_sys_recvmmsg+0xf5/0x160
[ 3407.851115][T28870] do_syscall_64+0x44/0xd0
[ 3407.855536][T28870] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3407.861466][T28870] RIP: 0033:0x7f553bc44af9
[ 3407.865964][T28870] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3407.885651][T28870] RSP: 002b:00007f553b3bb188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 3407.894063][T28870] RAX: ffffffffffffffda RBX: 00007f553bd57f60 RCX: 00007f553bc44af9
[ 3407.902032][T28870] RDX: 04000000000003b4 RSI: 00000000200037c0 RDI: 0000000000000003
[ 3407.910027][T28870] RBP: 00007f553b3bb1d0 R08: 0000000020003700 R09: 0000000000000000
[ 3407.918032][T28870] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
22:07:02 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc00a0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:02 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x11}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3407.926010][T28870] R13: 00007ffd3a6ac3af R14: 00007f553b3bb300 R15: 0000000000022000
[ 3407.934039][T28870]
22:07:02 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) (fail_nth: 63)
22:07:02 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x480b}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3408.036230][T28878] loop1: detected capacity change from 0 to 512
[ 3408.053335][T28878] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3408.063608][T28878] EXT4-fs (loop1): mount failed
22:07:02 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x60}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3408.118735][T28878] loop1: detected capacity change from 0 to 512
[ 3408.140645][T28980] loop2: detected capacity change from 0 to 264192
22:07:02 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r2, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
r3 = dup(r0)
r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)=""/172, 0x198, 0xac, 0x1}, 0x20)
ftruncate(r4, 0xffffffffffffff80)
sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000040)=@newlink={0x54, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_PHYS_SWITCH_ID={0x22, 0x24, "c01b5f686d8ccaf87414ce0394aa0efffc4f00e7e98c22b3113f762ae772"}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x54}}, 0x0)
set_mempolicy(0x3, &(0x7f0000000100)=0xee, 0x9)
[ 3408.168022][T28980] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3408.179231][T28878] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3408.190594][T28984] FAULT_INJECTION: forcing a failure.
[ 3408.190594][T28984] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 3408.203696][T28984] CPU: 0 PID: 28984 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0
[ 3408.212994][T28984] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3408.223079][T28984] Call Trace:
[ 3408.226364][T28984]
[ 3408.229293][T28984] dump_stack_lvl+0xd6/0x122
[ 3408.233889][T28984] dump_stack+0x11/0x1b
[ 3408.238052][T28984] should_fail+0x23c/0x250
[ 3408.242530][T28984] should_fail_usercopy+0x16/0x20
[ 3408.247555][T28984] _copy_from_user+0x1c/0xd0
[ 3408.252217][T28984] do_recvmmsg+0x2c3/0xae0
[ 3408.256675][T28984] ? get_timespec64+0xff/0x130
[ 3408.261490][T28984] __x64_sys_recvmmsg+0xf5/0x160
[ 3408.266488][T28984] do_syscall_64+0x44/0xd0
[ 3408.270999][T28984] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3408.276931][T28984] RIP: 0033:0x7f553bc44af9
[ 3408.281743][T28984] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3408.300393][T28878] EXT4-fs (loop1): mount failed
[ 3408.301482][T28984] RSP: 002b:00007f553b3bb188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
22:07:03 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc00b0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:03 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) (fail_nth: 64)
[ 3408.301505][T28984] RAX: ffffffffffffffda RBX: 00007f553bd57f60 RCX: 00007f553bc44af9
[ 3408.301518][T28984] RDX: 04000000000003b4 RSI: 00000000200037c0 RDI: 0000000000000003
[ 3408.330815][T28984] RBP: 00007f553b3bb1d0 R08: 0000000020003700 R09: 0000000000000000
[ 3408.338793][T28984] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3408.346845][T28984] R13: 00007ffd3a6ac3af R14: 00007f553b3bb300 R15: 0000000000022000
[ 3408.354815][T28984]
22:07:03 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed4100000000f600d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:03 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r2, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
r3 = dup(r0)
r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)=""/172, 0x198, 0xac, 0x1}, 0x20)
ftruncate(r4, 0xffffffffffffff80)
sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000040)=@newlink={0x54, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_PHYS_SWITCH_ID={0x22, 0x24, "c01b5f686d8ccaf87414ce0394aa0efffc4f00e7e98c22b3113f762ae772"}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x54}}, 0x0)
set_mempolicy(0x3, &(0x7f0000000100)=0xee, 0x9)
22:07:03 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x300}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:03 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x4888}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:03 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x500}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3408.487925][T29097] loop2: detected capacity change from 0 to 264192
[ 3408.509984][T29097] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3408.512653][T29099] FAULT_INJECTION: forcing a failure.
[ 3408.512653][T29099] name failslab, interval 1, probability 0, space 0, times 0
[ 3408.530670][T29099] CPU: 0 PID: 29099 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0
[ 3408.539479][T29099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3408.549875][T29099] Call Trace:
[ 3408.553145][T29099]
[ 3408.556066][T29099] dump_stack_lvl+0xd6/0x122
[ 3408.560655][T29099] dump_stack+0x11/0x1b
[ 3408.564887][T29099] should_fail+0x23c/0x250
[ 3408.569298][T29099] __should_failslab+0x81/0x90
[ 3408.574065][T29099] should_failslab+0x5/0x20
[ 3408.578570][T29099] kmem_cache_alloc_node+0x61/0x2d0
[ 3408.583770][T29099] ? __alloc_skb+0xf0/0x450
[ 3408.588354][T29099] __alloc_skb+0xf0/0x450
[ 3408.592697][T29099] netlink_dump+0x118/0x6b0
[ 3408.597198][T29099] ? __kfree_skb+0xfe/0x150
[ 3408.601723][T29099] netlink_recvmsg+0x486/0x810
[ 3408.606494][T29099] ? xfd_validate_state+0x4e/0xf0
[ 3408.611587][T29099] ? netlink_sendmsg+0x840/0x840
[ 3408.616617][T29099] ____sys_recvmsg+0x16c/0x320
[ 3408.621381][T29099] do_recvmmsg+0x3f5/0xae0
[ 3408.625793][T29099] ? cx23885_dif_setup+0xfd20/0x39870
[ 3408.631234][T29099] ? get_timespec64+0xff/0x130
[ 3408.636049][T29099] __x64_sys_recvmmsg+0xf5/0x160
[ 3408.641071][T29099] do_syscall_64+0x44/0xd0
[ 3408.645480][T29099] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3408.651451][T29099] RIP: 0033:0x7f553bc44af9
[ 3408.655859][T29099] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3408.675503][T29099] RSP: 002b:00007f553b3bb188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
22:07:03 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc00c0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:03 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) (fail_nth: 65)
[ 3408.683937][T29099] RAX: ffffffffffffffda RBX: 00007f553bd57f60 RCX: 00007f553bc44af9
[ 3408.691907][T29099] RDX: 04000000000003b4 RSI: 00000000200037c0 RDI: 0000000000000003
[ 3408.699877][T29099] RBP: 00007f553b3bb1d0 R08: 0000000020003700 R09: 0000000000000000
[ 3408.707927][T29099] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3408.715915][T29099] R13: 00007ffd3a6ac3af R14: 00007f553b3bb300 R15: 0000000000022000
[ 3408.723910][T29099]
22:07:03 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r2, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
r3 = dup(r0)
r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)=""/172, 0x198, 0xac, 0x1}, 0x20)
ftruncate(r4, 0xffffffffffffff80)
sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000040)=@newlink={0x54, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_PHYS_SWITCH_ID={0x22, 0x24, "c01b5f686d8ccaf87414ce0394aa0efffc4f00e7e98c22b3113f762ae772"}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x54}}, 0x0)
set_mempolicy(0x3, &(0x7f0000000100)=0xee, 0x9)
22:07:03 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x600}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3408.822810][T29103] loop1: detected capacity change from 0 to 512
[ 3408.855787][T29103] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3408.882241][T29103] EXT4-fs (loop1): mount failed
[ 3408.900071][T29157] FAULT_INJECTION: forcing a failure.
[ 3408.900071][T29157] name failslab, interval 1, probability 0, space 0, times 0
[ 3408.912827][T29157] CPU: 0 PID: 29157 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0
[ 3408.921597][T29157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3408.931688][T29157] Call Trace:
[ 3408.934970][T29157]
[ 3408.937982][T29157] dump_stack_lvl+0xd6/0x122
[ 3408.942586][T29157] dump_stack+0x11/0x1b
[ 3408.946741][T29157] should_fail+0x23c/0x250
[ 3408.951157][T29157] __should_failslab+0x81/0x90
[ 3408.955969][T29157] should_failslab+0x5/0x20
[ 3408.960475][T29157] kmem_cache_alloc_node_trace+0x61/0x310
[ 3408.966189][T29157] ? __kmalloc_node_track_caller+0x30/0x40
[ 3408.972151][T29157] __kmalloc_node_track_caller+0x30/0x40
[ 3408.977781][T29157] ? netlink_dump+0x118/0x6b0
[ 3408.982480][T29157] __alloc_skb+0x19d/0x450
[ 3408.986907][T29157] netlink_dump+0x118/0x6b0
[ 3408.991477][T29157] ? __kfree_skb+0xfe/0x150
[ 3408.996000][T29157] netlink_recvmsg+0x486/0x810
[ 3409.000810][T29157] ? xfd_validate_state+0x4e/0xf0
[ 3409.005848][T29157] ? netlink_sendmsg+0x840/0x840
[ 3409.010790][T29157] ____sys_recvmsg+0x16c/0x320
[ 3409.015747][T29157] do_recvmmsg+0x3f5/0xae0
[ 3409.020176][T29157] ? cx23885_dif_setup+0xfd20/0x39870
[ 3409.025611][T29157] ? get_timespec64+0xff/0x130
22:07:03 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x4c00}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3409.030441][T29157] __x64_sys_recvmmsg+0xf5/0x160
[ 3409.035568][T29157] do_syscall_64+0x44/0xd0
[ 3409.039981][T29157] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3409.045880][T29157] RIP: 0033:0x7f553bc44af9
[ 3409.050366][T29157] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3409.069998][T29157] RSP: 002b:00007f553b3bb188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 3409.078412][T29157] RAX: ffffffffffffffda RBX: 00007f553bd57f60 RCX: 00007f553bc44af9
[ 3409.086367][T29157] RDX: 04000000000003b4 RSI: 00000000200037c0 RDI: 0000000000000003
[ 3409.094334][T29157] RBP: 00007f553b3bb1d0 R08: 0000000020003700 R09: 0000000000000000
[ 3409.102362][T29157] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3409.110315][T29157] R13: 00007ffd3a6ac3af R14: 00007f553b3bb300 R15: 0000000000022000
[ 3409.118271][T29157]
[ 3409.127542][T29212] loop2: detected capacity change from 0 to 264192
22:07:03 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) (fail_nth: 66)
22:07:03 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc00d0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3409.157180][T29212] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3409.176693][T29103] loop1: detected capacity change from 0 to 512
[ 3409.185453][T29103] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3409.197161][T29103] EXT4-fs (loop1): mount failed
22:07:03 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed4100000000f700d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:03 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r2, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
r3 = dup(r0)
r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb0100180000000000000076010000760100000800000001000000060000040900000007000000040000000300000006000000020000005ba600000300000000000000090000000f000000050000006bfcffff0e000000040000000200000005000000050000003f0000000900000002000084d5f1ffff0e00000005000000050000000700000002000000020000000200000007000005000800000900000002000000c20000000f00000004000000040000000000000005000000000000000600000003000000090000000100000001000000090000000d00000001000000ff0100000c00000004000000ff0700000b00000000000009000000130600000000000008040000000e0000000200000f02000000020000000400000003000000020000000100000000000000e2720300000000000007000000000b0000000000000c010000000c0000000000000a0300000009000000040000844ef10004000d0000000500000001800000050000000e000000030000006748000000000030305f006130000000000000000000"], &(0x7f0000000140)=""/172, 0x198, 0xac, 0x1}, 0x20)
ftruncate(r4, 0xffffffffffffff80)
sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000040)=@newlink={0x54, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_PHYS_SWITCH_ID={0x22, 0x24, "c01b5f686d8ccaf87414ce0394aa0efffc4f00e7e98c22b3113f762ae772"}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x54}}, 0x0)
22:07:03 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x700}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3409.356888][T29236] FAULT_INJECTION: forcing a failure.
[ 3409.356888][T29236] name failslab, interval 1, probability 0, space 0, times 0
[ 3409.369560][T29236] CPU: 0 PID: 29236 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0
[ 3409.378327][T29236] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3409.388466][T29236] Call Trace:
[ 3409.391784][T29236]
[ 3409.394713][T29236] dump_stack_lvl+0xd6/0x122
[ 3409.399307][T29236] dump_stack+0x11/0x1b
[ 3409.403458][T29236] should_fail+0x23c/0x250
[ 3409.407909][T29236] ? skb_clone+0x12c/0x1f0
[ 3409.412341][T29236] __should_failslab+0x81/0x90
[ 3409.417105][T29236] should_failslab+0x5/0x20
[ 3409.421638][T29236] kmem_cache_alloc+0x4f/0x320
[ 3409.426519][T29236] skb_clone+0x12c/0x1f0
[ 3409.430769][T29236] netlink_deliver_tap+0x2da/0x510
[ 3409.435887][T29236] netlink_dump+0x4ba/0x6b0
[ 3409.440406][T29236] netlink_recvmsg+0x486/0x810
[ 3409.445207][T29236] ? netlink_sendmsg+0x840/0x840
[ 3409.450144][T29236] ____sys_recvmsg+0x16c/0x320
[ 3409.454899][T29236] do_recvmmsg+0x3f5/0xae0
[ 3409.459313][T29236] ? cx23885_dif_setup+0xfd20/0x39870
[ 3409.464763][T29236] ? get_timespec64+0xff/0x130
[ 3409.469561][T29236] __x64_sys_recvmmsg+0xf5/0x160
[ 3409.474498][T29236] do_syscall_64+0x44/0xd0
[ 3409.479069][T29236] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3409.484970][T29236] RIP: 0033:0x7f553bc44af9
[ 3409.489377][T29236] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3409.509184][T29236] RSP: 002b:00007f553b3bb188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 3409.517596][T29236] RAX: ffffffffffffffda RBX: 00007f553bd57f60 RCX: 00007f553bc44af9
[ 3409.525561][T29236] RDX: 04000000000003b4 RSI: 00000000200037c0 RDI: 0000000000000003
[ 3409.533521][T29236] RBP: 00007f553b3bb1d0 R08: 0000000020003700 R09: 0000000000000000
[ 3409.541508][T29236] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3409.549470][T29236] R13: 00007ffd3a6ac3af R14: 00007f553b3bb300 R15: 0000000000022000
22:07:04 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x560f}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3409.557565][T29236]
22:07:04 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) (fail_nth: 67)
22:07:04 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc00e0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:04 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00'})
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r1, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
dup(r0)
r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)=""/172, 0x198, 0xac, 0x1}, 0x20)
ftruncate(r2, 0xffffffffffffff80)
22:07:04 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x900}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3409.578530][T29322] loop2: detected capacity change from 0 to 264192
[ 3409.599633][T29322] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3409.668185][T29329] loop1: detected capacity change from 0 to 512
[ 3409.689441][T29329] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3409.698767][T29329] EXT4-fs (loop1): mount failed
[ 3409.734175][T29333] FAULT_INJECTION: forcing a failure.
[ 3409.734175][T29333] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 3409.747337][T29333] CPU: 0 PID: 29333 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0
[ 3409.756228][T29333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3409.766297][T29333] Call Trace:
[ 3409.769577][T29333]
[ 3409.772502][T29333] dump_stack_lvl+0xd6/0x122
[ 3409.777134][T29333] dump_stack+0x11/0x1b
22:07:04 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0xa00}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3409.781355][T29333] should_fail+0x23c/0x250
[ 3409.785769][T29333] should_fail_usercopy+0x16/0x20
[ 3409.790798][T29333] _copy_from_user+0x1c/0xd0
[ 3409.795428][T29333] do_recvmmsg+0x2c3/0xae0
[ 3409.799844][T29333] ? cx23885_dif_setup+0xfd20/0x39870
[ 3409.805221][T29333] ? get_timespec64+0xff/0x130
[ 3409.809985][T29333] __x64_sys_recvmmsg+0xf5/0x160
[ 3409.815001][T29333] do_syscall_64+0x44/0xd0
[ 3409.819442][T29333] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3409.825335][T29333] RIP: 0033:0x7f553bc44af9
[ 3409.830160][T29333] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3409.832040][T29329] loop1: detected capacity change from 0 to 512
[ 3409.849778][T29333] RSP: 002b:00007f553b3bb188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 3409.849844][T29333] RAX: ffffffffffffffda RBX: 00007f553bd57f60 RCX: 00007f553bc44af9
[ 3409.872420][T29333] RDX: 04000000000003b4 RSI: 00000000200037c0 RDI: 0000000000000003
22:07:04 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x5865}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:04 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) (fail_nth: 68)
[ 3409.880414][T29333] RBP: 00007f553b3bb1d0 R08: 0000000020003700 R09: 0000000000000000
[ 3409.888388][T29333] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3409.896435][T29333] R13: 00007ffd3a6ac3af R14: 00007f553b3bb300 R15: 0000000000022000
[ 3409.904404][T29333]
[ 3409.919042][T29329] EXT4-fs: failed to create workqueue
[ 3409.924477][T29329] EXT4-fs (loop1): mount failed
22:07:04 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0xb00}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:04 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed4100000000f800d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:04 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00'})
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r1, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
dup(r0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)=""/172, 0x198, 0xac, 0x1}, 0x20)
22:07:04 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc00f0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3409.948438][T29441] loop2: detected capacity change from 0 to 264192
[ 3409.970201][T29441] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3410.050158][T29446] FAULT_INJECTION: forcing a failure.
[ 3410.050158][T29446] name failslab, interval 1, probability 0, space 0, times 0
[ 3410.062848][T29446] CPU: 1 PID: 29446 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0
[ 3410.071616][T29446] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3410.081661][T29446] Call Trace:
[ 3410.084934][T29446]
[ 3410.087858][T29446] dump_stack_lvl+0xd6/0x122
[ 3410.092459][T29446] dump_stack+0x11/0x1b
[ 3410.096603][T29446] should_fail+0x23c/0x250
[ 3410.101022][T29446] __should_failslab+0x81/0x90
[ 3410.105781][T29446] should_failslab+0x5/0x20
[ 3410.110279][T29446] kmem_cache_alloc_node+0x61/0x2d0
[ 3410.115470][T29446] ? __alloc_skb+0xf0/0x450
[ 3410.119972][T29446] __alloc_skb+0xf0/0x450
[ 3410.124318][T29446] netlink_dump+0x118/0x6b0
[ 3410.128828][T29446] ? __kfree_skb+0xfe/0x150
[ 3410.133334][T29446] netlink_recvmsg+0x486/0x810
[ 3410.138099][T29446] ? xfd_validate_state+0x4e/0xf0
[ 3410.143133][T29446] ? netlink_sendmsg+0x840/0x840
[ 3410.148084][T29446] ____sys_recvmsg+0x16c/0x320
[ 3410.152936][T29446] do_recvmmsg+0x3f5/0xae0
[ 3410.157355][T29446] ? cx23885_dif_setup+0xfd20/0x39870
[ 3410.162738][T29446] ? get_timespec64+0xff/0x130
[ 3410.167499][T29446] __x64_sys_recvmmsg+0xf5/0x160
[ 3410.172443][T29446] do_syscall_64+0x44/0xd0
[ 3410.176876][T29446] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3410.182768][T29446] RIP: 0033:0x7f553bc44af9
[ 3410.187179][T29446] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3410.206779][T29446] RSP: 002b:00007f553b3bb188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 3410.215262][T29446] RAX: ffffffffffffffda RBX: 00007f553bd57f60 RCX: 00007f553bc44af9
[ 3410.223284][T29446] RDX: 04000000000003b4 RSI: 00000000200037c0 RDI: 0000000000000003
[ 3410.231341][T29446] RBP: 00007f553b3bb1d0 R08: 0000000020003700 R09: 0000000000000000
[ 3410.239389][T29446] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3410.247365][T29446] R13: 00007ffd3a6ac3af R14: 00007f553b3bb300 R15: 0000000000022000
[ 3410.255332][T29446]
22:07:04 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) (fail_nth: 69)
22:07:04 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0xc00}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:04 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x6000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:05 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00'})
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r1, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
dup(r0)
[ 3410.463535][T29553] loop1: detected capacity change from 0 to 512
[ 3410.483826][T29554] loop2: detected capacity change from 0 to 264192
[ 3410.499578][T29553] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3410.507212][T29554] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:05 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0100100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3410.515598][T29553] EXT4-fs (loop1): mount failed
[ 3410.549510][T29559] FAULT_INJECTION: forcing a failure.
[ 3410.549510][T29559] name failslab, interval 1, probability 0, space 0, times 0
[ 3410.562247][T29559] CPU: 0 PID: 29559 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0
[ 3410.571101][T29559] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3410.581161][T29559] Call Trace:
[ 3410.584431][T29559]
[ 3410.587360][T29559] dump_stack_lvl+0xd6/0x122
[ 3410.591958][T29559] dump_stack+0x11/0x1b
[ 3410.596115][T29559] should_fail+0x23c/0x250
[ 3410.600525][T29559] __should_failslab+0x81/0x90
[ 3410.605300][T29559] should_failslab+0x5/0x20
[ 3410.609801][T29559] kmem_cache_alloc_node_trace+0x61/0x310
[ 3410.615603][T29559] ? __kmalloc_node_track_caller+0x30/0x40
[ 3410.621427][T29559] __kmalloc_node_track_caller+0x30/0x40
[ 3410.627067][T29559] ? netlink_dump+0x118/0x6b0
[ 3410.631838][T29559] __alloc_skb+0x19d/0x450
[ 3410.636323][T29559] netlink_dump+0x118/0x6b0
[ 3410.640897][T29559] ? __kfree_skb+0xfe/0x150
[ 3410.645402][T29559] netlink_recvmsg+0x486/0x810
[ 3410.650185][T29559] ? xfd_validate_state+0x4e/0xf0
[ 3410.655211][T29559] ? netlink_sendmsg+0x840/0x840
[ 3410.660147][T29559] ____sys_recvmsg+0x16c/0x320
[ 3410.664905][T29559] do_recvmmsg+0x3f5/0xae0
[ 3410.669315][T29559] ? cx23885_dif_setup+0xfd20/0x39870
[ 3410.674691][T29559] ? get_timespec64+0xff/0x130
[ 3410.679468][T29559] __x64_sys_recvmmsg+0xf5/0x160
[ 3410.684433][T29559] do_syscall_64+0x44/0xd0
[ 3410.688848][T29559] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3410.694744][T29559] RIP: 0033:0x7f553bc44af9
[ 3410.699145][T29559] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3410.718746][T29559] RSP: 002b:00007f553b3bb188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 3410.727204][T29559] RAX: ffffffffffffffda RBX: 00007f553bd57f60 RCX: 00007f553bc44af9
[ 3410.735177][T29559] RDX: 04000000000003b4 RSI: 00000000200037c0 RDI: 0000000000000003
22:07:05 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0xf00}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3410.743149][T29559] RBP: 00007f553b3bb1d0 R08: 0000000020003700 R09: 0000000000000000
[ 3410.751124][T29559] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3410.759146][T29559] R13: 00007ffd3a6ac3af R14: 00007f553b3bb300 R15: 0000000000022000
[ 3410.767158][T29559]
22:07:05 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) (fail_nth: 70)
22:07:05 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x600b}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:05 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00'})
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r1, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
[ 3410.858556][T29553] loop1: detected capacity change from 0 to 512
[ 3410.868192][T29553] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3410.875686][T29553] EXT4-fs (loop1): mount failed
22:07:05 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed4100000000f900d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:05 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x1100}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3410.939503][T29667] loop2: detected capacity change from 0 to 264192
[ 3410.958393][T29667] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3410.985373][T29670] FAULT_INJECTION: forcing a failure.
[ 3410.985373][T29670] name failslab, interval 1, probability 0, space 0, times 0
[ 3410.998052][T29670] CPU: 1 PID: 29670 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0
[ 3411.006877][T29670] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3411.016946][T29670] Call Trace:
[ 3411.020218][T29670]
[ 3411.023137][T29670] dump_stack_lvl+0xd6/0x122
[ 3411.027808][T29670] dump_stack+0x11/0x1b
[ 3411.032040][T29670] should_fail+0x23c/0x250
[ 3411.036455][T29670] ? skb_clone+0x12c/0x1f0
[ 3411.040922][T29670] __should_failslab+0x81/0x90
[ 3411.045682][T29670] should_failslab+0x5/0x20
[ 3411.050183][T29670] kmem_cache_alloc+0x4f/0x320
[ 3411.054945][T29670] skb_clone+0x12c/0x1f0
[ 3411.059195][T29670] netlink_deliver_tap+0x2da/0x510
[ 3411.064333][T29670] netlink_dump+0x4ba/0x6b0
[ 3411.068909][T29670] netlink_recvmsg+0x486/0x810
[ 3411.073747][T29670] ? rb_insert_color+0x7e/0x310
[ 3411.078654][T29670] ? netlink_sendmsg+0x840/0x840
[ 3411.083614][T29670] ____sys_recvmsg+0x16c/0x320
[ 3411.088427][T29670] do_recvmmsg+0x3f5/0xae0
[ 3411.092849][T29670] ? get_timespec64+0xff/0x130
[ 3411.097676][T29670] __x64_sys_recvmmsg+0xf5/0x160
[ 3411.102661][T29670] do_syscall_64+0x44/0xd0
[ 3411.107168][T29670] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3411.113088][T29670] RIP: 0033:0x7f553bc44af9
[ 3411.117558][T29670] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
22:07:05 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0110100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:05 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) (fail_nth: 71)
[ 3411.137179][T29670] RSP: 002b:00007f553b3bb188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 3411.145600][T29670] RAX: ffffffffffffffda RBX: 00007f553bd57f60 RCX: 00007f553bc44af9
[ 3411.153604][T29670] RDX: 04000000000003b4 RSI: 00000000200037c0 RDI: 0000000000000003
[ 3411.161571][T29670] RBP: 00007f553b3bb1d0 R08: 0000000020003700 R09: 0000000000000000
[ 3411.169642][T29670] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3411.177641][T29670] R13: 00007ffd3a6ac3af R14: 00007f553b3bb300 R15: 0000000000022000
[ 3411.185617][T29670]
22:07:05 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x216b}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:05 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00'})
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r1, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
[ 3411.329633][T29704] loop1: detected capacity change from 0 to 512
[ 3411.347201][T29747] loop2: detected capacity change from 0 to 264192
[ 3411.357375][T29748] FAULT_INJECTION: forcing a failure.
[ 3411.357375][T29748] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 3411.370473][T29748] CPU: 1 PID: 29748 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0
[ 3411.379234][T29748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3411.389339][T29748] Call Trace:
[ 3411.392620][T29748]
[ 3411.395556][T29748] dump_stack_lvl+0xd6/0x122
[ 3411.400156][T29748] dump_stack+0x11/0x1b
[ 3411.404358][T29748] should_fail+0x23c/0x250
[ 3411.408776][T29748] should_fail_usercopy+0x16/0x20
[ 3411.413804][T29748] _copy_from_user+0x1c/0xd0
[ 3411.418551][T29748] do_recvmmsg+0x2c3/0xae0
[ 3411.423001][T29748] ? cx23885_dif_setup+0xfd20/0x39870
[ 3411.428381][T29748] ? get_timespec64+0xff/0x130
[ 3411.433177][T29748] __x64_sys_recvmmsg+0xf5/0x160
[ 3411.438138][T29748] do_syscall_64+0x44/0xd0
[ 3411.442556][T29748] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3411.448496][T29748] RIP: 0033:0x7f553bc44af9
[ 3411.452904][T29748] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3411.472509][T29748] RSP: 002b:00007f553b3bb188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 3411.481007][T29748] RAX: ffffffffffffffda RBX: 00007f553bd57f60 RCX: 00007f553bc44af9
[ 3411.489004][T29748] RDX: 04000000000003b4 RSI: 00000000200037c0 RDI: 0000000000000003
[ 3411.496983][T29748] RBP: 00007f553b3bb1d0 R08: 0000000020003700 R09: 0000000000000000
[ 3411.504952][T29748] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3411.512937][T29748] R13: 00007ffd3a6ac3af R14: 00007f553b3bb300 R15: 0000000000022000
[ 3411.520953][T29748]
22:07:06 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) (fail_nth: 72)
22:07:06 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x6300}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3411.532306][T29704] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3411.539101][T29704] EXT4-fs (loop1): mount failed
[ 3411.557053][T29747] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:06 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0120100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:06 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed4100000000fa00d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3411.594482][T29704] loop1: detected capacity change from 0 to 512
[ 3411.606657][T29704] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3411.615471][T29704] EXT4-fs (loop1): mount failed
22:07:06 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x4788}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3411.783842][T29791] FAULT_INJECTION: forcing a failure.
[ 3411.783842][T29791] name failslab, interval 1, probability 0, space 0, times 0
[ 3411.796558][T29791] CPU: 1 PID: 29791 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0
[ 3411.805325][T29791] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3411.815503][T29791] Call Trace:
[ 3411.818821][T29791]
[ 3411.821744][T29791] dump_stack_lvl+0xd6/0x122
[ 3411.827155][T29791] dump_stack+0x11/0x1b
[ 3411.831345][T29791] should_fail+0x23c/0x250
[ 3411.835771][T29791] __should_failslab+0x81/0x90
[ 3411.840565][T29791] should_failslab+0x5/0x20
[ 3411.845075][T29791] kmem_cache_alloc_node+0x61/0x2d0
[ 3411.850358][T29791] ? __alloc_skb+0xf0/0x450
[ 3411.854902][T29791] __alloc_skb+0xf0/0x450
[ 3411.859231][T29791] netlink_dump+0x118/0x6b0
[ 3411.863803][T29791] ? __kfree_skb+0xfe/0x150
[ 3411.868309][T29791] netlink_recvmsg+0x486/0x810
[ 3411.873075][T29791] ? xfd_validate_state+0x4e/0xf0
[ 3411.878127][T29791] ? netlink_sendmsg+0x840/0x840
[ 3411.883121][T29791] ____sys_recvmsg+0x16c/0x320
[ 3411.887958][T29791] do_recvmmsg+0x3f5/0xae0
[ 3411.892375][T29791] ? cx23885_dif_setup+0xfd20/0x39870
[ 3411.897757][T29791] ? get_timespec64+0xff/0x130
[ 3411.902585][T29791] __x64_sys_recvmmsg+0xf5/0x160
[ 3411.907610][T29791] do_syscall_64+0x44/0xd0
[ 3411.912026][T29791] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3411.917917][T29791] RIP: 0033:0x7f553bc44af9
[ 3411.922371][T29791] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3411.941975][T29791] RSP: 002b:00007f553b3bb188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 3411.950618][T29791] RAX: ffffffffffffffda RBX: 00007f553bd57f60 RCX: 00007f553bc44af9
[ 3411.958623][T29791] RDX: 04000000000003b4 RSI: 00000000200037c0 RDI: 0000000000000003
[ 3411.966605][T29791] RBP: 00007f553b3bb1d0 R08: 0000000020003700 R09: 0000000000000000
[ 3411.975532][T29791] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
22:07:06 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00'})
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r1, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
[ 3411.983501][T29791] R13: 00007ffd3a6ac3af R14: 00007f553b3bb300 R15: 0000000000022000
[ 3411.991476][T29791]
22:07:06 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) (fail_nth: 73)
22:07:06 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0130100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3412.049114][T29795] loop2: detected capacity change from 0 to 264192
[ 3412.075522][T29795] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:06 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x6400}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:06 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x4888}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:06 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00'})
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r1, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
[ 3412.148291][T29901] loop1: detected capacity change from 0 to 512
[ 3412.167011][T29901] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3412.173517][T29901] EXT4-fs (loop1): mount failed
[ 3412.214361][T29901] loop1: detected capacity change from 0 to 512
[ 3412.224084][T29901] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3412.232998][T29901] EXT4-fs (loop1): mount failed
[ 3412.243898][T29907] FAULT_INJECTION: forcing a failure.
[ 3412.243898][T29907] name failslab, interval 1, probability 0, space 0, times 0
[ 3412.256549][T29907] CPU: 1 PID: 29907 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0
[ 3412.265336][T29907] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3412.275387][T29907] Call Trace:
[ 3412.278673][T29907]
[ 3412.281686][T29907] dump_stack_lvl+0xd6/0x122
[ 3412.287163][T29907] dump_stack+0x11/0x1b
[ 3412.291318][T29907] should_fail+0x23c/0x250
[ 3412.295732][T29907] __should_failslab+0x81/0x90
[ 3412.300491][T29907] should_failslab+0x5/0x20
[ 3412.305005][T29907] kmem_cache_alloc_node_trace+0x61/0x310
[ 3412.310785][T29907] ? __kmalloc_node_track_caller+0x30/0x40
[ 3412.316591][T29907] __kmalloc_node_track_caller+0x30/0x40
[ 3412.322224][T29907] ? netlink_dump+0x118/0x6b0
[ 3412.326905][T29907] __alloc_skb+0x19d/0x450
[ 3412.331321][T29907] netlink_dump+0x118/0x6b0
[ 3412.335896][T29907] ? __kfree_skb+0xfe/0x150
[ 3412.340396][T29907] netlink_recvmsg+0x486/0x810
[ 3412.345248][T29907] ? netlink_sendmsg+0x840/0x840
[ 3412.350239][T29907] ____sys_recvmsg+0x16c/0x320
[ 3412.354999][T29907] do_recvmmsg+0x3f5/0xae0
[ 3412.359468][T29907] ? cx23885_dif_setup+0xfd20/0x39870
[ 3412.364852][T29907] ? get_timespec64+0xff/0x130
[ 3412.369618][T29907] __x64_sys_recvmmsg+0xf5/0x160
[ 3412.374550][T29907] do_syscall_64+0x44/0xd0
[ 3412.379011][T29907] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3412.384913][T29907] RIP: 0033:0x7f553bc44af9
[ 3412.389357][T29907] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
22:07:07 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) (fail_nth: 74)
22:07:07 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed4100000000fb00d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3412.408971][T29907] RSP: 002b:00007f553b3bb188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 3412.417405][T29907] RAX: ffffffffffffffda RBX: 00007f553bd57f60 RCX: 00007f553bc44af9
[ 3412.425375][T29907] RDX: 04000000000003b4 RSI: 00000000200037c0 RDI: 0000000000000003
[ 3412.433342][T29907] RBP: 00007f553b3bb1d0 R08: 0000000020003700 R09: 0000000000000000
[ 3412.441481][T29907] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3412.449451][T29907] R13: 00007ffd3a6ac3af R14: 00007f553b3bb300 R15: 0000000000022000
[ 3412.457423][T29907]
22:07:07 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x5865}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:07 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0140100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3412.560324][T29910] loop2: detected capacity change from 0 to 264192
[ 3412.589043][T29910] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:07 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x640b}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:07 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00'})
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfea7)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
[ 3412.723279][T30021] FAULT_INJECTION: forcing a failure.
[ 3412.723279][T30021] name failslab, interval 1, probability 0, space 0, times 0
[ 3412.735920][T30021] CPU: 0 PID: 30021 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0
[ 3412.744764][T30021] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3412.754959][T30021] Call Trace:
[ 3412.758240][T30021]
[ 3412.761168][T30021] dump_stack_lvl+0xd6/0x122
[ 3412.765863][T30021] dump_stack+0x11/0x1b
[ 3412.770027][T30021] should_fail+0x23c/0x250
[ 3412.774521][T30021] ? skb_clone+0x12c/0x1f0
[ 3412.778952][T30021] __should_failslab+0x81/0x90
[ 3412.779495][T30025] loop1: detected capacity change from 0 to 512
[ 3412.783723][T30021] should_failslab+0x5/0x20
[ 3412.794532][T30021] kmem_cache_alloc+0x4f/0x320
[ 3412.799300][T30021] skb_clone+0x12c/0x1f0
[ 3412.803582][T30021] netlink_deliver_tap+0x2da/0x510
[ 3412.808706][T30021] netlink_dump+0x4ba/0x6b0
[ 3412.813268][T30021] netlink_recvmsg+0x486/0x810
[ 3412.818041][T30021] ? netlink_sendmsg+0x840/0x840
[ 3412.822993][T30021] ____sys_recvmsg+0x16c/0x320
[ 3412.827848][T30021] do_recvmmsg+0x3f5/0xae0
[ 3412.832388][T30021] ? cx23885_dif_setup+0xfd20/0x39870
[ 3412.837786][T30021] ? get_timespec64+0xff/0x130
[ 3412.842639][T30021] __x64_sys_recvmmsg+0xf5/0x160
[ 3412.847596][T30021] do_syscall_64+0x44/0xd0
[ 3412.852361][T30021] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3412.858379][T30021] RIP: 0033:0x7f553bc44af9
[ 3412.862787][T30021] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3412.882400][T30021] RSP: 002b:00007f553b3bb188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 3412.891154][T30021] RAX: ffffffffffffffda RBX: 00007f553bd57f60 RCX: 00007f553bc44af9
[ 3412.899160][T30021] RDX: 04000000000003b4 RSI: 00000000200037c0 RDI: 0000000000000003
[ 3412.907139][T30021] RBP: 00007f553b3bb1d0 R08: 0000000020003700 R09: 0000000000000000
[ 3412.915115][T30021] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
22:07:07 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x6558}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:07 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x6000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:07 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00'})
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfea7)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
[ 3412.923183][T30021] R13: 00007ffd3a6ac3af R14: 00007f553b3bb300 R15: 0000000000022000
[ 3412.931220][T30021]
22:07:07 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) (fail_nth: 75)
22:07:07 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0150100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3412.966091][T30132] loop2: detected capacity change from 0 to 264192
[ 3412.986674][T30132] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:07 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x6558}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3413.039469][T30025] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3413.054085][T30025] EXT4-fs (loop1): mount failed
[ 3413.088244][T30220] FAULT_INJECTION: forcing a failure.
[ 3413.088244][T30220] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 3413.101405][T30220] CPU: 0 PID: 30220 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0
[ 3413.110335][T30220] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3413.120388][T30220] Call Trace:
[ 3413.123657][T30220]
[ 3413.126665][T30220] dump_stack_lvl+0xd6/0x122
[ 3413.131258][T30220] dump_stack+0x11/0x1b
[ 3413.135410][T30220] should_fail+0x23c/0x250
[ 3413.139901][T30220] should_fail_usercopy+0x16/0x20
[ 3413.144977][T30220] _copy_from_user+0x1c/0xd0
[ 3413.149566][T30220] do_recvmmsg+0x2c3/0xae0
[ 3413.153980][T30220] ? get_timespec64+0xff/0x130
[ 3413.158750][T30220] __x64_sys_recvmmsg+0xf5/0x160
[ 3413.163752][T30220] do_syscall_64+0x44/0xd0
[ 3413.168165][T30220] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3413.174081][T30220] RIP: 0033:0x7f553bc44af9
[ 3413.178538][T30220] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3413.198218][T30220] RSP: 002b:00007f553b3bb188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 3413.206622][T30220] RAX: ffffffffffffffda RBX: 00007f553bd57f60 RCX: 00007f553bc44af9
[ 3413.214603][T30220] RDX: 04000000000003b4 RSI: 00000000200037c0 RDI: 0000000000000003
[ 3413.222570][T30220] RBP: 00007f553b3bb1d0 R08: 0000000020003700 R09: 0000000000000000
[ 3413.230808][T30220] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
22:07:07 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x6800}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3413.238777][T30220] R13: 00007ffd3a6ac3af R14: 00007f553b3bb300 R15: 0000000000022000
[ 3413.246794][T30220]
[ 3413.266492][T30025] loop1: detected capacity change from 0 to 512
[ 3413.277866][T30025] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3413.286854][T30025] EXT4-fs (loop1): mount failed
22:07:07 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed4100000000fc00d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:07 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00'})
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfea7)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:07 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) (fail_nth: 76)
22:07:08 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0160100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3413.323420][T30246] loop2: detected capacity change from 0 to 264192
[ 3413.343302][T30246] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:08 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x6b21}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:08 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00'})
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
fsetxattr$security_capability(r1, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
[ 3413.477573][T30253] FAULT_INJECTION: forcing a failure.
[ 3413.477573][T30253] name failslab, interval 1, probability 0, space 0, times 0
[ 3413.490273][T30253] CPU: 0 PID: 30253 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0
[ 3413.499080][T30253] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3413.509136][T30253] Call Trace:
[ 3413.512414][T30253]
[ 3413.515408][T30253] dump_stack_lvl+0xd6/0x122
[ 3413.520204][T30253] dump_stack+0x11/0x1b
[ 3413.524441][T30253] should_fail+0x23c/0x250
[ 3413.528927][T30253] __should_failslab+0x81/0x90
[ 3413.533730][T30253] should_failslab+0x5/0x20
[ 3413.538233][T30253] kmem_cache_alloc_node+0x61/0x2d0
[ 3413.543451][T30253] ? __alloc_skb+0xf0/0x450
[ 3413.548108][T30253] __alloc_skb+0xf0/0x450
[ 3413.552436][T30253] netlink_dump+0x118/0x6b0
[ 3413.556949][T30253] ? __kfree_skb+0xfe/0x150
[ 3413.561534][T30253] netlink_recvmsg+0x486/0x810
[ 3413.566308][T30253] ? netlink_sendmsg+0x840/0x840
[ 3413.571316][T30253] ____sys_recvmsg+0x16c/0x320
[ 3413.576124][T30253] do_recvmmsg+0x3f5/0xae0
[ 3413.580621][T30253] ? cx23885_dif_setup+0xfd20/0x39870
[ 3413.586000][T30253] ? get_timespec64+0xff/0x130
[ 3413.590793][T30253] __x64_sys_recvmmsg+0xf5/0x160
[ 3413.595769][T30253] do_syscall_64+0x44/0xd0
[ 3413.600289][T30253] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3413.606251][T30253] RIP: 0033:0x7f553bc44af9
[ 3413.610662][T30253] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3413.630533][T30253] RSP: 002b:00007f553b3bb188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 3413.638963][T30253] RAX: ffffffffffffffda RBX: 00007f553bd57f60 RCX: 00007f553bc44af9
[ 3413.647054][T30253] RDX: 04000000000003b4 RSI: 00000000200037c0 RDI: 0000000000000003
[ 3413.655020][T30253] RBP: 00007f553b3bb1d0 R08: 0000000020003700 R09: 0000000000000000
[ 3413.662996][T30253] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
22:07:08 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x680b}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:08 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) (fail_nth: 77)
[ 3413.670970][T30253] R13: 00007ffd3a6ac3af R14: 00007f553b3bb300 R15: 0000000000022000
[ 3413.679023][T30253]
22:07:08 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x8100}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:08 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00'})
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
fsetxattr$security_capability(r1, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
[ 3413.719521][T30360] loop1: detected capacity change from 0 to 512
[ 3413.730045][T30362] loop2: detected capacity change from 0 to 264192
[ 3413.746798][T30362] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:08 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0170100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3413.788284][T30360] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3413.796431][T30360] EXT4-fs (loop1): mount failed
[ 3413.829634][T30468] FAULT_INJECTION: forcing a failure.
[ 3413.829634][T30468] name failslab, interval 1, probability 0, space 0, times 0
[ 3413.842477][T30468] CPU: 1 PID: 30468 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0
[ 3413.851239][T30468] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3413.861443][T30468] Call Trace:
[ 3413.864735][T30468]
[ 3413.867686][T30468] dump_stack_lvl+0xd6/0x122
[ 3413.872274][T30468] dump_stack+0x11/0x1b
[ 3413.876439][T30468] should_fail+0x23c/0x250
[ 3413.880868][T30468] __should_failslab+0x81/0x90
[ 3413.885689][T30468] should_failslab+0x5/0x20
[ 3413.890239][T30468] kmem_cache_alloc_node_trace+0x61/0x310
[ 3413.896003][T30468] ? __kmalloc_node_track_caller+0x30/0x40
[ 3413.902045][T30468] __kmalloc_node_track_caller+0x30/0x40
[ 3413.907770][T30468] ? netlink_dump+0x118/0x6b0
[ 3413.912449][T30468] __alloc_skb+0x19d/0x450
[ 3413.916922][T30468] netlink_dump+0x118/0x6b0
[ 3413.921517][T30468] ? __kfree_skb+0xfe/0x150
[ 3413.926065][T30468] netlink_recvmsg+0x486/0x810
[ 3413.930844][T30468] ? xfd_validate_state+0x4e/0xf0
[ 3413.935884][T30468] ? netlink_sendmsg+0x840/0x840
[ 3413.940833][T30468] ____sys_recvmsg+0x16c/0x320
[ 3413.945676][T30468] do_recvmmsg+0x3f5/0xae0
[ 3413.950133][T30468] ? cx23885_dif_setup+0xfd20/0x39870
[ 3413.955541][T30468] ? get_timespec64+0xff/0x130
[ 3413.960350][T30468] __x64_sys_recvmmsg+0xf5/0x160
[ 3413.965295][T30468] do_syscall_64+0x44/0xd0
[ 3413.969743][T30468] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3413.975640][T30468] RIP: 0033:0x7f553bc44af9
[ 3413.980057][T30468] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3413.999984][T30468] RSP: 002b:00007f553b3bb188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 3414.008448][T30468] RAX: ffffffffffffffda RBX: 00007f553bd57f60 RCX: 00007f553bc44af9
[ 3414.016420][T30468] RDX: 04000000000003b4 RSI: 00000000200037c0 RDI: 0000000000000003
22:07:08 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x6900}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3414.024476][T30468] RBP: 00007f553b3bb1d0 R08: 0000000020003700 R09: 0000000000000000
[ 3414.032453][T30468] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3414.040468][T30468] R13: 00007ffd3a6ac3af R14: 00007f553b3bb300 R15: 0000000000022000
[ 3414.048478][T30468]
22:07:08 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed4100000000fd00d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:08 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) (fail_nth: 78)
[ 3414.074074][T30360] loop1: detected capacity change from 0 to 512
[ 3414.095327][T30360] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3414.104471][T30360] EXT4-fs (loop1): mount failed
22:07:08 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x8847}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:08 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00'})
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
fsetxattr$security_capability(r1, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
[ 3414.294639][T30479] loop2: detected capacity change from 0 to 264192
[ 3414.305838][T30478] FAULT_INJECTION: forcing a failure.
[ 3414.305838][T30478] name failslab, interval 1, probability 0, space 0, times 0
[ 3414.312263][T30479] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3414.318594][T30478] CPU: 0 PID: 30478 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0
[ 3414.333848][T30478] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3414.343893][T30478] Call Trace:
[ 3414.347194][T30478]
[ 3414.350131][T30478] dump_stack_lvl+0xd6/0x122
[ 3414.354839][T30478] dump_stack+0x11/0x1b
[ 3414.359093][T30478] should_fail+0x23c/0x250
[ 3414.363507][T30478] ? skb_clone+0x12c/0x1f0
[ 3414.367978][T30478] __should_failslab+0x81/0x90
[ 3414.372750][T30478] should_failslab+0x5/0x20
[ 3414.377251][T30478] kmem_cache_alloc+0x4f/0x320
[ 3414.382053][T30478] skb_clone+0x12c/0x1f0
[ 3414.386365][T30478] netlink_deliver_tap+0x2da/0x510
[ 3414.391555][T30478] netlink_dump+0x4ba/0x6b0
[ 3414.396146][T30478] netlink_recvmsg+0x486/0x810
[ 3414.401068][T30478] ? netlink_sendmsg+0x840/0x840
[ 3414.406052][T30478] ____sys_recvmsg+0x16c/0x320
[ 3414.410828][T30478] do_recvmmsg+0x3f5/0xae0
[ 3414.415308][T30478] ? cx23885_dif_setup+0xfd20/0x39870
[ 3414.420795][T30478] ? get_timespec64+0xff/0x130
[ 3414.425564][T30478] __x64_sys_recvmmsg+0xf5/0x160
[ 3414.430498][T30478] do_syscall_64+0x44/0xd0
[ 3414.435021][T30478] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3414.440920][T30478] RIP: 0033:0x7f553bc44af9
22:07:09 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x6c00}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3414.445327][T30478] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3414.465054][T30478] RSP: 002b:00007f553b3bb188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 3414.473469][T30478] RAX: ffffffffffffffda RBX: 00007f553bd57f60 RCX: 00007f553bc44af9
[ 3414.481487][T30478] RDX: 04000000000003b4 RSI: 00000000200037c0 RDI: 0000000000000003
22:07:09 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0180100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:09 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) (fail_nth: 79)
22:07:09 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x8848}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3414.489582][T30478] RBP: 00007f553b3bb1d0 R08: 0000000020003700 R09: 0000000000000000
[ 3414.497555][T30478] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3414.505601][T30478] R13: 00007ffd3a6ac3af R14: 00007f553b3bb300 R15: 0000000000022000
[ 3414.513707][T30478]
22:07:09 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00'})
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
[ 3414.564295][T30586] loop1: detected capacity change from 0 to 512
22:07:09 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x7400}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3414.604853][T30586] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3414.614783][T30586] EXT4-fs (loop1): mount failed
[ 3414.654538][T30586] loop1: detected capacity change from 0 to 512
[ 3414.663448][T30586] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3414.670168][T30586] EXT4-fs (loop1): mount failed
[ 3414.698423][T30694] FAULT_INJECTION: forcing a failure.
[ 3414.698423][T30694] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 3414.711604][T30694] CPU: 1 PID: 30694 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0
[ 3414.720537][T30694] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3414.730587][T30694] Call Trace:
[ 3414.733896][T30694]
[ 3414.736829][T30694] dump_stack_lvl+0xd6/0x122
[ 3414.741425][T30694] dump_stack+0x11/0x1b
[ 3414.745584][T30694] should_fail+0x23c/0x250
[ 3414.750101][T30694] should_fail_usercopy+0x16/0x20
[ 3414.755208][T30694] _copy_from_user+0x1c/0xd0
[ 3414.759807][T30694] do_recvmmsg+0x2c3/0xae0
[ 3414.764229][T30694] ? cx23885_dif_setup+0xfd20/0x39870
[ 3414.769627][T30694] ? get_timespec64+0xff/0x130
[ 3414.774408][T30694] __x64_sys_recvmmsg+0xf5/0x160
[ 3414.779350][T30694] do_syscall_64+0x44/0xd0
[ 3414.783801][T30694] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3414.789717][T30694] RIP: 0033:0x7f553bc44af9
[ 3414.794132][T30694] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3414.813741][T30694] RSP: 002b:00007f553b3bb188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 3414.822271][T30694] RAX: ffffffffffffffda RBX: 00007f553bd57f60 RCX: 00007f553bc44af9
[ 3414.830305][T30694] RDX: 04000000000003b4 RSI: 00000000200037c0 RDI: 0000000000000003
[ 3414.838279][T30694] RBP: 00007f553b3bb1d0 R08: 0000000020003700 R09: 0000000000000000
22:07:09 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x34000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:09 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) (fail_nth: 80)
22:07:09 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed4100000000fe00d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3414.846322][T30694] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3414.854307][T30694] R13: 00007ffd3a6ac3af R14: 00007f553b3bb300 R15: 0000000000022000
[ 3414.862351][T30694]
[ 3414.876953][T30697] loop2: detected capacity change from 0 to 264192
22:07:09 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00'})
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:09 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0190100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3414.899948][T30697] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:09 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x400300}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3415.043548][T30705] FAULT_INJECTION: forcing a failure.
[ 3415.043548][T30705] name failslab, interval 1, probability 0, space 0, times 0
[ 3415.056227][T30705] CPU: 0 PID: 30705 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0
[ 3415.065057][T30705] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3415.075146][T30705] Call Trace:
[ 3415.078444][T30705]
[ 3415.081374][T30705] dump_stack_lvl+0xd6/0x122
[ 3415.085973][T30705] dump_stack+0x11/0x1b
[ 3415.090129][T30705] should_fail+0x23c/0x250
[ 3415.094644][T30705] __should_failslab+0x81/0x90
[ 3415.099518][T30705] should_failslab+0x5/0x20
[ 3415.104060][T30705] kmem_cache_alloc_node+0x61/0x2d0
[ 3415.109963][T30705] ? __alloc_skb+0xf0/0x450
[ 3415.114885][T30705] __alloc_skb+0xf0/0x450
[ 3415.119219][T30705] netlink_dump+0x118/0x6b0
[ 3415.123732][T30705] ? __kfree_skb+0xfe/0x150
[ 3415.128259][T30705] netlink_recvmsg+0x486/0x810
[ 3415.133052][T30705] ? xfd_validate_state+0x4e/0xf0
[ 3415.138161][T30705] ? netlink_sendmsg+0x840/0x840
[ 3415.143119][T30705] ____sys_recvmsg+0x16c/0x320
[ 3415.147895][T30705] do_recvmmsg+0x3f5/0xae0
[ 3415.152317][T30705] ? cx23885_dif_setup+0xfd20/0x39870
[ 3415.157810][T30705] ? get_timespec64+0xff/0x130
[ 3415.162592][T30705] __x64_sys_recvmmsg+0xf5/0x160
[ 3415.167659][T30705] do_syscall_64+0x44/0xd0
[ 3415.172115][T30705] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3415.178041][T30705] RIP: 0033:0x7f553bc44af9
[ 3415.182455][T30705] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3415.202083][T30705] RSP: 002b:00007f553b3bb188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 3415.210514][T30705] RAX: ffffffffffffffda RBX: 00007f553bd57f60 RCX: 00007f553bc44af9
[ 3415.218493][T30705] RDX: 04000000000003b4 RSI: 00000000200037c0 RDI: 0000000000000003
[ 3415.226466][T30705] RBP: 00007f553b3bb1d0 R08: 0000000020003700 R09: 0000000000000000
[ 3415.234444][T30705] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
22:07:09 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00'})
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:09 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) (fail_nth: 81)
[ 3415.236490][T30710] loop1: detected capacity change from 0 to 512
[ 3415.242674][T30705] R13: 00007ffd3a6ac3af R14: 00007f553b3bb300 R15: 0000000000022000
[ 3415.242695][T30705]
[ 3415.282979][T30710] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3415.289521][T30710] EXT4-fs (loop1): mount failed
22:07:09 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x1000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:09 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x740b}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:10 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc01a0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:10 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed4100000000ff00d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3415.307927][T30813] loop2: detected capacity change from 0 to 264192
[ 3415.326694][T30710] loop1: detected capacity change from 0 to 512
[ 3415.335004][T30710] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3415.341843][T30710] EXT4-fs (loop1): mount failed
[ 3415.348134][T30813] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3415.439488][T30817] FAULT_INJECTION: forcing a failure.
[ 3415.439488][T30817] name failslab, interval 1, probability 0, space 0, times 0
[ 3415.452180][T30817] CPU: 0 PID: 30817 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0
[ 3415.460942][T30817] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3415.471047][T30817] Call Trace:
[ 3415.474401][T30817]
[ 3415.477338][T30817] dump_stack_lvl+0xd6/0x122
[ 3415.481984][T30817] dump_stack+0x11/0x1b
[ 3415.486185][T30817] should_fail+0x23c/0x250
[ 3415.490632][T30817] __should_failslab+0x81/0x90
[ 3415.495399][T30817] should_failslab+0x5/0x20
[ 3415.499918][T30817] kmem_cache_alloc_node_trace+0x61/0x310
[ 3415.505776][T30817] ? __kmalloc_node_track_caller+0x30/0x40
[ 3415.511585][T30817] __kmalloc_node_track_caller+0x30/0x40
[ 3415.517255][T30817] ? netlink_dump+0x118/0x6b0
[ 3415.522072][T30817] __alloc_skb+0x19d/0x450
[ 3415.526547][T30817] netlink_dump+0x118/0x6b0
[ 3415.531125][T30817] ? __kfree_skb+0xfe/0x150
[ 3415.535633][T30817] netlink_recvmsg+0x486/0x810
[ 3415.540402][T30817] ? netlink_sendmsg+0x840/0x840
[ 3415.545346][T30817] ____sys_recvmsg+0x16c/0x320
[ 3415.550131][T30817] do_recvmmsg+0x3f5/0xae0
[ 3415.554573][T30817] ? cx23885_dif_setup+0xfd20/0x39870
[ 3415.560030][T30817] ? get_timespec64+0xff/0x130
[ 3415.564789][T30817] __x64_sys_recvmmsg+0xf5/0x160
[ 3415.569730][T30817] do_syscall_64+0x44/0xd0
[ 3415.574160][T30817] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3415.580394][T30817] RIP: 0033:0x7f553bc44af9
[ 3415.584806][T30817] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3415.604415][T30817] RSP: 002b:00007f553b3bb188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 3415.612833][T30817] RAX: ffffffffffffffda RBX: 00007f553bd57f60 RCX: 00007f553bc44af9
[ 3415.620851][T30817] RDX: 04000000000003b4 RSI: 00000000200037c0 RDI: 0000000000000003
[ 3415.628830][T30817] RBP: 00007f553b3bb1d0 R08: 0000000020003700 R09: 0000000000000000
22:07:10 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x2000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:10 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00'})
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r1, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:10 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) (fail_nth: 82)
[ 3415.637142][T30817] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3415.645133][T30817] R13: 00007ffd3a6ac3af R14: 00007f553b3bb300 R15: 0000000000022000
[ 3415.653152][T30817]
22:07:10 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x780a}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:10 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc01b0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3415.758941][T30825] loop1: detected capacity change from 0 to 512
[ 3415.769827][T30833] loop2: detected capacity change from 0 to 264192
[ 3415.784041][T30825] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3415.793663][T30825] EXT4-fs (loop1): mount failed
[ 3415.800506][T30833] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:10 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x3000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3415.834438][T30825] loop1: detected capacity change from 0 to 512
[ 3415.843916][T30825] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3415.856968][T30825] EXT4-fs (loop1): mount failed
[ 3415.873987][T30933] FAULT_INJECTION: forcing a failure.
[ 3415.873987][T30933] name failslab, interval 1, probability 0, space 0, times 0
[ 3415.887478][T30933] CPU: 0 PID: 30933 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0
[ 3415.896308][T30933] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3415.906484][T30933] Call Trace:
[ 3415.909758][T30933]
[ 3415.912709][T30933] dump_stack_lvl+0xd6/0x122
[ 3415.917458][T30933] dump_stack+0x11/0x1b
[ 3415.921899][T30933] should_fail+0x23c/0x250
[ 3415.926322][T30933] ? skb_clone+0x12c/0x1f0
[ 3415.930877][T30933] __should_failslab+0x81/0x90
[ 3415.935705][T30933] should_failslab+0x5/0x20
[ 3415.940289][T30933] kmem_cache_alloc+0x4f/0x320
[ 3415.945067][T30933] skb_clone+0x12c/0x1f0
[ 3415.949378][T30933] netlink_deliver_tap+0x2da/0x510
[ 3415.954507][T30933] netlink_dump+0x4ba/0x6b0
[ 3415.959038][T30933] netlink_recvmsg+0x486/0x810
[ 3415.963869][T30933] ? xfd_validate_state+0x4e/0xf0
[ 3415.968899][T30933] ? netlink_sendmsg+0x840/0x840
[ 3415.974036][T30933] ____sys_recvmsg+0x16c/0x320
[ 3415.978898][T30933] do_recvmmsg+0x3f5/0xae0
[ 3415.983435][T30933] ? get_timespec64+0xff/0x130
[ 3415.988193][T30933] __x64_sys_recvmmsg+0xf5/0x160
[ 3415.993125][T30933] do_syscall_64+0x44/0xd0
[ 3415.997547][T30933] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3416.003501][T30933] RIP: 0033:0x7f553bc44af9
[ 3416.007908][T30933] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
22:07:10 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000000301d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:10 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00'})
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r1, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
[ 3416.028048][T30933] RSP: 002b:00007f553b3bb188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 3416.036471][T30933] RAX: ffffffffffffffda RBX: 00007f553bd57f60 RCX: 00007f553bc44af9
[ 3416.044530][T30933] RDX: 04000000000003b4 RSI: 00000000200037c0 RDI: 0000000000000003
[ 3416.052504][T30933] RBP: 00007f553b3bb1d0 R08: 0000000020003700 R09: 0000000000000000
[ 3416.060505][T30933] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3416.068641][T30933] R13: 00007ffd3a6ac3af R14: 00007f553b3bb300 R15: 0000000000022000
[ 3416.076624][T30933]
22:07:10 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) (fail_nth: 83)
22:07:10 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x780b}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:10 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x4000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3416.202248][T31039] loop2: detected capacity change from 0 to 264192
[ 3416.226315][T31039] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3416.260368][T31045] FAULT_INJECTION: forcing a failure.
[ 3416.260368][T31045] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 3416.273519][T31045] CPU: 1 PID: 31045 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0
[ 3416.282337][T31045] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3416.292389][T31045] Call Trace:
[ 3416.295660][T31045]
[ 3416.298587][T31045] dump_stack_lvl+0xd6/0x122
[ 3416.303246][T31045] dump_stack+0x11/0x1b
[ 3416.307399][T31045] should_fail+0x23c/0x250
[ 3416.311816][T31045] should_fail_usercopy+0x16/0x20
[ 3416.316844][T31045] _copy_from_user+0x1c/0xd0
[ 3416.321523][T31045] do_recvmmsg+0x2c3/0xae0
[ 3416.325952][T31045] ? get_timespec64+0xff/0x130
[ 3416.330712][T31045] __x64_sys_recvmmsg+0xf5/0x160
[ 3416.335639][T31045] do_syscall_64+0x44/0xd0
[ 3416.340123][T31045] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3416.346168][T31045] RIP: 0033:0x7f553bc44af9
[ 3416.350578][T31045] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3416.370182][T31045] RSP: 002b:00007f553b3bb188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 3416.378612][T31045] RAX: ffffffffffffffda RBX: 00007f553bd57f60 RCX: 00007f553bc44af9
[ 3416.386582][T31045] RDX: 04000000000003b4 RSI: 00000000200037c0 RDI: 0000000000000003
[ 3416.394638][T31045] RBP: 00007f553b3bb1d0 R08: 0000000020003700 R09: 0000000000000000
[ 3416.402607][T31045] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
22:07:11 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc01c0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:11 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) (fail_nth: 84)
22:07:11 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00'})
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r1, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
[ 3416.410597][T31045] R13: 00007ffd3a6ac3af R14: 00007f553b3bb300 R15: 0000000000022000
[ 3416.418566][T31045]
[ 3416.446889][T31047] loop1: detected capacity change from 0 to 512
22:07:11 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x5000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3416.464914][T31047] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3416.472630][T31047] EXT4-fs (loop1): mount failed
[ 3416.501698][T31047] loop1: detected capacity change from 0 to 512
[ 3416.531183][T31047] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3416.561477][T31047] EXT4-fs (loop1): mount failed
[ 3416.565502][T31057] FAULT_INJECTION: forcing a failure.
[ 3416.565502][T31057] name failslab, interval 1, probability 0, space 0, times 0
[ 3416.579043][T31057] CPU: 1 PID: 31057 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0
[ 3416.587804][T31057] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3416.597859][T31057] Call Trace:
[ 3416.601130][T31057]
[ 3416.604056][T31057] dump_stack_lvl+0xd6/0x122
[ 3416.608729][T31057] dump_stack+0x11/0x1b
[ 3416.612936][T31057] should_fail+0x23c/0x250
[ 3416.617343][T31057] __should_failslab+0x81/0x90
[ 3416.622103][T31057] should_failslab+0x5/0x20
[ 3416.626650][T31057] kmem_cache_alloc_node+0x61/0x2d0
[ 3416.631859][T31057] ? __alloc_skb+0xf0/0x450
[ 3416.636372][T31057] __alloc_skb+0xf0/0x450
[ 3416.640788][T31057] netlink_dump+0x118/0x6b0
[ 3416.645293][T31057] ? __kfree_skb+0xfe/0x150
[ 3416.649792][T31057] netlink_recvmsg+0x486/0x810
[ 3416.654652][T31057] ? netlink_sendmsg+0x840/0x840
[ 3416.659610][T31057] ____sys_recvmsg+0x16c/0x320
[ 3416.664374][T31057] do_recvmmsg+0x3f5/0xae0
[ 3416.668853][T31057] ? cx23885_dif_setup+0xfd20/0x39870
[ 3416.674230][T31057] ? get_timespec64+0xff/0x130
[ 3416.679020][T31057] __x64_sys_recvmmsg+0xf5/0x160
[ 3416.683975][T31057] do_syscall_64+0x44/0xd0
[ 3416.688390][T31057] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3416.694304][T31057] RIP: 0033:0x7f553bc44af9
[ 3416.698729][T31057] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3416.718327][T31057] RSP: 002b:00007f553b3bb188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 3416.726849][T31057] RAX: ffffffffffffffda RBX: 00007f553bd57f60 RCX: 00007f553bc44af9
[ 3416.734911][T31057] RDX: 04000000000003b4 RSI: 00000000200037c0 RDI: 0000000000000003
[ 3416.742978][T31057] RBP: 00007f553b3bb1d0 R08: 0000000020003700 R09: 0000000000000000
[ 3416.750954][T31057] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3416.758954][T31057] R13: 00007ffd3a6ac3af R14: 00007f553b3bb300 R15: 0000000000022000
[ 3416.766924][T31057]
[ 3416.773004][T31059] loop2: detected capacity change from 0 to 264192
22:07:11 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x7a00}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:11 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) (fail_nth: 85)
22:07:11 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000010701d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:11 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc01d0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:11 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00'})
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r1, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
[ 3416.800306][T31059] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:11 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x6000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3417.029326][T31167] FAULT_INJECTION: forcing a failure.
[ 3417.029326][T31167] name failslab, interval 1, probability 0, space 0, times 0
[ 3417.042037][T31167] CPU: 0 PID: 31167 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0
[ 3417.050855][T31167] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3417.060936][T31167] Call Trace:
[ 3417.064214][T31167]
[ 3417.067139][T31167] dump_stack_lvl+0xd6/0x122
[ 3417.071745][T31167] dump_stack+0x11/0x1b
[ 3417.075902][T31167] should_fail+0x23c/0x250
[ 3417.080445][T31167] __should_failslab+0x81/0x90
[ 3417.085251][T31167] should_failslab+0x5/0x20
[ 3417.089755][T31167] kmem_cache_alloc_node_trace+0x61/0x310
[ 3417.095479][T31167] ? __kmalloc_node_track_caller+0x30/0x40
[ 3417.097960][T31171] loop2: detected capacity change from 0 to 264192
[ 3417.101387][T31167] __kmalloc_node_track_caller+0x30/0x40
[ 3417.101414][T31167] ? netlink_dump+0x118/0x6b0
[ 3417.118310][T31167] __alloc_skb+0x19d/0x450
[ 3417.122759][T31167] netlink_dump+0x118/0x6b0
[ 3417.127267][T31167] ? __kfree_skb+0xfe/0x150
[ 3417.131785][T31167] netlink_recvmsg+0x486/0x810
[ 3417.136622][T31167] ? xfd_validate_state+0x4e/0xf0
[ 3417.141650][T31167] ? netlink_sendmsg+0x840/0x840
[ 3417.146593][T31167] ____sys_recvmsg+0x16c/0x320
[ 3417.151412][T31167] do_recvmmsg+0x3f5/0xae0
[ 3417.155880][T31167] ? cx23885_dif_setup+0xfd20/0x39870
[ 3417.161347][T31167] ? get_timespec64+0xff/0x130
[ 3417.166152][T31167] __x64_sys_recvmmsg+0xf5/0x160
[ 3417.171088][T31167] do_syscall_64+0x44/0xd0
[ 3417.175558][T31167] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3417.181510][T31167] RIP: 0033:0x7f553bc44af9
[ 3417.185916][T31167] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3417.205962][T31167] RSP: 002b:00007f553b3bb188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 3417.213722][T31171] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3417.214467][T31167] RAX: ffffffffffffffda RBX: 00007f553bd57f60 RCX: 00007f553bc44af9
22:07:11 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x7000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:11 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc01e0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3417.229426][T31167] RDX: 04000000000003b4 RSI: 00000000200037c0 RDI: 0000000000000003
[ 3417.237400][T31167] RBP: 00007f553b3bb1d0 R08: 0000000020003700 R09: 0000000000000000
[ 3417.245401][T31167] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3417.253373][T31167] R13: 00007ffd3a6ac3af R14: 00007f553b3bb300 R15: 0000000000022000
[ 3417.261353][T31167]
22:07:11 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00'})
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r1, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:11 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) (fail_nth: 86)
[ 3417.311317][T31175] loop1: detected capacity change from 0 to 512
22:07:12 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x800b}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3417.359970][T31175] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3417.367175][T31175] EXT4-fs (loop1): mount failed
22:07:12 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x8000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3417.413076][T31175] loop1: detected capacity change from 0 to 512
[ 3417.425988][T31175] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3417.433942][T31175] EXT4-fs (loop1): mount failed
[ 3417.440596][T31283] loop2: detected capacity change from 0 to 264192
[ 3417.457112][T31283] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3417.477988][T31284] FAULT_INJECTION: forcing a failure.
[ 3417.477988][T31284] name failslab, interval 1, probability 0, space 0, times 0
[ 3417.490827][T31284] CPU: 0 PID: 31284 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0
[ 3417.499594][T31284] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3417.509721][T31284] Call Trace:
[ 3417.512996][T31284]
[ 3417.515919][T31284] dump_stack_lvl+0xd6/0x122
[ 3417.520593][T31284] dump_stack+0x11/0x1b
[ 3417.524742][T31284] should_fail+0x23c/0x250
[ 3417.529230][T31284] ? skb_clone+0x12c/0x1f0
[ 3417.533656][T31284] __should_failslab+0x81/0x90
[ 3417.538599][T31284] should_failslab+0x5/0x20
[ 3417.543104][T31284] kmem_cache_alloc+0x4f/0x320
[ 3417.547866][T31284] skb_clone+0x12c/0x1f0
[ 3417.552166][T31284] netlink_deliver_tap+0x2da/0x510
[ 3417.557289][T31284] netlink_dump+0x4ba/0x6b0
[ 3417.561793][T31284] netlink_recvmsg+0x486/0x810
[ 3417.566549][T31284] ? netlink_sendmsg+0x840/0x840
[ 3417.571548][T31284] ____sys_recvmsg+0x16c/0x320
[ 3417.576324][T31284] do_recvmmsg+0x3f5/0xae0
[ 3417.580808][T31284] ? cx23885_dif_setup+0xfd20/0x39870
[ 3417.586240][T31284] ? get_timespec64+0xff/0x130
[ 3417.591072][T31284] __x64_sys_recvmmsg+0xf5/0x160
[ 3417.596013][T31284] do_syscall_64+0x44/0xd0
[ 3417.600581][T31284] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3417.606484][T31284] RIP: 0033:0x7f553bc44af9
[ 3417.610936][T31284] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3417.630570][T31284] RSP: 002b:00007f553b3bb188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 3417.639103][T31284] RAX: ffffffffffffffda RBX: 00007f553bd57f60 RCX: 00007f553bc44af9
[ 3417.647078][T31284] RDX: 04000000000003b4 RSI: 00000000200037c0 RDI: 0000000000000003
[ 3417.655046][T31284] RBP: 00007f553b3bb1d0 R08: 0000000020003700 R09: 0000000000000000
[ 3417.662999][T31284] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3417.671010][T31284] R13: 00007ffd3a6ac3af R14: 00007f553b3bb300 R15: 0000000000022000
22:07:12 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc01f0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:12 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00'})
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r1, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
[ 3417.678970][T31284]
22:07:12 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x9000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:12 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x8100}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:12 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) (fail_nth: 87)
22:07:12 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000010b01d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:12 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:12 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0xa000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3417.812593][T31393] loop2: detected capacity change from 0 to 264192
[ 3417.827921][T31393] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3417.871154][T31400] FAULT_INJECTION: forcing a failure.
[ 3417.871154][T31400] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 3417.884216][T31400] CPU: 0 PID: 31400 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0
[ 3417.893036][T31400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3417.903468][T31400] Call Trace:
[ 3417.906747][T31400]
[ 3417.909732][T31400] dump_stack_lvl+0xd6/0x122
[ 3417.914414][T31400] dump_stack+0x11/0x1b
[ 3417.918577][T31400] should_fail+0x23c/0x250
[ 3417.922992][T31400] should_fail_usercopy+0x16/0x20
[ 3417.928017][T31400] _copy_from_user+0x1c/0xd0
[ 3417.932614][T31400] do_recvmmsg+0x2c3/0xae0
[ 3417.937082][T31400] ? cx23885_dif_setup+0xfd20/0x39870
[ 3417.942474][T31400] ? get_timespec64+0xff/0x130
[ 3417.947290][T31400] __x64_sys_recvmmsg+0xf5/0x160
[ 3417.952234][T31400] do_syscall_64+0x44/0xd0
[ 3417.956667][T31400] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3417.962623][T31400] RIP: 0033:0x7f553bc44af9
[ 3417.967041][T31400] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3417.986797][T31400] RSP: 002b:00007f553b3bb188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 3417.995229][T31400] RAX: ffffffffffffffda RBX: 00007f553bd57f60 RCX: 00007f553bc44af9
[ 3418.003306][T31400] RDX: 04000000000003b4 RSI: 00000000200037c0 RDI: 0000000000000003
[ 3418.011336][T31400] RBP: 00007f553b3bb1d0 R08: 0000000020003700 R09: 0000000000000000
22:07:12 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:12 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) (fail_nth: 88)
22:07:12 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0xb000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:12 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0200100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:12 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x840b}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3418.019366][T31400] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3418.027321][T31400] R13: 00007ffd3a6ac3af R14: 00007f553b3bb300 R15: 0000000000022000
[ 3418.035283][T31400]
[ 3418.104000][T31507] loop1: detected capacity change from 0 to 512
[ 3418.123008][T31507] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3418.129516][T31507] EXT4-fs (loop1): mount failed
[ 3418.155177][T31507] loop1: detected capacity change from 0 to 512
[ 3418.163372][T31507] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3418.171899][T31507] EXT4-fs (loop1): mount failed
[ 3418.192818][T31515] FAULT_INJECTION: forcing a failure.
[ 3418.192818][T31515] name failslab, interval 1, probability 0, space 0, times 0
[ 3418.205570][T31515] CPU: 1 PID: 31515 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0
[ 3418.214360][T31515] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3418.224416][T31515] Call Trace:
[ 3418.227801][T31515]
[ 3418.230732][T31515] dump_stack_lvl+0xd6/0x122
[ 3418.235362][T31515] dump_stack+0x11/0x1b
[ 3418.239520][T31515] should_fail+0x23c/0x250
[ 3418.243932][T31515] __should_failslab+0x81/0x90
[ 3418.248695][T31515] should_failslab+0x5/0x20
[ 3418.253363][T31515] kmem_cache_alloc_node+0x61/0x2d0
[ 3418.258582][T31515] ? __alloc_skb+0xf0/0x450
[ 3418.263127][T31515] __alloc_skb+0xf0/0x450
[ 3418.267584][T31515] netlink_dump+0x118/0x6b0
[ 3418.272093][T31515] ? __kfree_skb+0xfe/0x150
[ 3418.276682][T31515] netlink_recvmsg+0x486/0x810
[ 3418.281456][T31515] ? xfd_validate_state+0x4e/0xf0
[ 3418.286486][T31515] ? netlink_sendmsg+0x840/0x840
[ 3418.291436][T31515] ____sys_recvmsg+0x16c/0x320
[ 3418.296198][T31515] do_recvmmsg+0x3f5/0xae0
[ 3418.300614][T31515] ? cx23885_dif_setup+0xfd20/0x39870
[ 3418.306124][T31515] ? get_timespec64+0xff/0x130
[ 3418.310961][T31515] __x64_sys_recvmmsg+0xf5/0x160
[ 3418.315920][T31515] do_syscall_64+0x44/0xd0
[ 3418.320353][T31515] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3418.326293][T31515] RIP: 0033:0x7f553bc44af9
[ 3418.330706][T31515] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3418.350363][T31515] RSP: 002b:00007f553b3bb188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 3418.358813][T31515] RAX: ffffffffffffffda RBX: 00007f553bd57f60 RCX: 00007f553bc44af9
[ 3418.366844][T31515] RDX: 04000000000003b4 RSI: 00000000200037c0 RDI: 0000000000000003
[ 3418.374809][T31515] RBP: 00007f553b3bb1d0 R08: 0000000020003700 R09: 0000000000000000
[ 3418.382889][T31515] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3418.390940][T31515] R13: 00007ffd3a6ac3af R14: 00007f553b3bb300 R15: 0000000000022000
[ 3418.399082][T31515]
22:07:13 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0xc000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:13 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) (fail_nth: 89)
22:07:13 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:13 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000010040d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3418.476646][T31519] loop2: detected capacity change from 0 to 264192
22:07:13 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x8847}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:13 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0210100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3418.532614][T31519] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:13 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0xf000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3418.705978][T31625] FAULT_INJECTION: forcing a failure.
[ 3418.705978][T31625] name failslab, interval 1, probability 0, space 0, times 0
[ 3418.718679][T31625] CPU: 0 PID: 31625 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0
[ 3418.727475][T31625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3418.737522][T31625] Call Trace:
[ 3418.740796][T31625]
[ 3418.743718][T31625] dump_stack_lvl+0xd6/0x122
[ 3418.748370][T31625] dump_stack+0x11/0x1b
[ 3418.752715][T31625] should_fail+0x23c/0x250
[ 3418.757138][T31625] __should_failslab+0x81/0x90
[ 3418.761990][T31625] should_failslab+0x5/0x20
[ 3418.766525][T31625] kmem_cache_alloc_node_trace+0x61/0x310
[ 3418.772334][T31625] ? __kmalloc_node_track_caller+0x30/0x40
[ 3418.778151][T31625] __kmalloc_node_track_caller+0x30/0x40
[ 3418.783820][T31625] ? netlink_dump+0x118/0x6b0
[ 3418.788518][T31625] __alloc_skb+0x19d/0x450
[ 3418.792985][T31625] netlink_dump+0x118/0x6b0
[ 3418.797578][T31625] ? __kfree_skb+0xfe/0x150
[ 3418.802093][T31625] netlink_recvmsg+0x486/0x810
[ 3418.807003][T31625] ? rb_insert_color+0x2cb/0x310
[ 3418.812051][T31625] ? netlink_sendmsg+0x840/0x840
[ 3418.817111][T31625] ____sys_recvmsg+0x16c/0x320
[ 3418.821954][T31625] do_recvmmsg+0x3f5/0xae0
[ 3418.826511][T31625] ? get_timespec64+0xff/0x130
[ 3418.831278][T31625] __x64_sys_recvmmsg+0xf5/0x160
[ 3418.836226][T31625] do_syscall_64+0x44/0xd0
[ 3418.840649][T31625] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3418.846593][T31625] RIP: 0033:0x7f553bc44af9
[ 3418.851010][T31625] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3418.870755][T31625] RSP: 002b:00007f553b3bb188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 3418.879283][T31625] RAX: ffffffffffffffda RBX: 00007f553bd57f60 RCX: 00007f553bc44af9
[ 3418.887284][T31625] RDX: 04000000000003b4 RSI: 00000000200037c0 RDI: 0000000000000003
[ 3418.895255][T31625] RBP: 00007f553b3bb1d0 R08: 0000000020003700 R09: 0000000000000000
22:07:13 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x8848}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:13 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x10000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:13 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
[ 3418.903290][T31625] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3418.911473][T31625] R13: 00007ffd3a6ac3af R14: 00007f553b3bb300 R15: 0000000000022000
[ 3418.919538][T31625]
22:07:13 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) (fail_nth: 90)
[ 3418.948544][T31734] loop1: detected capacity change from 0 to 512
[ 3418.962647][T31735] loop2: detected capacity change from 0 to 264192
[ 3418.973345][T31735] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3418.984596][T31734] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3418.991082][T31734] EXT4-fs (loop1): mount failed
22:07:13 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0220100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:13 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000010140d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:13 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x11000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3419.021823][T31734] loop1: detected capacity change from 0 to 512
[ 3419.029739][T31734] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3419.038355][T31734] EXT4-fs (loop1): mount failed
[ 3419.124669][T31762] FAULT_INJECTION: forcing a failure.
[ 3419.124669][T31762] name failslab, interval 1, probability 0, space 0, times 0
[ 3419.137344][T31762] CPU: 0 PID: 31762 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0
[ 3419.146288][T31762] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3419.156367][T31762] Call Trace:
[ 3419.159643][T31762]
[ 3419.162565][T31762] dump_stack_lvl+0xd6/0x122
[ 3419.167221][T31762] dump_stack+0x11/0x1b
22:07:13 executing program 4:
set_mempolicy(0x0, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
[ 3419.171385][T31762] should_fail+0x23c/0x250
[ 3419.175819][T31762] ? skb_clone+0x12c/0x1f0
[ 3419.180266][T31762] __should_failslab+0x81/0x90
[ 3419.185035][T31762] should_failslab+0x5/0x20
[ 3419.189546][T31762] kmem_cache_alloc+0x4f/0x320
[ 3419.194322][T31762] skb_clone+0x12c/0x1f0
[ 3419.198784][T31762] netlink_deliver_tap+0x2da/0x510
[ 3419.203944][T31762] netlink_dump+0x4ba/0x6b0
[ 3419.208453][T31762] netlink_recvmsg+0x486/0x810
[ 3419.213234][T31762] ? xfd_validate_state+0x4e/0xf0
[ 3419.218272][T31762] ? netlink_sendmsg+0x840/0x840
[ 3419.223276][T31762] ____sys_recvmsg+0x16c/0x320
[ 3419.228070][T31762] do_recvmmsg+0x3f5/0xae0
[ 3419.232561][T31762] ? cx23885_dif_setup+0xfd20/0x39870
[ 3419.238010][T31762] ? get_timespec64+0xff/0x130
[ 3419.242791][T31762] __x64_sys_recvmmsg+0xf5/0x160
[ 3419.247735][T31762] do_syscall_64+0x44/0xd0
[ 3419.252156][T31762] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3419.258054][T31762] RIP: 0033:0x7f553bc44af9
22:07:13 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x940a}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3419.262470][T31762] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3419.282082][T31762] RSP: 002b:00007f553b3bb188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 3419.290640][T31762] RAX: ffffffffffffffda RBX: 00007f553bd57f60 RCX: 00007f553bc44af9
[ 3419.298610][T31762] RDX: 04000000000003b4 RSI: 00000000200037c0 RDI: 0000000000000003
[ 3419.306643][T31762] RBP: 00007f553b3bb1d0 R08: 0000000020003700 R09: 0000000000000000
[ 3419.314614][T31762] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3419.322581][T31762] R13: 00007ffd3a6ac3af R14: 00007f553b3bb300 R15: 0000000000022000
[ 3419.330558][T31762]
22:07:14 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x60000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:14 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) (fail_nth: 91)
22:07:14 executing program 4:
set_mempolicy(0x0, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
[ 3419.377044][T31854] loop2: detected capacity change from 0 to 264192
[ 3419.405516][T31854] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:14 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0230100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:14 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xa40b}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3419.426241][T31908] loop1: detected capacity change from 0 to 512
[ 3419.444221][T31908] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3419.452287][T31908] EXT4-fs (loop1): mount failed
22:07:14 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x65580000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3419.512154][T31908] loop1: detected capacity change from 0 to 512
[ 3419.520164][T31908] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3419.527442][T31908] EXT4-fs (loop1): mount failed
[ 3419.533060][T31961] FAULT_INJECTION: forcing a failure.
[ 3419.533060][T31961] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 3419.546149][T31961] CPU: 0 PID: 31961 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0
[ 3419.554986][T31961] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3419.565029][T31961] Call Trace:
[ 3419.568406][T31961]
[ 3419.571373][T31961] dump_stack_lvl+0xd6/0x122
[ 3419.575990][T31961] dump_stack+0x11/0x1b
[ 3419.580211][T31961] should_fail+0x23c/0x250
[ 3419.584622][T31961] should_fail_usercopy+0x16/0x20
[ 3419.589641][T31961] _copy_from_user+0x1c/0xd0
[ 3419.594270][T31961] do_recvmmsg+0x2c3/0xae0
[ 3419.598692][T31961] ? cx23885_dif_setup+0xfd20/0x39870
[ 3419.604143][T31961] ? get_timespec64+0xff/0x130
[ 3419.608908][T31961] __x64_sys_recvmmsg+0xf5/0x160
[ 3419.613881][T31961] do_syscall_64+0x44/0xd0
[ 3419.618298][T31961] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3419.624227][T31961] RIP: 0033:0x7f553bc44af9
[ 3419.628672][T31961] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3419.648410][T31961] RSP: 002b:00007f553b3bb188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
22:07:14 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x6b210000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:14 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) (fail_nth: 92)
22:07:14 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000010240d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3419.656829][T31961] RAX: ffffffffffffffda RBX: 00007f553bd57f60 RCX: 00007f553bc44af9
[ 3419.664800][T31961] RDX: 04000000000003b4 RSI: 00000000200037c0 RDI: 0000000000000003
[ 3419.672773][T31961] RBP: 00007f553b3bb1d0 R08: 0000000020003700 R09: 0000000000000000
[ 3419.680748][T31961] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3419.688780][T31961] R13: 00007ffd3a6ac3af R14: 00007f553b3bb300 R15: 0000000000022000
[ 3419.696839][T31961]
22:07:14 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x81000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:14 executing program 4:
set_mempolicy(0x0, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
[ 3419.734202][T31968] loop2: detected capacity change from 0 to 264192
[ 3419.773478][T31968] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3419.819773][T32036] FAULT_INJECTION: forcing a failure.
[ 3419.819773][T32036] name failslab, interval 1, probability 0, space 0, times 0
[ 3419.832464][T32036] CPU: 0 PID: 32036 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0
[ 3419.841234][T32036] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3419.851287][T32036] Call Trace:
[ 3419.854561][T32036]
[ 3419.857491][T32036] dump_stack_lvl+0xd6/0x122
[ 3419.862090][T32036] dump_stack+0x11/0x1b
[ 3419.866263][T32036] should_fail+0x23c/0x250
[ 3419.870682][T32036] __should_failslab+0x81/0x90
[ 3419.875573][T32036] should_failslab+0x5/0x20
[ 3419.880141][T32036] kmem_cache_alloc_node+0x61/0x2d0
[ 3419.885355][T32036] ? __alloc_skb+0xf0/0x450
[ 3419.889942][T32036] __alloc_skb+0xf0/0x450
[ 3419.894341][T32036] netlink_dump+0x118/0x6b0
[ 3419.898906][T32036] ? __kfree_skb+0xfe/0x150
[ 3419.903485][T32036] netlink_recvmsg+0x486/0x810
[ 3419.908262][T32036] ? netlink_sendmsg+0x840/0x840
[ 3419.913211][T32036] ____sys_recvmsg+0x16c/0x320
[ 3419.917963][T32036] do_recvmmsg+0x3f5/0xae0
[ 3419.922729][T32036] ? cx23885_dif_setup+0xfd20/0x39870
[ 3419.928100][T32036] ? get_timespec64+0xff/0x130
[ 3419.932864][T32036] __x64_sys_recvmmsg+0xf5/0x160
[ 3419.937787][T32036] do_syscall_64+0x44/0xd0
[ 3419.942267][T32036] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3419.948148][T32036] RIP: 0033:0x7f553bc44af9
[ 3419.952642][T32036] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3419.972539][T32036] RSP: 002b:00007f553b3bb188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 3419.981024][T32036] RAX: ffffffffffffffda RBX: 00007f553bd57f60 RCX: 00007f553bc44af9
[ 3419.989013][T32036] RDX: 04000000000003b4 RSI: 00000000200037c0 RDI: 0000000000000003
[ 3419.997009][T32036] RBP: 00007f553b3bb1d0 R08: 0000000020003700 R09: 0000000000000000
[ 3420.004973][T32036] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
22:07:14 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xa80a}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3420.012962][T32036] R13: 00007ffd3a6ac3af R14: 00007f553b3bb300 R15: 0000000000022000
[ 3420.021010][T32036]
22:07:14 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) (fail_nth: 93)
22:07:14 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x81ffffff}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:14 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0240100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3420.052403][T31968] loop2: detected capacity change from 0 to 264192
22:07:14 executing program 4:
set_mempolicy(0x3, 0x0, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
[ 3420.094385][T32079] loop1: detected capacity change from 0 to 512
[ 3420.111150][T32079] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3420.117645][T32079] EXT4-fs (loop1): mount failed
22:07:14 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x88470000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3420.175746][T32079] loop1: detected capacity change from 0 to 512
[ 3420.203607][T32079] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3420.214415][T32079] EXT4-fs (loop1): mount failed
[ 3420.243196][T32121] FAULT_INJECTION: forcing a failure.
[ 3420.243196][T32121] name failslab, interval 1, probability 0, space 0, times 0
[ 3420.255896][T32121] CPU: 1 PID: 32121 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0
[ 3420.264762][T32121] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3420.274872][T32121] Call Trace:
[ 3420.278156][T32121]
[ 3420.281081][T32121] dump_stack_lvl+0xd6/0x122
[ 3420.285774][T32121] dump_stack+0x11/0x1b
[ 3420.289962][T32121] should_fail+0x23c/0x250
[ 3420.294386][T32121] __should_failslab+0x81/0x90
[ 3420.299154][T32121] should_failslab+0x5/0x20
[ 3420.303729][T32121] kmem_cache_alloc_node_trace+0x61/0x310
[ 3420.309443][T32121] ? __kmalloc_node_track_caller+0x30/0x40
[ 3420.315248][T32121] __kmalloc_node_track_caller+0x30/0x40
[ 3420.320939][T32121] ? netlink_dump+0x118/0x6b0
[ 3420.325691][T32121] __alloc_skb+0x19d/0x450
[ 3420.330110][T32121] netlink_dump+0x118/0x6b0
[ 3420.334686][T32121] ? __kfree_skb+0xfe/0x150
[ 3420.339195][T32121] netlink_recvmsg+0x486/0x810
[ 3420.344036][T32121] ? xfd_validate_state+0x4e/0xf0
[ 3420.349124][T32121] ? netlink_sendmsg+0x840/0x840
[ 3420.354068][T32121] ____sys_recvmsg+0x16c/0x320
[ 3420.358852][T32121] do_recvmmsg+0x3f5/0xae0
[ 3420.363312][T32121] ? cx23885_dif_setup+0xfd20/0x39870
[ 3420.368688][T32121] ? get_timespec64+0xff/0x130
[ 3420.373504][T32121] __x64_sys_recvmmsg+0xf5/0x160
[ 3420.378437][T32121] do_syscall_64+0x44/0xd0
[ 3420.382917][T32121] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3420.388851][T32121] RIP: 0033:0x7f553bc44af9
[ 3420.393307][T32121] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3420.412909][T32121] RSP: 002b:00007f553b3bb188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 3420.421385][T32121] RAX: ffffffffffffffda RBX: 00007f553bd57f60 RCX: 00007f553bc44af9
[ 3420.429377][T32121] RDX: 04000000000003b4 RSI: 00000000200037c0 RDI: 0000000000000003
22:07:15 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xb40a}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:15 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) (fail_nth: 94)
[ 3420.437346][T32121] RBP: 00007f553b3bb1d0 R08: 0000000020003700 R09: 0000000000000000
[ 3420.445312][T32121] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3420.453276][T32121] R13: 00007ffd3a6ac3af R14: 00007f553b3bb300 R15: 0000000000022000
[ 3420.461261][T32121]
22:07:15 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000010340d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:15 executing program 4:
set_mempolicy(0x3, 0x0, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:15 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0250100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3420.509705][T32191] loop2: detected capacity change from 0 to 264192
[ 3420.525801][T32191] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:15 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x88480000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:15 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x88a8ffff}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3420.637241][T32197] FAULT_INJECTION: forcing a failure.
[ 3420.637241][T32197] name failslab, interval 1, probability 0, space 0, times 0
[ 3420.649936][T32197] CPU: 0 PID: 32197 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0
[ 3420.658786][T32197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3420.668842][T32197] Call Trace:
[ 3420.672148][T32197]
[ 3420.675077][T32197] dump_stack_lvl+0xd6/0x122
[ 3420.679758][T32197] dump_stack+0x11/0x1b
[ 3420.683991][T32197] should_fail+0x23c/0x250
[ 3420.688465][T32197] ? skb_clone+0x12c/0x1f0
[ 3420.692887][T32197] __should_failslab+0x81/0x90
[ 3420.697660][T32197] should_failslab+0x5/0x20
[ 3420.702178][T32197] kmem_cache_alloc+0x4f/0x320
[ 3420.706949][T32197] skb_clone+0x12c/0x1f0
[ 3420.711288][T32197] netlink_deliver_tap+0x2da/0x510
[ 3420.716472][T32197] netlink_dump+0x4ba/0x6b0
[ 3420.721060][T32197] netlink_recvmsg+0x486/0x810
[ 3420.725859][T32197] ? xfd_validate_state+0x4e/0xf0
[ 3420.730921][T32197] ? netlink_sendmsg+0x840/0x840
[ 3420.735866][T32197] ____sys_recvmsg+0x16c/0x320
[ 3420.740638][T32197] do_recvmmsg+0x3f5/0xae0
[ 3420.745112][T32197] ? cx23885_dif_setup+0xfd20/0x39870
[ 3420.750491][T32197] ? get_timespec64+0xff/0x130
[ 3420.755301][T32197] __x64_sys_recvmmsg+0xf5/0x160
[ 3420.760241][T32197] do_syscall_64+0x44/0xd0
[ 3420.764657][T32197] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3420.770555][T32197] RIP: 0033:0x7f553bc44af9
22:07:15 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xb80a}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3420.774966][T32197] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3420.794609][T32197] RSP: 002b:00007f553b3bb188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 3420.803022][T32197] RAX: ffffffffffffffda RBX: 00007f553bd57f60 RCX: 00007f553bc44af9
[ 3420.811033][T32197] RDX: 04000000000003b4 RSI: 00000000200037c0 RDI: 0000000000000003
[ 3420.819003][T32197] RBP: 00007f553b3bb1d0 R08: 0000000020003700 R09: 0000000000000000
[ 3420.827035][T32197] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
22:07:15 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) (fail_nth: 95)
[ 3420.835008][T32197] R13: 00007ffd3a6ac3af R14: 00007f553b3bb300 R15: 0000000000022000
[ 3420.842979][T32197]
[ 3420.875538][T32304] loop1: detected capacity change from 0 to 512
22:07:15 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x9effffff}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:15 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0260100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:15 executing program 4:
set_mempolicy(0x3, 0x0, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
[ 3420.885959][T32305] loop2: detected capacity change from 0 to 264192
[ 3420.902456][T32305] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3420.910721][T32304] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3420.917522][T32304] EXT4-fs (loop1): mount failed
[ 3420.984760][T32304] loop1: detected capacity change from 0 to 512
[ 3421.003876][T32304] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3421.012239][T32304] EXT4-fs (loop1): mount failed
[ 3421.038299][T32385] FAULT_INJECTION: forcing a failure.
[ 3421.038299][T32385] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 3421.051445][T32385] CPU: 0 PID: 32385 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0
[ 3421.060247][T32385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3421.070308][T32385] Call Trace:
[ 3421.073588][T32385]
[ 3421.076511][T32385] dump_stack_lvl+0xd6/0x122
[ 3421.081189][T32385] dump_stack+0x11/0x1b
[ 3421.085416][T32385] should_fail+0x23c/0x250
[ 3421.089912][T32385] should_fail_usercopy+0x16/0x20
[ 3421.095129][T32385] _copy_from_user+0x1c/0xd0
[ 3421.099782][T32385] do_recvmmsg+0x2c3/0xae0
[ 3421.104200][T32385] ? get_timespec64+0xff/0x130
[ 3421.108981][T32385] __x64_sys_recvmmsg+0xf5/0x160
[ 3421.113927][T32385] do_syscall_64+0x44/0xd0
[ 3421.118348][T32385] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3421.124245][T32385] RIP: 0033:0x7f553bc44af9
22:07:15 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0xeaffffff}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:15 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xb80b}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3421.128653][T32385] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3421.148294][T32385] RSP: 002b:00007f553b3bb188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 3421.157184][T32385] RAX: ffffffffffffffda RBX: 00007f553bd57f60 RCX: 00007f553bc44af9
[ 3421.165159][T32385] RDX: 04000000000003b4 RSI: 00000000200037c0 RDI: 0000000000000003
[ 3421.173132][T32385] RBP: 00007f553b3bb1d0 R08: 0000000020003700 R09: 0000000000000000
[ 3421.181104][T32385] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
22:07:15 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000010440d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:15 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) (fail_nth: 96)
[ 3421.189140][T32385] R13: 00007ffd3a6ac3af R14: 00007f553b3bb300 R15: 0000000000022000
[ 3421.197123][T32385]
22:07:15 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0xefffffff}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:15 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0), 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:15 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0270100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3421.230184][T32420] loop2: detected capacity change from 0 to 264192
[ 3421.249538][T32420] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3421.331689][T32425] FAULT_INJECTION: forcing a failure.
[ 3421.331689][T32425] name failslab, interval 1, probability 0, space 0, times 0
[ 3421.344917][T32425] CPU: 1 PID: 32425 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0
[ 3421.353693][T32425] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3421.363775][T32425] Call Trace:
[ 3421.367745][T32425]
[ 3421.370789][T32425] dump_stack_lvl+0xd6/0x122
[ 3421.375439][T32425] dump_stack+0x11/0x1b
[ 3421.379621][T32425] should_fail+0x23c/0x250
[ 3421.384039][T32425] __should_failslab+0x81/0x90
[ 3421.388850][T32425] should_failslab+0x5/0x20
[ 3421.393356][T32425] kmem_cache_alloc_node+0x61/0x2d0
[ 3421.398554][T32425] ? __alloc_skb+0xf0/0x450
[ 3421.403131][T32425] __alloc_skb+0xf0/0x450
[ 3421.407507][T32425] netlink_dump+0x118/0x6b0
[ 3421.412048][T32425] ? __kfree_skb+0xfe/0x150
[ 3421.416557][T32425] netlink_recvmsg+0x486/0x810
[ 3421.421357][T32425] ? xfd_validate_state+0x4e/0xf0
[ 3421.426459][T32425] ? netlink_sendmsg+0x840/0x840
[ 3421.431399][T32425] ____sys_recvmsg+0x16c/0x320
[ 3421.436158][T32425] do_recvmmsg+0x3f5/0xae0
[ 3421.440586][T32425] ? cx23885_dif_setup+0xfd20/0x39870
[ 3421.445971][T32425] ? get_timespec64+0xff/0x130
[ 3421.450756][T32425] __x64_sys_recvmmsg+0xf5/0x160
[ 3421.455725][T32425] do_syscall_64+0x44/0xd0
[ 3421.460136][T32425] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3421.466035][T32425] RIP: 0033:0x7f553bc44af9
[ 3421.470479][T32425] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3421.490179][T32425] RSP: 002b:00007f553b3bb188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 3421.498591][T32425] RAX: ffffffffffffffda RBX: 00007f553bd57f60 RCX: 00007f553bc44af9
[ 3421.506621][T32425] RDX: 04000000000003b4 RSI: 00000000200037c0 RDI: 0000000000000003
[ 3421.514785][T32425] RBP: 00007f553b3bb1d0 R08: 0000000020003700 R09: 0000000000000000
[ 3421.522768][T32425] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
22:07:16 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xb80c}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:16 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) (fail_nth: 97)
[ 3421.530800][T32425] R13: 00007ffd3a6ac3af R14: 00007f553b3bb300 R15: 0000000000022000
[ 3421.538849][T32425]
22:07:16 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0xf0ffffff}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3421.683644][T32530] loop1: detected capacity change from 0 to 512
[ 3421.707215][T32530] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3421.716478][T32530] EXT4-fs (loop1): mount failed
22:07:16 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0), 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
[ 3421.752917][T32530] loop1: detected capacity change from 0 to 512
[ 3421.773027][T32530] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3421.781680][T32530] EXT4-fs (loop1): mount failed
[ 3421.787415][T32538] loop2: detected capacity change from 0 to 264192
[ 3421.806834][T32538] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3421.823604][T32540] FAULT_INJECTION: forcing a failure.
[ 3421.823604][T32540] name failslab, interval 1, probability 0, space 0, times 0
[ 3421.836239][T32540] CPU: 0 PID: 32540 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0
[ 3421.845112][T32540] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3421.855162][T32540] Call Trace:
[ 3421.858440][T32540]
[ 3421.861369][T32540] dump_stack_lvl+0xd6/0x122
[ 3421.865986][T32540] dump_stack+0x11/0x1b
[ 3421.870140][T32540] should_fail+0x23c/0x250
[ 3421.874551][T32540] __should_failslab+0x81/0x90
[ 3421.879341][T32540] should_failslab+0x5/0x20
[ 3421.883939][T32540] kmem_cache_alloc_node_trace+0x61/0x310
[ 3421.889694][T32540] ? __kmalloc_node_track_caller+0x30/0x40
[ 3421.895570][T32540] __kmalloc_node_track_caller+0x30/0x40
[ 3421.901243][T32540] ? netlink_dump+0x118/0x6b0
[ 3421.905931][T32540] __alloc_skb+0x19d/0x450
[ 3421.910438][T32540] netlink_dump+0x118/0x6b0
[ 3421.914939][T32540] ? __kfree_skb+0xfe/0x150
[ 3421.919466][T32540] netlink_recvmsg+0x486/0x810
[ 3421.924259][T32540] ? netlink_sendmsg+0x840/0x840
[ 3421.929214][T32540] ____sys_recvmsg+0x16c/0x320
[ 3421.934020][T32540] do_recvmmsg+0x3f5/0xae0
[ 3421.938498][T32540] ? cx23885_dif_setup+0xfd20/0x39870
[ 3421.943875][T32540] ? get_timespec64+0xff/0x130
[ 3421.948707][T32540] __x64_sys_recvmmsg+0xf5/0x160
22:07:16 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000010540d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:16 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0xfeffffff}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3421.953716][T32540] do_syscall_64+0x44/0xd0
[ 3421.958139][T32540] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3421.964073][T32540] RIP: 0033:0x7f553bc44af9
[ 3421.968478][T32540] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3421.988083][T32540] RSP: 002b:00007f553b3bb188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 3421.996519][T32540] RAX: ffffffffffffffda RBX: 00007f553bd57f60 RCX: 00007f553bc44af9
22:07:16 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0280100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3422.004546][T32540] RDX: 04000000000003b4 RSI: 00000000200037c0 RDI: 0000000000000003
[ 3422.012530][T32540] RBP: 00007f553b3bb1d0 R08: 0000000020003700 R09: 0000000000000000
[ 3422.020715][T32540] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3422.028690][T32540] R13: 00007ffd3a6ac3af R14: 00007f553b3bb300 R15: 0000000000022000
[ 3422.036662][T32540]
22:07:16 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) (fail_nth: 98)
22:07:16 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0xffffa888}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:16 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xc40a}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:16 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0), 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
[ 3422.184944][T32649] loop1: detected capacity change from 0 to 512
[ 3422.206436][T32652] loop2: detected capacity change from 0 to 264192
[ 3422.216268][T32649] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3422.228224][T32649] EXT4-fs (loop1): mount failed
[ 3422.235531][T32652] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3422.252817][T32655] FAULT_INJECTION: forcing a failure.
[ 3422.252817][T32655] name failslab, interval 1, probability 0, space 0, times 0
[ 3422.265541][T32655] CPU: 0 PID: 32655 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0
[ 3422.274382][T32655] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3422.284437][T32655] Call Trace:
[ 3422.287709][T32655]
[ 3422.290637][T32655] dump_stack_lvl+0xd6/0x122
[ 3422.295224][T32655] dump_stack+0x11/0x1b
[ 3422.299440][T32655] should_fail+0x23c/0x250
[ 3422.303848][T32655] ? skb_clone+0x12c/0x1f0
[ 3422.308262][T32655] __should_failslab+0x81/0x90
[ 3422.313026][T32655] should_failslab+0x5/0x20
[ 3422.317531][T32655] kmem_cache_alloc+0x4f/0x320
[ 3422.322376][T32655] skb_clone+0x12c/0x1f0
[ 3422.326622][T32655] netlink_deliver_tap+0x2da/0x510
[ 3422.331738][T32655] netlink_dump+0x4ba/0x6b0
[ 3422.336258][T32655] netlink_recvmsg+0x486/0x810
[ 3422.341062][T32655] ? rb_insert_color+0x7e/0x310
[ 3422.345911][T32655] ? netlink_sendmsg+0x840/0x840
[ 3422.350989][T32655] ____sys_recvmsg+0x16c/0x320
[ 3422.355754][T32655] do_recvmmsg+0x3f5/0xae0
[ 3422.360165][T32655] ? cx23885_dif_setup+0xfd20/0x39870
[ 3422.365547][T32655] ? get_timespec64+0xff/0x130
[ 3422.370306][T32655] __x64_sys_recvmmsg+0xf5/0x160
[ 3422.375239][T32655] do_syscall_64+0x44/0xd0
[ 3422.379649][T32655] entry_SYSCALL_64_after_hwframe+0x44/0xae
22:07:17 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0xffffff7f}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3422.385682][T32655] RIP: 0033:0x7f553bc44af9
[ 3422.390094][T32655] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3422.409861][T32655] RSP: 002b:00007f553b3bb188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 3422.418391][T32655] RAX: ffffffffffffffda RBX: 00007f553bd57f60 RCX: 00007f553bc44af9
[ 3422.426367][T32655] RDX: 04000000000003b4 RSI: 00000000200037c0 RDI: 0000000000000003
22:07:17 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0290100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3422.434369][T32655] RBP: 00007f553b3bb1d0 R08: 0000000020003700 R09: 0000000000000000
[ 3422.442336][T32655] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3422.450302][T32655] R13: 00007ffd3a6ac3af R14: 00007f553b3bb300 R15: 0000000000022000
[ 3422.458312][T32655]
22:07:17 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x0)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:17 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) (fail_nth: 99)
22:07:17 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0xffffff81}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:17 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xc40e}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:17 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000010640d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3422.520017][T32649] loop1: detected capacity change from 0 to 512
[ 3422.537423][T32649] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3422.545445][T32649] EXT4-fs (loop1): mount failed
[ 3422.598929][T32767] loop2: detected capacity change from 0 to 264192
[ 3422.622964][T32767] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3422.631945][ T300] FAULT_INJECTION: forcing a failure.
[ 3422.631945][ T300] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 3422.645027][ T300] CPU: 0 PID: 300 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0
[ 3422.653618][ T300] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3422.663743][ T300] Call Trace:
[ 3422.667045][ T300]
[ 3422.669975][ T300] dump_stack_lvl+0xd6/0x122
[ 3422.674591][ T300] dump_stack+0x11/0x1b
[ 3422.678792][ T300] should_fail+0x23c/0x250
[ 3422.683206][ T300] should_fail_usercopy+0x16/0x20
[ 3422.688319][ T300] _copy_from_user+0x1c/0xd0
[ 3422.692960][ T300] do_recvmmsg+0x2c3/0xae0
[ 3422.697393][ T300] ? get_timespec64+0xff/0x130
[ 3422.702154][ T300] __x64_sys_recvmmsg+0xf5/0x160
[ 3422.707089][ T300] do_syscall_64+0x44/0xd0
[ 3422.711558][ T300] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3422.717451][ T300] RIP: 0033:0x7f553bc44af9
[ 3422.721912][ T300] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
22:07:17 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0xffffff9e}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:17 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc02a0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:17 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) (fail_nth: 100)
22:07:17 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x0)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
[ 3422.741597][ T300] RSP: 002b:00007f553b3bb188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 3422.750058][ T300] RAX: ffffffffffffffda RBX: 00007f553bd57f60 RCX: 00007f553bc44af9
[ 3422.758095][ T300] RDX: 04000000000003b4 RSI: 00000000200037c0 RDI: 0000000000000003
[ 3422.766158][ T300] RBP: 00007f553b3bb1d0 R08: 0000000020003700 R09: 0000000000000000
[ 3422.774182][ T300] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3422.782148][ T300] R13: 00007ffd3a6ac3af R14: 00007f553b3bb300 R15: 0000000000022000
[ 3422.790117][ T300]
22:07:17 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xc80a}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3422.871862][ T319] loop1: detected capacity change from 0 to 512
[ 3422.885899][ T319] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3422.893487][ T319] EXT4-fs (loop1): mount failed
22:07:17 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0xffffffea}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3422.926603][ T319] loop1: detected capacity change from 0 to 512
[ 3422.935037][ T319] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3422.947434][ T319] EXT4-fs (loop1): mount failed
[ 3422.974258][ T418] FAULT_INJECTION: forcing a failure.
[ 3422.974258][ T418] name failslab, interval 1, probability 0, space 0, times 0
[ 3422.987087][ T418] CPU: 1 PID: 418 Comm: syz-executor.5 Not tainted 5.16.0-rc4-syzkaller #0
[ 3422.995677][ T418] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3423.005795][ T418] Call Trace:
[ 3423.009242][ T418]
[ 3423.012210][ T418] dump_stack_lvl+0xd6/0x122
[ 3423.016800][ T418] dump_stack+0x11/0x1b
[ 3423.021040][ T418] should_fail+0x23c/0x250
[ 3423.025453][ T418] __should_failslab+0x81/0x90
[ 3423.030222][ T418] should_failslab+0x5/0x20
[ 3423.034780][ T418] kmem_cache_alloc_node+0x61/0x2d0
[ 3423.040060][ T418] ? __alloc_skb+0xf0/0x450
[ 3423.044580][ T418] __alloc_skb+0xf0/0x450
[ 3423.048938][ T418] netlink_dump+0x118/0x6b0
[ 3423.053506][ T418] ? __kfree_skb+0xfe/0x150
[ 3423.058021][ T418] netlink_recvmsg+0x486/0x810
[ 3423.062825][ T418] ? xfd_validate_state+0x4e/0xf0
[ 3423.067848][ T418] ? netlink_sendmsg+0x840/0x840
[ 3423.072783][ T418] ____sys_recvmsg+0x16c/0x320
[ 3423.077604][ T418] do_recvmmsg+0x3f5/0xae0
[ 3423.082015][ T418] ? cx23885_dif_setup+0xfd20/0x39870
[ 3423.087425][ T418] ? get_timespec64+0xff/0x130
[ 3423.092182][ T418] __x64_sys_recvmmsg+0xf5/0x160
[ 3423.097141][ T418] do_syscall_64+0x44/0xd0
[ 3423.101553][ T418] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3423.107605][ T418] RIP: 0033:0x7f553bc44af9
[ 3423.112068][ T418] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3423.131669][ T418] RSP: 002b:00007f553b3bb188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 3423.140090][ T418] RAX: ffffffffffffffda RBX: 00007f553bd57f60 RCX: 00007f553bc44af9
[ 3423.148099][ T418] RDX: 04000000000003b4 RSI: 00000000200037c0 RDI: 0000000000000003
[ 3423.156063][ T418] RBP: 00007f553b3bb1d0 R08: 0000000020003700 R09: 0000000000000000
[ 3423.164333][ T418] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003
22:07:17 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000010740d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:17 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3423.172308][ T418] R13: 00007ffd3a6ac3af R14: 00007f553b3bb300 R15: 0000000000022000
[ 3423.180275][ T418]
[ 3423.217294][ T420] loop2: detected capacity change from 0 to 264192
22:07:17 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x0)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:17 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc02b0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3423.243326][ T420] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:17 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0xffffffef}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:18 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xc80b}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:18 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xc, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:18 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:18 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0xfffffff0}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3423.396092][ T534] loop1: detected capacity change from 0 to 512
[ 3423.424132][ T534] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3423.431534][ T534] EXT4-fs (loop1): mount failed
[ 3423.438831][ T537] loop2: detected capacity change from 0 to 264192
22:07:18 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc02c0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:18 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000010840d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3423.463056][ T537] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3423.472229][ T534] loop1: detected capacity change from 0 to 512
[ 3423.480389][ T534] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3423.486985][ T534] EXT4-fs (loop1): mount failed
22:07:18 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0xfffffffe}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:18 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:18 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xadc}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:18 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xd40a}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:18 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc02d0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3423.629657][ T638] loop2: detected capacity change from 0 to 264192
[ 3423.647970][ T638] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:18 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3423.703451][ T753] loop1: detected capacity change from 0 to 512
[ 3423.720042][ T753] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3423.726732][ T753] EXT4-fs (loop1): mount failed
22:07:18 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:18 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x2}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3423.812942][ T763] loop2: detected capacity change from 0 to 264192
[ 3423.830902][ T753] loop1: detected capacity change from 0 to 512
[ 3423.840740][ T763] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:18 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc02e0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:18 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x2000018b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:18 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xdc0a}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:18 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000010940d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3423.877988][ T753] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3423.884818][ T753] EXT4-fs (loop1): mount failed
22:07:18 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:18 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x3}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3424.032921][ T977] loop2: detected capacity change from 0 to 264192
22:07:18 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x7ffff000}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3424.079792][ T977] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:18 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc02f0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:18 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x4}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:18 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:18 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xe00a}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3424.127691][ T1143] loop1: detected capacity change from 0 to 512
[ 3424.146570][ T1143] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3424.156502][ T1143] EXT4-fs (loop1): mount failed
[ 3424.193351][ T1143] loop1: detected capacity change from 0 to 512
[ 3424.203509][ T1143] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3424.210560][ T1143] EXT4-fs (loop1): mount failed
22:07:18 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:18 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x5}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:18 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000010a40d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:18 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x4}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:18 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0300100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3424.250459][ T1245] loop2: detected capacity change from 0 to 264192
[ 3424.269617][ T1245] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:18 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:19 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xe40a}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:19 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x6}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:19 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x8}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3424.401440][ T1432] loop2: detected capacity change from 0 to 264192
[ 3424.419152][ T1432] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:19 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0310100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:19 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x7}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:19 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
[ 3424.468282][ T1544] loop1: detected capacity change from 0 to 512
[ 3424.487404][ T1544] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3424.494857][ T1544] EXT4-fs (loop1): mount failed
22:07:19 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xf40a}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3424.565793][ T1544] loop1: detected capacity change from 0 to 512
[ 3424.574714][ T1544] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3424.582950][ T1544] EXT4-fs (loop1): mount failed
22:07:19 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x8}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:19 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000010b40d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:19 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x64}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:19 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:19 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0320100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3424.622151][ T1666] loop2: detected capacity change from 0 to 264192
[ 3424.647902][ T1666] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:19 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x9}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:19 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x1a000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:19 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, 0x0, 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
[ 3424.826773][ T1902] loop1: detected capacity change from 0 to 512
[ 3424.840061][ T1919] loop2: detected capacity change from 0 to 264192
[ 3424.857279][ T1902] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3424.858173][ T1919] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3424.871031][ T1902] EXT4-fs (loop1): mount failed
22:07:19 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0xa}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:19 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0330100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:19 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x88}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3424.915271][ T1902] loop1: detected capacity change from 0 to 512
[ 3424.925001][ T1902] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3424.931720][ T1902] EXT4-fs (loop1): mount failed
22:07:19 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000010c40d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:19 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x34000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:19 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, 0x0, 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:19 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0xb}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3425.052630][ T2124] loop2: detected capacity change from 0 to 264192
[ 3425.069906][ T2124] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:19 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x991}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:19 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0340100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:19 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0xc}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:19 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, 0x0, 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:19 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x40000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3425.194687][ T2249] loop1: detected capacity change from 0 to 512
[ 3425.210005][ T2249] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3425.221629][ T2249] EXT4-fs (loop1): mount failed
[ 3425.253299][ T2249] loop1: detected capacity change from 0 to 512
[ 3425.262886][ T2249] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3425.269399][ T2249] EXT4-fs (loop1): mount failed
[ 3425.293098][ T2339] loop2: detected capacity change from 0 to 264192
22:07:19 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000010d40d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:19 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x2000034a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:19 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0350100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:19 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0xf}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:20 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
[ 3425.310118][ T2339] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:20 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x200000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:20 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x10}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:20 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x7fffeeb5}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:20 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0360100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3425.473194][ T2557] loop2: detected capacity change from 0 to 264192
[ 3425.492633][ T2557] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3425.503514][ T2638] loop1: detected capacity change from 0 to 512
22:07:20 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
[ 3425.528194][ T2638] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3425.535972][ T2638] EXT4-fs (loop1): mount failed
[ 3425.571753][ T2638] loop1: detected capacity change from 0 to 512
[ 3425.579685][ T2638] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3425.588839][ T2638] EXT4-fs (loop1): mount failed
22:07:20 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x11}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:20 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000010e40d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:20 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x400300}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:20 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:20 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0x4}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:20 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0370100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3425.688020][ T2772] loop2: detected capacity change from 0 to 264192
[ 3425.717340][ T2772] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:20 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x60}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:20 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x6c6c61}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:20 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, 0x0, &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
[ 3425.835482][ T2893] loop1: detected capacity change from 0 to 512
[ 3425.863934][ T2893] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3425.873155][ T2893] EXT4-fs (loop1): mount failed
22:07:20 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x300}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:20 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0380100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:20 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0x8}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:20 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000010f40d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3425.917579][ T3001] loop2: detected capacity change from 0 to 264192
[ 3425.929468][ T2893] loop1: detected capacity change from 0 to 512
[ 3425.939045][ T3001] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3425.946119][ T2893] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3425.952870][ T2893] EXT4-fs (loop1): mount failed
22:07:20 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, 0x0, &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:20 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x500}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:20 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xa00100}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:20 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0390100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:20 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0x14}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3426.123510][ T3227] loop2: detected capacity change from 0 to 264192
[ 3426.148277][ T3227] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:20 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x600}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:20 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, 0x0, &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
[ 3426.204824][ T3330] loop1: detected capacity change from 0 to 512
[ 3426.223808][ T3330] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3426.230623][ T3330] EXT4-fs (loop1): mount failed
[ 3426.273461][ T3330] loop1: detected capacity change from 0 to 512
[ 3426.281509][ T3330] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3426.288040][ T3330] EXT4-fs (loop1): mount failed
22:07:20 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000011040d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:21 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xca9a3b}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:21 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xe8}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:21 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x700}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:21 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc03a0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3426.373343][ T3428] loop2: detected capacity change from 0 to 264192
[ 3426.397053][ T3428] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:21 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:21 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x1000000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:21 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x900}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3426.556526][ T3559] loop1: detected capacity change from 0 to 512
[ 3426.575561][ T3559] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3426.585766][ T3559] EXT4-fs (loop1): mount failed
[ 3426.617311][ T3667] loop2: detected capacity change from 0 to 264192
[ 3426.634600][ T3667] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3426.651523][ T3559] loop1: detected capacity change from 0 to 512
[ 3426.659727][ T3559] EXT4-fs (loop1): corrupt root inode, run e2fsck
22:07:21 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:21 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc03b0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:21 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0x787}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3426.666780][ T3559] EXT4-fs (loop1): mount failed
22:07:21 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000011140d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:21 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0xa00}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:21 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x2000000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:21 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:21 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0xb00}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:21 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc03c0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:21 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0x200010b2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3426.821435][ T3884] loop2: detected capacity change from 0 to 264192
[ 3426.848242][ T3884] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:21 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0xc00}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3426.901624][ T3991] loop1: detected capacity change from 0 to 512
[ 3426.921575][ T3991] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3426.928172][ T3991] EXT4-fs (loop1): mount failed
22:07:21 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:21 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x3000000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3427.006036][ T3991] loop1: detected capacity change from 0 to 512
[ 3427.013089][ T4000] loop2: detected capacity change from 0 to 264192
[ 3427.025520][ T3991] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3427.033641][ T3991] EXT4-fs (loop1): mount failed
22:07:21 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000011240d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:21 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0x7fffecab}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3427.051206][ T4000] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:21 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc03d0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:21 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0xf00}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:21 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:21 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x1100}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:21 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x4000000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:21 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0xc4}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3427.248877][ T4277] loop2: detected capacity change from 0 to 264192
[ 3427.269255][ T4277] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3427.282975][ T4406] loop1: detected capacity change from 0 to 512
22:07:21 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc03e0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3427.304630][ T4406] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3427.311980][ T4406] EXT4-fs (loop1): mount failed
[ 3427.344048][ T4406] loop1: detected capacity change from 0 to 512
22:07:22 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:22 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000011340d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:22 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x216b}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3427.352398][ T4406] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3427.358982][ T4406] EXT4-fs (loop1): mount failed
22:07:22 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x208}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:22 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x4788}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:22 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x5000000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3427.503390][ T4439] loop2: detected capacity change from 0 to 264192
[ 3427.519311][ T4439] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:22 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc03f0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:22 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
[ 3427.569383][ T4651] loop1: detected capacity change from 0 to 512
[ 3427.587566][ T4651] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3427.594331][ T4651] EXT4-fs (loop1): mount failed
[ 3427.632235][ T4651] loop1: detected capacity change from 0 to 512
[ 3427.640764][ T4651] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3427.649972][ T4651] EXT4-fs (loop1): mount failed
22:07:22 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x4888}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:22 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
[ 3427.724218][ T4662] loop2: detected capacity change from 0 to 264192
[ 3427.753873][ T4662] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:22 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x5865}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:22 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0400100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:22 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2e8}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:22 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000011440d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:22 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x6000000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:22 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x6000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:22 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
[ 3427.966998][ T4873] loop2: detected capacity change from 0 to 264192
[ 3427.991909][ T4873] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:22 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0410100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:22 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x6558}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:22 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x695}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:22 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:22 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x7000000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:22 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x6b21}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3428.196428][ T5090] loop2: detected capacity change from 0 to 264192
[ 3428.216286][ T5090] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:22 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:22 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0420100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3428.362279][ T5213] loop2: detected capacity change from 0 to 264192
[ 3428.388505][ T5213] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3428.509801][ T5301] loop1: detected capacity change from 0 to 512
[ 3428.661878][ T5301] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3428.671985][ T5301] EXT4-fs (loop1): mount failed
22:07:23 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x8100}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:23 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000011540d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:23 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x8000000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:23 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x200006ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:23 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:23 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0430100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3428.721634][ T5301] loop1: detected capacity change from 0 to 512
[ 3428.728980][ T5301] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3428.737101][ T5301] EXT4-fs (loop1): mount failed
22:07:23 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x8847}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:23 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(0x0, &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
[ 3428.814737][ T5313] loop2: detected capacity change from 0 to 264192
[ 3428.848552][ T5313] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:23 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x7fffebb9}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:23 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0440100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:23 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x80b0000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:23 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x8848}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:23 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(0x0, &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
[ 3428.964626][ T5522] loop1: detected capacity change from 0 to 512
[ 3428.986536][ T5522] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3428.995998][ T5522] EXT4-fs (loop1): mount failed
[ 3429.056618][ T5530] loop2: detected capacity change from 0 to 264192
[ 3429.059422][ T5522] loop1: detected capacity change from 0 to 512
[ 3429.075457][ T5530] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3429.117748][ T5522] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3429.129125][ T5522] EXT4-fs (loop1): mount failed
22:07:23 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000011640d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:23 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x34000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:23 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3c7}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:23 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0450100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:23 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x9000000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:23 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(0x0, &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:23 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x400300}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:23 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x20000b1d}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3429.286867][ T5833] loop2: detected capacity change from 0 to 264192
[ 3429.317440][ T5833] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:24 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xa000000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:24 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x1000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:24 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0460100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:24 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0)
[ 3429.377041][ T5955] loop1: detected capacity change from 0 to 512
[ 3429.400663][ T5955] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3429.408012][ T5955] EXT4-fs (loop1): mount failed
22:07:24 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000011740d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:24 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x7fffe8eb}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3429.458345][ T5955] loop1: detected capacity change from 0 to 512
[ 3429.469495][ T5955] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3429.478218][ T5955] EXT4-fs (loop1): mount failed
22:07:24 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x2000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:24 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xb000000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:24 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0)
22:07:24 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0470100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3429.576848][ T6067] loop2: detected capacity change from 0 to 264192
[ 3429.598064][ T6067] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:24 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x3000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:24 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x2000024d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3429.733055][ T6276] loop1: detected capacity change from 0 to 512
22:07:24 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0)
22:07:24 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x4000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3429.783333][ T6281] loop2: detected capacity change from 0 to 264192
[ 3429.806377][ T6276] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3429.809277][ T6281] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3429.813667][ T6276] EXT4-fs (loop1): mount failed
22:07:24 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0480100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:24 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xc000000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:24 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000011840d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:24 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x7fffe50e}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3429.888347][ T6276] loop1: detected capacity change from 0 to 512
[ 3429.899555][ T6276] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3429.909275][ T6276] EXT4-fs (loop1): mount failed
22:07:24 executing program 4:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2e8}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:24 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x5000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3430.038955][ T6494] loop2: detected capacity change from 0 to 264192
[ 3430.059230][ T6494] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:24 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0490100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:24 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xc0b0000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:24 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x6000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:24 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x402}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:24 executing program 4:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xc80a}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3430.157431][ T6702] loop1: detected capacity change from 0 to 512
[ 3430.183772][ T6702] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3430.191197][ T6702] EXT4-fs (loop1): mount failed
22:07:24 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x7000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3430.233861][ T6702] loop1: detected capacity change from 0 to 512
[ 3430.243043][ T6702] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3430.249742][ T6702] EXT4-fs (loop1): mount failed
[ 3430.300376][ T6712] loop2: detected capacity change from 0 to 264192
[ 3430.314651][ T6712] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:24 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc04a0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:25 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xd000000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:25 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000011940d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:25 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x8000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:25 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x20000bcd}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:25 executing program 4:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x5865}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:25 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x9000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:25 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc04b0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3430.488485][ T6920] loop2: detected capacity change from 0 to 264192
[ 3430.508007][ T6920] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:25 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xe000000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:25 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0xa000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:25 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x7fffe4c1}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:25 executing program 4:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xa00}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:25 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc04c0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3430.667055][ T7055] loop2: detected capacity change from 0 to 264192
[ 3430.692117][ T7055] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:25 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0xb000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3430.789745][ T7241] loop1: detected capacity change from 0 to 512
[ 3430.823094][ T7241] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3430.864132][ T7270] loop2: detected capacity change from 0 to 264192
[ 3430.871262][ T7241] EXT4-fs (loop1): mount failed
[ 3430.895364][ T7270] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:25 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000011a40d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:25 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xf000000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:25 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0xc000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:25 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0x12c}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:25 executing program 4:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xe000000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:25 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc04d0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3430.938126][ T7241] loop1: detected capacity change from 0 to 512
[ 3430.946627][ T7241] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3430.953729][ T7241] EXT4-fs (loop1): mount failed
22:07:25 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0xf000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:25 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc04e0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:25 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0) (fail_nth: 1)
22:07:25 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0x2000000a}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3431.102708][ T7359] loop2: detected capacity change from 0 to 264192
[ 3431.122992][ T7359] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:25 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x10000000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:25 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x10000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3431.207215][ T7563] loop1: detected capacity change from 0 to 512
[ 3431.224048][ T7563] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3431.231741][ T7563] EXT4-fs (loop1): mount failed
[ 3431.263024][ T7563] loop1: detected capacity change from 0 to 512
[ 3431.276742][ T7563] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3431.284234][ T7563] EXT4-fs (loop1): mount failed
[ 3431.316239][ T7572] loop2: detected capacity change from 0 to 264192
[ 3431.346312][ T7572] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3431.358200][ T7571] FAULT_INJECTION: forcing a failure.
[ 3431.358200][ T7571] name failslab, interval 1, probability 0, space 0, times 0
[ 3431.370894][ T7571] CPU: 1 PID: 7571 Comm: syz-executor.4 Not tainted 5.16.0-rc4-syzkaller #0
[ 3431.379667][ T7571] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3431.389756][ T7571] Call Trace:
[ 3431.393030][ T7571]
[ 3431.395962][ T7571] dump_stack_lvl+0xd6/0x122
[ 3431.400627][ T7571] dump_stack+0x11/0x1b
[ 3431.404790][ T7571] should_fail+0x23c/0x250
[ 3431.409250][ T7571] ? getname_flags+0x84/0x3f0
[ 3431.413945][ T7571] __should_failslab+0x81/0x90
[ 3431.418711][ T7571] should_failslab+0x5/0x20
[ 3431.423281][ T7571] kmem_cache_alloc+0x4f/0x320
[ 3431.428086][ T7571] getname_flags+0x84/0x3f0
[ 3431.432587][ T7571] user_path_at_empty+0x28/0x110
[ 3431.437535][ T7571] path_getxattr+0x59/0x150
[ 3431.442090][ T7571] __x64_sys_getxattr+0x57/0x60
[ 3431.446939][ T7571] do_syscall_64+0x44/0xd0
[ 3431.451444][ T7571] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3431.457419][ T7571] RIP: 0033:0x7f7b6df06af9
[ 3431.461832][ T7571] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3431.482445][ T7571] RSP: 002b:00007f7b6d67d188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bf
[ 3431.490892][ T7571] RAX: ffffffffffffffda RBX: 00007f7b6e019f60 RCX: 00007f7b6df06af9
[ 3431.498860][ T7571] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 00000000200000c0
[ 3431.506838][ T7571] RBP: 00007f7b6d67d1d0 R08: 0000000000000000 R09: 0000000000000000
22:07:26 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000011b40d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:26 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x11000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:26 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0) (fail_nth: 2)
[ 3431.514882][ T7571] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 3431.522854][ T7571] R13: 00007fff0df0605f R14: 00007f7b6d67d300 R15: 0000000000022000
[ 3431.530841][ T7571]
22:07:26 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc04f0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:26 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0x7fffe0b4}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:26 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x11000000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:26 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x60000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3431.716381][ T7783] loop1: detected capacity change from 0 to 512
[ 3431.726107][ T7780] FAULT_INJECTION: forcing a failure.
[ 3431.726107][ T7780] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 3431.739206][ T7780] CPU: 0 PID: 7780 Comm: syz-executor.4 Not tainted 5.16.0-rc4-syzkaller #0
[ 3431.747958][ T7780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3431.758440][ T7780] Call Trace:
[ 3431.761707][ T7780]
[ 3431.764629][ T7780] dump_stack_lvl+0xd6/0x122
[ 3431.769216][ T7780] dump_stack+0x11/0x1b
[ 3431.773368][ T7780] should_fail+0x23c/0x250
[ 3431.777805][ T7780] should_fail_usercopy+0x16/0x20
[ 3431.782859][ T7780] strncpy_from_user+0x21/0x250
[ 3431.787775][ T7780] getname_flags+0xb8/0x3f0
[ 3431.792277][ T7780] user_path_at_empty+0x28/0x110
[ 3431.797311][ T7780] path_getxattr+0x59/0x150
[ 3431.801855][ T7780] __x64_sys_getxattr+0x57/0x60
[ 3431.806800][ T7780] do_syscall_64+0x44/0xd0
22:07:26 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x65580000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3431.811249][ T7780] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3431.817164][ T7780] RIP: 0033:0x7f7b6df06af9
[ 3431.821584][ T7780] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3431.841243][ T7780] RSP: 002b:00007f7b6d67d188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bf
[ 3431.849731][ T7780] RAX: ffffffffffffffda RBX: 00007f7b6e019f60 RCX: 00007f7b6df06af9
[ 3431.857962][ T7780] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 00000000200000c0
[ 3431.865933][ T7780] RBP: 00007f7b6d67d1d0 R08: 0000000000000000 R09: 0000000000000000
[ 3431.871921][ T7790] loop2: detected capacity change from 0 to 264192
[ 3431.874013][ T7780] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 3431.874029][ T7780] R13: 00007fff0df0605f R14: 00007f7b6d67d300 R15: 0000000000022000
[ 3431.896472][ T7780]
[ 3431.905632][ T7783] EXT4-fs (loop1): corrupt root inode, run e2fsck
22:07:26 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0) (fail_nth: 3)
22:07:26 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x8, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:26 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x12000000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:26 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x6b210000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3431.912784][ T7783] EXT4-fs (loop1): mount failed
[ 3431.918480][ T7790] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3431.957259][ T7786] loop2: detected capacity change from 0 to 264192
22:07:26 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000011c40d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:26 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0500100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3431.964794][ T7783] loop1: detected capacity change from 0 to 512
[ 3431.972678][ T7783] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3431.979259][ T7783] EXT4-fs (loop1): mount failed
22:07:26 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x81000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3432.099529][ T7999] FAULT_INJECTION: forcing a failure.
[ 3432.099529][ T7999] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 3432.112659][ T7999] CPU: 1 PID: 7999 Comm: syz-executor.4 Not tainted 5.16.0-rc4-syzkaller #0
[ 3432.121404][ T7999] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3432.131458][ T7999] Call Trace:
[ 3432.134730][ T7999]
[ 3432.137657][ T7999] dump_stack_lvl+0xd6/0x122
[ 3432.142252][ T7999] dump_stack+0x11/0x1b
[ 3432.146450][ T7999] should_fail+0x23c/0x250
[ 3432.150867][ T7999] should_fail_usercopy+0x16/0x20
[ 3432.155919][ T7999] strncpy_from_user+0x21/0x250
[ 3432.160781][ T7999] getxattr+0x63/0x2d0
[ 3432.164857][ T7999] path_getxattr+0xae/0x150
[ 3432.169360][ T7999] __x64_sys_getxattr+0x57/0x60
[ 3432.174243][ T7999] do_syscall_64+0x44/0xd0
[ 3432.178663][ T7999] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3432.184577][ T7999] RIP: 0033:0x7f7b6df06af9
[ 3432.188992][ T7999] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3432.208601][ T7999] RSP: 002b:00007f7b6d67d188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bf
[ 3432.217275][ T7999] RAX: ffffffffffffffda RBX: 00007f7b6e019f60 RCX: 00007f7b6df06af9
[ 3432.225324][ T7999] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 00000000200000c0
[ 3432.233331][ T7999] RBP: 00007f7b6d67d1d0 R08: 0000000000000000 R09: 0000000000000000
[ 3432.241299][ T7999] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
22:07:26 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x14000000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:26 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:26 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0) (fail_nth: 4)
[ 3432.249370][ T7999] R13: 00007fff0df0605f R14: 00007f7b6d67d300 R15: 0000000000022000
[ 3432.257382][ T7999]
[ 3432.323244][ T8205] loop1: detected capacity change from 0 to 512
[ 3432.345133][ T8205] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3432.351771][ T8205] EXT4-fs (loop1): mount failed
[ 3432.366890][ T8209] loop2: detected capacity change from 0 to 264192
22:07:27 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x81ffffff}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3432.378957][ T8205] loop1: detected capacity change from 0 to 512
[ 3432.387865][ T8205] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3432.395780][ T8205] EXT4-fs (loop1): mount failed
[ 3432.402137][ T8209] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:27 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0510100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3432.481298][ T8216] FAULT_INJECTION: forcing a failure.
[ 3432.481298][ T8216] name failslab, interval 1, probability 0, space 0, times 0
[ 3432.493948][ T8216] CPU: 0 PID: 8216 Comm: syz-executor.4 Not tainted 5.16.0-rc4-syzkaller #0
[ 3432.502706][ T8216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3432.512762][ T8216] Call Trace:
[ 3432.516035][ T8216]
[ 3432.518956][ T8216] dump_stack_lvl+0xd6/0x122
[ 3432.523549][ T8216] dump_stack+0x11/0x1b
22:07:27 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x2}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:27 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x140b0000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3432.527706][ T8216] should_fail+0x23c/0x250
[ 3432.532236][ T8216] ? mb_cache_entry_create+0x100/0x500
[ 3432.537696][ T8216] __should_failslab+0x81/0x90
[ 3432.542485][ T8216] should_failslab+0x5/0x20
[ 3432.547011][ T8216] kmem_cache_alloc+0x4f/0x320
[ 3432.551840][ T8216] ? __getblk_gfp+0x3f/0x530
[ 3432.556524][ T8216] mb_cache_entry_create+0x100/0x500
[ 3432.561846][ T8216] ext4_xattr_get+0x260/0x580
[ 3432.566590][ T8216] ? strncmp+0x34/0x70
[ 3432.570726][ T8216] ext4_xattr_security_get+0x2e/0x40
[ 3432.576065][ T8216] ? ext4_initxattrs+0xb0/0xb0
22:07:27 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000011d40d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3432.580862][ T8216] vfs_getxattr_alloc+0x2b0/0x390
[ 3432.585998][ T8216] cap_inode_getsecurity+0xc7/0x500
[ 3432.591198][ T8216] ? selinux_inode_getxattr+0x1b8/0x200
[ 3432.596821][ T8216] security_inode_getsecurity+0x8c/0xf0
[ 3432.602371][ T8216] vfs_getxattr+0x195/0x230
[ 3432.607131][ T8216] getxattr+0x131/0x2d0
[ 3432.611363][ T8216] path_getxattr+0xae/0x150
[ 3432.615862][ T8216] __x64_sys_getxattr+0x57/0x60
[ 3432.620868][ T8216] do_syscall_64+0x44/0xd0
[ 3432.625288][ T8216] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3432.631196][ T8216] RIP: 0033:0x7f7b6df06af9
[ 3432.635612][ T8216] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3432.655298][ T8216] RSP: 002b:00007f7b6d67d188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bf
[ 3432.663782][ T8216] RAX: ffffffffffffffda RBX: 00007f7b6e019f60 RCX: 00007f7b6df06af9
[ 3432.671759][ T8216] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 00000000200000c0
22:07:27 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0) (fail_nth: 5)
[ 3432.679746][ T8216] RBP: 00007f7b6d67d1d0 R08: 0000000000000000 R09: 0000000000000000
[ 3432.687724][ T8216] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 3432.695692][ T8216] R13: 00007fff0df0605f R14: 00007f7b6d67d300 R15: 0000000000022000
[ 3432.703668][ T8216]
22:07:27 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x88470000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3432.828962][ T8425] loop2: detected capacity change from 0 to 264192
[ 3432.855598][ T8425] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:27 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x88480000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3432.887877][ T8427] FAULT_INJECTION: forcing a failure.
[ 3432.887877][ T8427] name failslab, interval 1, probability 0, space 0, times 0
[ 3432.900590][ T8427] CPU: 0 PID: 8427 Comm: syz-executor.4 Not tainted 5.16.0-rc4-syzkaller #0
[ 3432.909300][ T8427] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3432.919368][ T8427] Call Trace:
[ 3432.922684][ T8427]
[ 3432.925611][ T8427] dump_stack_lvl+0xd6/0x122
[ 3432.930214][ T8427] dump_stack+0x11/0x1b
22:07:27 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x3}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3432.934372][ T8427] should_fail+0x23c/0x250
[ 3432.938826][ T8427] ? vfs_getxattr_alloc+0x325/0x390
[ 3432.944034][ T8427] __should_failslab+0x81/0x90
[ 3432.948809][ T8427] should_failslab+0x5/0x20
[ 3432.953525][ T8427] __kmalloc_track_caller+0x6d/0x370
[ 3432.958848][ T8427] krealloc+0x3f/0xa0
[ 3432.962848][ T8427] vfs_getxattr_alloc+0x325/0x390
[ 3432.967944][ T8427] cap_inode_getsecurity+0xc7/0x500
[ 3432.973152][ T8427] ? selinux_inode_getxattr+0x1b8/0x200
[ 3432.978703][ T8427] security_inode_getsecurity+0x8c/0xf0
[ 3432.984253][ T8427] vfs_getxattr+0x195/0x230
[ 3432.988774][ T8427] getxattr+0x131/0x2d0
[ 3432.992943][ T8427] path_getxattr+0xae/0x150
[ 3432.997506][ T8427] __x64_sys_getxattr+0x57/0x60
[ 3433.002361][ T8427] do_syscall_64+0x44/0xd0
[ 3433.006896][ T8427] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3433.012823][ T8427] RIP: 0033:0x7f7b6df06af9
[ 3433.017292][ T8427] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3433.037159][ T8427] RSP: 002b:00007f7b6d67d188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bf
[ 3433.045650][ T8427] RAX: ffffffffffffffda RBX: 00007f7b6e019f60 RCX: 00007f7b6df06af9
[ 3433.053648][ T8427] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 00000000200000c0
[ 3433.062226][ T8427] RBP: 00007f7b6d67d1d0 R08: 0000000000000000 R09: 0000000000000000
[ 3433.070253][ T8427] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 3433.078226][ T8427] R13: 00007fff0df0605f R14: 00007f7b6d67d300 R15: 0000000000022000
22:07:27 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0520100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:27 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0) (fail_nth: 6)
[ 3433.086308][ T8427]
22:07:27 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x88a8ffff}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:27 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x19000000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3433.142745][ T8644] loop1: detected capacity change from 0 to 512
[ 3433.182683][ T8644] EXT4-fs (loop1): corrupt root inode, run e2fsck
22:07:27 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x4}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:27 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000011e40d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3433.189621][ T8644] EXT4-fs (loop1): mount failed
[ 3433.212341][ T8644] loop1: detected capacity change from 0 to 512
[ 3433.222194][ T8644] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3433.228769][ T8644] EXT4-fs (loop1): mount failed
[ 3433.271207][ T8751] loop2: detected capacity change from 0 to 264192
[ 3433.290409][ T8751] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3433.293662][ T8752] FAULT_INJECTION: forcing a failure.
[ 3433.293662][ T8752] name failslab, interval 1, probability 0, space 0, times 0
[ 3433.309823][ T8752] CPU: 1 PID: 8752 Comm: syz-executor.4 Not tainted 5.16.0-rc4-syzkaller #0
[ 3433.318521][ T8752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3433.328573][ T8752] Call Trace:
[ 3433.331844][ T8752]
[ 3433.334767][ T8752] dump_stack_lvl+0xd6/0x122
[ 3433.339363][ T8752] dump_stack+0x11/0x1b
[ 3433.343582][ T8752] should_fail+0x23c/0x250
[ 3433.348088][ T8752] ? mb_cache_entry_create+0x100/0x500
[ 3433.353581][ T8752] __should_failslab+0x81/0x90
[ 3433.358361][ T8752] should_failslab+0x5/0x20
[ 3433.362945][ T8752] kmem_cache_alloc+0x4f/0x320
[ 3433.367716][ T8752] ? __getblk_gfp+0x3f/0x530
[ 3433.372309][ T8752] mb_cache_entry_create+0x100/0x500
[ 3433.377617][ T8752] ext4_xattr_get+0x260/0x580
[ 3433.382345][ T8752] ext4_xattr_security_get+0x2e/0x40
[ 3433.387648][ T8752] vfs_getxattr_alloc+0x366/0x390
[ 3433.392674][ T8752] cap_inode_getsecurity+0xc7/0x500
[ 3433.397872][ T8752] ? selinux_inode_getxattr+0x1b8/0x200
[ 3433.403413][ T8752] security_inode_getsecurity+0x8c/0xf0
[ 3433.408956][ T8752] vfs_getxattr+0x195/0x230
[ 3433.413458][ T8752] getxattr+0x131/0x2d0
[ 3433.417621][ T8752] path_getxattr+0xae/0x150
[ 3433.422170][ T8752] __x64_sys_getxattr+0x57/0x60
[ 3433.427016][ T8752] do_syscall_64+0x44/0xd0
[ 3433.431449][ T8752] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3433.437348][ T8752] RIP: 0033:0x7f7b6df06af9
[ 3433.441748][ T8752] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 3433.461423][ T8752] RSP: 002b:00007f7b6d67d188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bf
22:07:28 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x9effffff}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:28 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0530100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:28 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0) (fail_nth: 7)
[ 3433.469849][ T8752] RAX: ffffffffffffffda RBX: 00007f7b6e019f60 RCX: 00007f7b6df06af9
[ 3433.477915][ T8752] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 00000000200000c0
[ 3433.485881][ T8752] RBP: 00007f7b6d67d1d0 R08: 0000000000000000 R09: 0000000000000000
[ 3433.493886][ T8752] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 3433.501873][ T8752] R13: 00007fff0df0605f R14: 00007f7b6d67d300 R15: 0000000000022000
[ 3433.509901][ T8752]
22:07:28 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x200c0000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:28 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x5}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:28 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0xeaffffff}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3433.659108][ T8965] loop2: detected capacity change from 0 to 264192
[ 3433.675062][ T8968] loop1: detected capacity change from 0 to 512
[ 3433.682684][ T8965] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3433.696190][ T8968] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3433.703631][ T8968] EXT4-fs (loop1): mount failed
[ 3433.738419][ T8967] FAULT_INJECTION: forcing a failure.
[ 3433.738419][ T8967] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 3433.751573][ T8967] CPU: 0 PID: 8967 Comm: syz-executor.4 Not tainted 5.16.0-rc4-syzkaller #0
[ 3433.760312][ T8967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3433.770363][ T8967] Call Trace:
[ 3433.773634][ T8967]
[ 3433.776558][ T8967] dump_stack_lvl+0xd6/0x122
[ 3433.781208][ T8967] dump_stack+0x11/0x1b
22:07:28 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x280b0000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3433.785364][ T8967] should_fail+0x23c/0x250
[ 3433.789779][ T8967] should_fail_usercopy+0x16/0x20
[ 3433.794828][ T8967] _copy_to_user+0x1c/0x90
[ 3433.799303][ T8967] simple_read_from_buffer+0xab/0x120
[ 3433.804673][ T8967] proc_fail_nth_read+0x10d/0x150
[ 3433.809773][ T8967] ? proc_fault_inject_write+0x230/0x230
[ 3433.815470][ T8967] vfs_read+0x1e6/0x750
[ 3433.819626][ T8967] ? __fget_files+0x20d/0x220
[ 3433.824482][ T8967] ksys_read+0xd9/0x190
[ 3433.828714][ T8967] __x64_sys_read+0x3e/0x50
[ 3433.833334][ T8967] do_syscall_64+0x44/0xd0
[ 3433.837837][ T8967] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3433.843738][ T8967] RIP: 0033:0x7f7b6deb96ac
[ 3433.848149][ T8967] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48
[ 3433.867761][ T8967] RSP: 002b:00007f7b6d67d170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
[ 3433.876212][ T8967] RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 00007f7b6deb96ac
22:07:28 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:28 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x6}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:28 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0540100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3433.884204][ T8967] RDX: 000000000000000f RSI: 00007f7b6d67d1e0 RDI: 0000000000000004
[ 3433.892252][ T8967] RBP: 00007f7b6d67d1d0 R08: 0000000000000000 R09: 0000000000000000
[ 3433.900222][ T8967] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 3433.908191][ T8967] R13: 00007fff0df0605f R14: 00007f7b6d67d300 R15: 0000000000022000
[ 3433.916205][ T8967]
22:07:28 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0xefffffff}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3433.937740][ T8968] loop1: detected capacity change from 0 to 512
[ 3433.946698][ T8968] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3433.956314][ T8968] EXT4-fs (loop1): mount failed
22:07:28 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000011f40d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:28 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x3b9aca00}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:28 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0xf0ffffff}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:28 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x02'}, 0x0, 0x0)
22:07:28 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x7}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:28 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0550100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3434.099443][ T9286] loop2: detected capacity change from 0 to 264192
[ 3434.118726][ T9286] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3434.216860][ T9391] loop1: detected capacity change from 0 to 512
22:07:28 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0xfeffffff}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:28 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x40000000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3434.260396][ T9391] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3434.267255][ T9391] EXT4-fs (loop1): mount failed
22:07:29 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\b'}, 0x0, 0x0)
[ 3434.329164][ T9503] loop2: detected capacity change from 0 to 264192
[ 3434.346067][ T9391] loop1: detected capacity change from 0 to 512
[ 3434.356580][ T9503] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:29 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0xffffa888}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:29 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x8}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:29 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0560100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3434.378383][ T9391] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3434.386987][ T9391] EXT4-fs (loop1): mount failed
22:07:29 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000012040d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:29 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x440b0000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:29 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x10'}, 0x0, 0x0)
22:07:29 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0xffffff7f}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:29 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x9}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:29 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0570100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3434.549445][ T9718] loop2: detected capacity change from 0 to 264192
[ 3434.567427][ T9718] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:29 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0xffffff81}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:29 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:29 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x46000000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3434.703152][ T9828] loop1: detected capacity change from 0 to 512
[ 3434.716721][ T9828] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3434.724179][ T9828] EXT4-fs (loop1): mount failed
[ 3434.746200][ T9932] loop2: detected capacity change from 0 to 264192
22:07:29 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0580100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:29 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0xffffff9e}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3434.767249][ T9932] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3434.789784][ T9828] loop1: detected capacity change from 0 to 512
[ 3434.801320][ T9828] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3434.808593][ T9828] EXT4-fs (loop1): mount failed
22:07:29 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xa}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:29 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000012140d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:29 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:29 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x47000000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:29 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0xffffffea}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3434.994190][T10144] loop2: detected capacity change from 0 to 264192
[ 3435.030121][T10144] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:29 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xb}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:29 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0590100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:29 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0xffffffef}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:29 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
[ 3435.107196][T10254] loop1: detected capacity change from 0 to 512
[ 3435.143159][T10254] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3435.150125][T10254] EXT4-fs (loop1): mount failed
22:07:29 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x48000000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:29 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0xfffffff0}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3435.199311][T10254] loop1: detected capacity change from 0 to 512
[ 3435.208519][T10254] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3435.216502][T10254] EXT4-fs (loop1): mount failed
[ 3435.230325][T10362] loop2: detected capacity change from 0 to 264192
22:07:29 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:29 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc05a0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3435.252455][T10362] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:29 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000012240d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:29 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xc}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:29 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0xfffffffe}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:30 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x480b0000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:30 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
[ 3435.406921][T10576] loop2: detected capacity change from 0 to 264192
[ 3435.424865][T10576] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:30 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:30 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc05b0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:30 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xf}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:30 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x4c000000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:30 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x2}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:30 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
[ 3435.599527][T10788] loop1: detected capacity change from 0 to 512
[ 3435.619798][T10788] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3435.627122][T10788] EXT4-fs (loop1): mount failed
[ 3435.655623][T10792] loop2: detected capacity change from 0 to 264192
[ 3435.674241][T10792] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3435.693180][T10788] loop1: detected capacity change from 0 to 512
22:07:30 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc05c0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3435.704809][T10788] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3435.711566][T10788] EXT4-fs (loop1): mount failed
22:07:30 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000012340d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:30 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x3}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:30 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:30 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x560f0000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:30 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x10}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:30 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x4}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3435.849646][T11005] loop2: detected capacity change from 0 to 264192
[ 3435.865687][T11005] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:30 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc05d0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:30 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:30 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x5}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3436.021450][T11017] loop1: detected capacity change from 0 to 512
22:07:30 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x19}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:30 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x60000000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:30 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x6}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3436.077914][T11096] loop2: detected capacity change from 0 to 264192
[ 3436.098193][T11096] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3436.099500][T11017] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3436.114849][T11017] EXT4-fs (loop1): mount failed
[ 3436.152210][T11017] loop1: detected capacity change from 0 to 512
[ 3436.162101][T11017] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3436.169345][T11017] EXT4-fs (loop1): mount failed
22:07:30 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000012440d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:30 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc05e0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:30 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\xff'}, 0x0, 0x0)
22:07:30 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x7}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:30 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x60}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:31 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x600b0000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:31 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc05f0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:31 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\xff'}, 0x0, 0x0)
[ 3436.310309][T11306] loop2: detected capacity change from 0 to 264192
[ 3436.334222][T11306] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:31 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x8}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3436.423817][T11442] loop1: detected capacity change from 0 to 512
[ 3436.458845][T11442] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3436.468027][T11442] EXT4-fs (loop1): mount failed
22:07:31 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x300}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:31 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x9}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3436.523219][T11550] loop2: detected capacity change from 0 to 264192
[ 3436.549112][T11550] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3436.551400][T11442] loop1: detected capacity change from 0 to 512
[ 3436.563924][T11442] EXT4-fs (loop1): corrupt root inode, run e2fsck
22:07:31 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\xff'}, 0x0, 0x0)
22:07:31 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000012540d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:31 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0600100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:31 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x616c6c00}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3436.570514][T11442] EXT4-fs (loop1): mount failed
22:07:31 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xa}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:31 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x40b}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:31 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\xff'}, 0x0, 0x0)
[ 3436.726074][T11763] loop2: detected capacity change from 0 to 264192
[ 3436.757766][T11763] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:31 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0610100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:31 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x63000000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3436.791089][T11786] loop1: detected capacity change from 0 to 512
[ 3436.813543][T11786] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3436.828703][T11786] EXT4-fs (loop1): mount failed
22:07:31 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xb}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3436.870654][T11786] loop1: detected capacity change from 0 to 512
[ 3436.880358][T11786] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3436.886989][T11786] EXT4-fs (loop1): mount failed
22:07:31 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000012640d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:31 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x500}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:31 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x8c'}, 0x0, 0x0)
22:07:31 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xc}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:31 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0620100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3436.969076][T11981] loop2: detected capacity change from 0 to 264192
[ 3436.992856][T11981] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:31 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x64000000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:31 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\xf6'}, 0x0, 0x0)
22:07:31 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x600}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:31 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xf}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3437.099277][T12088] loop1: detected capacity change from 0 to 512
[ 3437.122383][T12088] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3437.130021][T12088] EXT4-fs (loop1): mount failed
[ 3437.163267][T12088] loop1: detected capacity change from 0 to 512
[ 3437.173262][T12088] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3437.181520][T12088] EXT4-fs (loop1): mount failed
[ 3437.190262][T12197] loop2: detected capacity change from 0 to 264192
[ 3437.212032][T12197] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:31 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0630100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:31 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000012740d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:31 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x640b0000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:31 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x10}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:31 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\xfb'}, 0x0, 0x0)
22:07:31 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x700}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:32 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x11}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3437.389789][T12409] loop2: detected capacity change from 0 to 264192
[ 3437.409040][T12409] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:32 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0640100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:32 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x65580000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3437.474803][T12415] loop1: detected capacity change from 0 to 512
22:07:32 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\xfe'}, 0x0, 0x0)
22:07:32 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x900}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:32 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x60}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3437.519960][T12415] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3437.529731][T12415] EXT4-fs (loop1): mount failed
[ 3437.585031][T12415] loop1: detected capacity change from 0 to 512
[ 3437.593662][T12415] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3437.602420][T12415] EXT4-fs (loop1): mount failed
22:07:32 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x300}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:32 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:32 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000012840d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:32 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0650100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3437.649472][T12627] loop2: detected capacity change from 0 to 264192
[ 3437.681453][T12627] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:32 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x68000000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:32 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xa00}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:32 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x500}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:32 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
[ 3437.857225][T12841] loop2: detected capacity change from 0 to 264192
[ 3437.868113][T12842] loop1: detected capacity change from 0 to 512
[ 3437.880520][T12841] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3437.898302][T12842] EXT4-fs (loop1): corrupt root inode, run e2fsck
22:07:32 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0660100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3437.905775][T12842] EXT4-fs (loop1): mount failed
[ 3437.943386][T12842] loop1: detected capacity change from 0 to 512
[ 3437.955617][T12842] EXT4-fs (loop1): corrupt root inode, run e2fsck
22:07:32 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x600}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:32 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x680b0000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3437.987202][T12842] EXT4-fs (loop1): mount failed
22:07:32 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000012940d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:32 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xabc}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:32 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:32 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x700}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3438.090106][T13064] loop2: detected capacity change from 0 to 264192
[ 3438.108298][T13064] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:32 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0670100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:32 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x69000000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:32 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x900}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:32 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xac0}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:32 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
[ 3438.237808][T13199] loop1: detected capacity change from 0 to 512
[ 3438.256302][T13199] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3438.265801][T13199] EXT4-fs (loop1): mount failed
[ 3438.313452][T13199] loop1: detected capacity change from 0 to 512
[ 3438.323219][T13199] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3438.330180][T13199] EXT4-fs (loop1): mount failed
[ 3438.340814][T13321] loop2: detected capacity change from 0 to 264192
22:07:33 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000012a40d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3438.364487][T13321] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:33 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0680100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:33 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xa00}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:33 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x6c000000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:33 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:33 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xad4}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:33 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xb00}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:33 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0690100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3438.552523][T13568] loop2: detected capacity change from 0 to 264192
[ 3438.574390][T13568] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3438.595059][T13570] loop1: detected capacity change from 0 to 512
22:07:33 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x74000000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:33 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:33 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xad8}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:33 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xc00}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3438.667617][T13570] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3438.676449][T13570] EXT4-fs (loop1): mount failed
[ 3438.723555][T13570] loop1: detected capacity change from 0 to 512
[ 3438.735820][T13570] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3438.744817][T13570] EXT4-fs (loop1): mount failed
22:07:33 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000012b40d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:33 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xf00}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3438.779574][T13781] loop2: detected capacity change from 0 to 264192
[ 3438.803366][T13781] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:33 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc06a0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:33 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:33 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x740b0000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:33 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xadc}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:33 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x1100}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3438.952984][T13993] loop1: detected capacity change from 0 to 512
[ 3438.975883][T13993] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3438.988736][T13993] EXT4-fs (loop1): mount failed
22:07:33 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc06b0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3439.003238][T13998] loop2: detected capacity change from 0 to 264192
[ 3439.022519][T13993] loop1: detected capacity change from 0 to 512
[ 3439.032840][T13998] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3439.040508][T13993] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3439.047646][T13993] EXT4-fs (loop1): mount failed
22:07:33 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:33 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x216b}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:33 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xae0}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:33 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000012c40d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:33 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x780a0000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:33 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x4788}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:33 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc06c0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3439.165973][T14209] loop2: detected capacity change from 0 to 264192
[ 3439.182935][T14209] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:33 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:33 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xae4}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:33 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x4888}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:34 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x780b0000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3439.359368][T14333] loop1: detected capacity change from 0 to 512
[ 3439.379501][T14411] loop2: detected capacity change from 0 to 264192
[ 3439.392404][T14333] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3439.398960][T14333] EXT4-fs (loop1): mount failed
[ 3439.407517][T14411] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:34 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc06d0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:34 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
[ 3439.431922][T14333] loop1: detected capacity change from 0 to 512
[ 3439.439560][T14333] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3439.451981][T14333] EXT4-fs (loop1): mount failed
22:07:34 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000012d40d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:34 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x5865}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:34 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xaf8}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:34 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x7a000000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:34 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc06e0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:34 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
[ 3439.617872][T14583] loop2: detected capacity change from 0 to 264192
[ 3439.635780][T14583] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:34 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x6000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3439.691258][T14645] loop1: detected capacity change from 0 to 512
[ 3439.729929][T14645] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3439.736764][T14645] EXT4-fs (loop1): mount failed
22:07:34 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xafc}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:34 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x6558}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:34 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x2)
[ 3439.803757][T14754] loop2: detected capacity change from 0 to 264192
[ 3439.830798][T14754] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3439.834257][T14645] loop1: detected capacity change from 0 to 512
22:07:34 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc06f0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:34 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x7fffe0aa}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:34 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000012e40d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3439.855684][T14645] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3439.863940][T14645] EXT4-fs (loop1): mount failed
22:07:34 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x6b21}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:34 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xb00}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:34 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x8)
[ 3440.003845][T14966] loop2: detected capacity change from 0 to 264192
[ 3440.025493][T14966] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:34 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0700100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:34 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x800b0000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:34 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3440.120190][T15073] loop1: detected capacity change from 0 to 512
22:07:34 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x10)
22:07:34 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xb04}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3440.171643][T15073] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3440.179200][T15073] EXT4-fs (loop1): mount failed
22:07:34 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x8847}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3440.227876][T15183] loop2: detected capacity change from 0 to 264192
[ 3440.251478][T15183] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:34 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0710100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:34 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x81000000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3440.279444][T15073] loop1: detected capacity change from 0 to 512
[ 3440.294364][T15073] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3440.302401][T15073] EXT4-fs (loop1): mount failed
22:07:35 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000012f40d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:35 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x8848}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:35 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x3f00)
22:07:35 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xb0c}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:35 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x34000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3440.434797][T15395] loop2: detected capacity change from 0 to 264192
[ 3440.455960][T15395] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:35 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0720100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:35 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x840b0000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:35 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x4000)
22:07:35 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x400300}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:35 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xb10}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3440.576719][T15508] loop1: detected capacity change from 0 to 512
[ 3440.594019][T15508] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3440.607649][T15508] EXT4-fs (loop1): mount failed
[ 3440.637122][T15611] loop2: detected capacity change from 0 to 264192
[ 3440.665384][T15611] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:35 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x1000000)
22:07:35 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0730100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3440.690161][T15508] loop1: detected capacity change from 0 to 512
[ 3440.709536][T15508] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3440.716801][T15508] EXT4-fs (loop1): mount failed
22:07:35 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:35 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000013040d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:35 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x88470000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:35 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xb28}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:35 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:35 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x2000000)
[ 3440.852894][T15827] loop2: detected capacity change from 0 to 264192
[ 3440.877377][T15827] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:35 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0740100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:35 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x88480000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:35 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:35 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xb38}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:35 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x8000000)
[ 3440.984793][T15982] loop1: detected capacity change from 0 to 512
[ 3441.008373][T15982] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3441.015050][T15982] EXT4-fs (loop1): mount failed
22:07:35 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3441.062830][T16046] loop2: detected capacity change from 0 to 264192
[ 3441.093177][T16046] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:35 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0750100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3441.115951][T15982] loop1: detected capacity change from 0 to 512
22:07:35 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x88a8ffff}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:35 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xb4c}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:35 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000013140d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:35 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3441.171244][T15982] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3441.178374][T15982] EXT4-fs (loop1): mount failed
22:07:35 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x10000000)
[ 3441.277184][T16260] loop2: detected capacity change from 0 to 264192
[ 3441.303538][T16260] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:36 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0760100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:36 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:36 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x940a0000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:36 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xb50}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:36 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x3f000000)
[ 3441.428943][T16472] loop1: detected capacity change from 0 to 512
[ 3441.446087][T16472] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3441.453302][T16472] EXT4-fs (loop1): mount failed
22:07:36 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3441.492535][T16472] loop1: detected capacity change from 0 to 512
[ 3441.502647][T16472] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3441.510298][T16478] loop2: detected capacity change from 0 to 264192
[ 3441.518446][T16472] EXT4-fs (loop1): mount failed
[ 3441.526547][T16478] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:36 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0770100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:36 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x40000000)
22:07:36 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000013240d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:36 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xb5c}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:36 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:36 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xa1ffffff}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:36 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0780100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3441.689039][T16690] loop2: detected capacity change from 0 to 264192
[ 3441.708183][T16690] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:36 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x8cffffff)
22:07:36 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3441.770875][T16699] loop1: detected capacity change from 0 to 512
[ 3441.820861][T16699] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3441.859069][T16725] loop2: detected capacity change from 0 to 264192
22:07:36 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:36 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0xf6ffffff)
22:07:36 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xb68}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3441.869981][T16699] EXT4-fs (loop1): mount failed
[ 3441.882585][T16725] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:36 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0790100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:36 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xa40b0000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3441.917361][T16699] loop1: detected capacity change from 0 to 512
[ 3441.936149][T16699] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3441.944063][T16699] EXT4-fs (loop1): mount failed
22:07:36 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000013340d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:36 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:36 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0xfbffffff)
22:07:36 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc07a0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:36 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xb6c}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:36 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:36 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xa80a0000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3442.082188][T16935] loop2: detected capacity change from 0 to 264192
[ 3442.102428][T16935] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:36 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0xfeffffff)
[ 3442.201669][T17126] loop1: detected capacity change from 0 to 512
[ 3442.223686][T17126] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3442.237844][T17126] EXT4-fs (loop1): mount failed
22:07:36 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3442.268016][T17136] loop2: detected capacity change from 0 to 264192
[ 3442.282765][T17126] loop1: detected capacity change from 0 to 512
[ 3442.311278][T17136] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3442.339488][T17126] EXT4-fs (loop1): corrupt root inode, run e2fsck
22:07:37 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xb74}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:37 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc07b0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:37 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xaae0ff7f}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3442.363488][T17126] EXT4-fs (loop1): mount failed
22:07:37 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000013440d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:37 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:37 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0xffffff8c)
22:07:37 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xb84}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:37 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3442.510283][T17366] loop2: detected capacity change from 0 to 264192
[ 3442.526599][T17366] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:37 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc07c0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:37 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0xfffffff6)
22:07:37 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xb40a0000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:37 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x60000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3442.621436][T17559] loop1: detected capacity change from 0 to 512
[ 3442.636751][T17559] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3442.645223][T17559] EXT4-fs (loop1): mount failed
22:07:37 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xb88}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3442.685681][T17559] loop1: detected capacity change from 0 to 512
[ 3442.694895][T17559] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3442.701867][T17559] EXT4-fs (loop1): mount failed
[ 3442.715270][T17649] loop2: detected capacity change from 0 to 264192
[ 3442.733898][T17649] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:37 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc07d0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:37 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000013540d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:37 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0xfffffffb)
22:07:37 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x65580000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:37 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xb80a0000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:37 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xb9c}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:37 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x6b210000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:37 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc07e0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3442.912295][T17871] loop2: detected capacity change from 0 to 264192
[ 3442.928708][T17871] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:37 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0xfffffffe)
22:07:37 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xb80b0000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3442.998680][T17884] loop1: detected capacity change from 0 to 512
[ 3443.026046][T17884] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3443.035570][T17884] EXT4-fs (loop1): mount failed
22:07:37 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x81000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:37 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xc00}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3443.091969][T17884] loop1: detected capacity change from 0 to 512
[ 3443.104524][T17884] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3443.113672][T17884] EXT4-fs (loop1): mount failed
22:07:37 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000013640d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:37 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x100000000000000)
[ 3443.148441][T18094] loop2: detected capacity change from 0 to 264192
[ 3443.166251][T18094] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:37 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc07f0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:37 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x81ffffff}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:37 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xb80c0000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:37 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xc0b}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:38 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x88470000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:38 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x200000000000000)
[ 3443.334404][T18309] loop2: detected capacity change from 0 to 264192
[ 3443.347718][T18310] loop1: detected capacity change from 0 to 512
[ 3443.358715][T18309] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3443.377186][T18310] EXT4-fs (loop1): corrupt root inode, run e2fsck
22:07:38 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0800100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3443.383841][T18310] EXT4-fs (loop1): mount failed
22:07:38 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x88480000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3443.446357][T18310] loop1: detected capacity change from 0 to 512
22:07:38 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x800000000000000)
22:07:38 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xc3ffffff}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:38 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000013740d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:38 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xc20}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:38 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0810100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3443.524373][T18310] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3443.525498][T18440] loop2: detected capacity change from 0 to 264192
[ 3443.531364][T18310] EXT4-fs (loop1): mount failed
[ 3443.546144][T18440] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:38 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:38 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x1000000000000000)
22:07:38 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xc40a0000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:38 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xc70}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:38 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:38 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0820100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3443.745415][T18722] loop2: detected capacity change from 0 to 264192
[ 3443.764330][T18722] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3443.802160][T18741] loop1: detected capacity change from 0 to 512
[ 3443.812706][T18741] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3443.819309][T18741] EXT4-fs (loop1): mount failed
22:07:38 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x3f00000000000000)
22:07:38 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xeaffffff}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3443.864950][T18741] loop1: detected capacity change from 0 to 512
[ 3443.873544][T18741] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3443.890451][T18741] EXT4-fs (loop1): mount failed
22:07:38 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000013840d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:38 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xdb8}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:38 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xc40e0000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:38 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0830100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3443.960833][T18753] loop2: detected capacity change from 0 to 264192
[ 3443.998127][T18753] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:38 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x4000000000000000)
22:07:38 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xefffffff}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:38 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffff}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:38 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xdc0}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3444.179926][T18980] loop2: detected capacity change from 0 to 264192
[ 3444.195210][T19001] loop1: detected capacity change from 0 to 512
[ 3444.203723][T18980] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3444.215743][T19001] EXT4-fs (loop1): corrupt root inode, run e2fsck
22:07:38 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xc80a0000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:38 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0840100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:38 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x8cffffff00000000)
[ 3444.232173][T19001] EXT4-fs (loop1): mount failed
22:07:38 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3444.283680][T19001] loop1: detected capacity change from 0 to 512
[ 3444.290919][T19001] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3444.297436][T19001] EXT4-fs (loop1): mount failed
22:07:38 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000013940d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:39 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0xf6ffffff00000000)
[ 3444.382681][T19182] loop2: detected capacity change from 0 to 264192
[ 3444.415042][T19182] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:39 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffa888}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:39 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0850100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:39 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xf00}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:39 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xc80b0000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3444.497233][T19388] loop1: detected capacity change from 0 to 512
[ 3444.515656][T19388] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3444.523039][T19388] EXT4-fs (loop1): mount failed
22:07:39 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000013a40d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3444.556025][T19388] loop1: detected capacity change from 0 to 512
[ 3444.568528][T19388] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3444.576251][T19388] EXT4-fs (loop1): mount failed
22:07:39 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:39 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0xfbffffff00000000)
22:07:39 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xf56}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:39 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0860100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:39 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xd40a0000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3444.655357][T19401] loop2: detected capacity change from 0 to 264192
[ 3444.682542][T19401] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:39 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff81}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:39 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0xfeffffff00000000)
[ 3444.823271][T19610] loop1: detected capacity change from 0 to 512
[ 3444.856763][T19616] loop2: detected capacity change from 0 to 264192
22:07:39 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff9e}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:39 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x100b}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3444.876972][T19616] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3444.889540][T19610] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3444.903952][T19610] EXT4-fs (loop1): mount failed
22:07:39 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0870100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:39 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xdc0a0000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:39 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000013b40d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:39 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0xffffffff00000000)
22:07:39 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffea}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3444.976117][T19610] loop1: detected capacity change from 0 to 512
[ 3444.984401][T19610] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3444.992995][T19610] EXT4-fs (loop1): mount failed
22:07:39 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x1900}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:39 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffef}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:39 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
set_mempolicy(0x0, &(0x7f0000000040)=0x8, 0x467)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
sendmsg$nl_xfrm(r0, &(0x7f0000001400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000013c0)={&(0x7f0000000200)=@delsa={0x1188, 0x11, 0x100, 0x70bd2b, 0x25dfdbfe, {@in=@multicast1, 0x4d5, 0x2, 0x3c}, [@XFRMA_SET_MARK={0x8}, @replay_val={0x10, 0xa, {0x70bd26, 0x70bd26, 0x1}}, @encap={0x1c, 0x4, {0xffffffffffffffff, 0x4e20, 0x4e22, @in=@dev={0xac, 0x14, 0x14, 0x2d}}}, @policy_type={0xa}, @policy_type={0xa}, @address_filter={0x28, 0x1a, {@in=@broadcast, @in6=@private2={0xfc, 0x2, '\x00', 0x1}, 0x2, 0x81, 0x1}}, @algo_comp={0xdf, 0x3, {{'lzs\x00'}, 0x4b8, "955e17f654a83e5e48e0061ff447a3fcd10f4db3a601885527dc9b32ba1d83dca47d8966171353611356de84ab8457ba36595c7efe2dfd0af749bbba2d44c77014a073181d9664d9f976d72f7dc62ca65e29515e307bd08ecc0b03dfc19968b27ee7d145741c072b5096aafaa6b450bac34f97bae9377cc3925edf666e6f880aae6597c1a801df50d69205e26247f5ab85d0616f8b316a"}}, @sec_ctx={0x100c, 0x8, {0x1008, 0x8, 0x0, 0x8, 0x1000, "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"}}]}, 0x1188}, 0x1, 0x0, 0x0, 0x40}, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
[ 3445.104581][T19932] loop2: detected capacity change from 0 to 264192
[ 3445.135777][T19932] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:39 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xe00a0000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:39 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0880100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:39 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x2000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3445.220442][T20040] loop1: detected capacity change from 0 to 512
[ 3445.235997][T20040] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3445.243090][T20040] EXT4-fs (loop1): mount failed
22:07:39 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff0}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3445.273169][T20040] loop1: detected capacity change from 0 to 512
[ 3445.288242][T20040] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3445.296840][T20040] EXT4-fs (loop1): mount failed
22:07:40 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3445.345248][T20152] loop2: detected capacity change from 0 to 264192
[ 3445.368394][T20152] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:40 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0890100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:40 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000013c40d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:40 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xe40a0000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:40 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x200c}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:40 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:40 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x2}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3445.532106][T20360] loop2: detected capacity change from 0 to 264192
[ 3445.558674][T20360] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:40 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc08a0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:40 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xf40a0000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:40 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x280b}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:40 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x3}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:40 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc08b0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:40 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x4}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3445.769076][T20570] loop2: detected capacity change from 0 to 264192
[ 3445.797276][T20570] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:40 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x380b}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3445.960592][T20782] loop2: detected capacity change from 0 to 264192
[ 3445.984081][T20782] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3446.022539][T20784] loop1: detected capacity change from 0 to 512
[ 3446.125511][T20784] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3446.150331][T20784] EXT4-fs (loop1): mount failed
[ 3446.330835][T20784] loop1: detected capacity change from 0 to 512
[ 3446.451787][T20784] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3446.519148][T20784] EXT4-fs (loop1): mount failed
22:07:41 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000013d40d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:41 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xffffa888}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:41 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x5}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:41 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc08c0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:41 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x4000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:41 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x6}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3446.797493][T20894] loop2: detected capacity change from 0 to 264192
[ 3446.834429][T20894] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:41 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc08d0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:41 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x4788}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:41 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xffffff7f}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:41 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x7}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:41 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x8}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3447.026660][T21102] loop2: detected capacity change from 0 to 264192
22:07:41 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x4888}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3447.069953][T21102] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3447.279191][T21311] loop1: detected capacity change from 0 to 512
[ 3447.433708][T21311] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3447.451645][T21311] EXT4-fs (loop1): mount failed
[ 3447.521087][T21311] loop1: detected capacity change from 0 to 512
22:07:42 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000013e40d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:42 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x9}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:42 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc08e0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:42 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xffffffa1}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:42 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x4c0b}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:42 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0xa}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3447.873897][T21419] loop2: detected capacity change from 0 to 264192
[ 3447.887749][T21419] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:42 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc08f0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:42 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0xb}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:42 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x500b}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:42 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xffffffc3}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:42 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0xc}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:42 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0900100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3448.124239][T21627] loop2: detected capacity change from 0 to 264192
[ 3448.131323][T21629] loop1: detected capacity change from 0 to 512
[ 3448.152666][T21627] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3448.226338][T21629] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3448.275814][T21629] EXT4-fs (loop1): mount failed
[ 3448.327876][T21839] loop2: detected capacity change from 0 to 264192
[ 3448.351151][T21629] loop1: detected capacity change from 0 to 512
[ 3448.360446][T21839] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3448.372862][T21629] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3448.431877][T21629] EXT4-fs (loop1): mount failed
22:07:43 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x560f}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:43 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0xf}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:43 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000013f40d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:43 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:43 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0910100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:43 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0})
ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0xfffffffffffffffe, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {r2}, {0x0, r3}, {}, {r2}, {0x0, r3}, {}, {}, {r1}, {}, {}, {}, {r1, r3}, {}, {}, {0x0, r3}, {r2, r3}, {}, {r1}, {}, {}, {r2}, {}, {0x0, r3}, {r2}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {r2}, {}, {}, {r2, r3}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {r1}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {r1}, {0x0, r3}, {0x0, r3}, {0x0, r3}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {r2}, {r1, r3}, {0x0, r3}, {}, {r2}, {0x0, r3}, {}, {}, {}, {}, {}, {r1, r3}, {0x0, r3}, {}, {r1}, {0x0, r3}, {0x0, r3}, {}, {}, {}, {r1}, {r1}, {}, {}, {r1}, {r1, r3}, {}, {0x0, r3}, {0x0, r3}, {0x0, r3}, {0x0, r3}, {r2, r3}, {}, {}, {}, {}, {}, {r1, r3}, {r2, r3}, {0x0, r3}, {}, {}, {}, {}, {r1, r3}, {r1}, {0x0, r3}, {}, {}, {0x0, r3}, {r2, r3}, {}, {0x0, r3}, {}, {0x0, r3}, {r2}, {0x0, r3}, {r2}, {r1}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {r2}, {0x0, r3}, {}, {}, {}, {r1}, {0x0, r3}, {r1, r3}, {0x0, r3}, {0x0, r3}, {r1}, {}, {r1}, {}, {r2}, {}, {r1, r3}, {}, {0x0, r3}, {}, {}, {}, {}, {r1}, {}, {r1}, {r1}, {0x0, r3}, {r2, r3}, {0x0, r3}, {r2, r3}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {r1}, {r2}, {}, {r1, r3}, {}, {}, {}, {r2}, {0x0, r3}, {r1}, {}, {r2}, {}, {}, {r2}, {0x0, r3}, {}, {r1}, {}, {}, {}, {0x0, r3}, {}, {r2, r3}, {}, {0x0, r3}, {}, {}, {r2, r3}, {r2}, {r2, r3}, {r1}, {}, {}, {}, {r1, r3}, {}, {r1, r3}, {}, {}, {r2}, {}, {}, {}, {r2}, {}, {}, {}, {r2, r3}], 0x0, "2156816c73038c"})
r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0)
ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x100, 0x0})
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0})
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0})
ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0xfffffffffffffffe, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {r7}, {}, {}, {}, {0x0, 0x0}, {}, {r7}, {}, {}, {}, {}, {}, {r7}, {0x0, r8}, {0x0}, {r7}, {0x0, r8}, {}, {}, {r6}, {}, {}, {}, {r6, r8}, {}, {}, {0x0, r8}, {r7, r8}, {}, {r6, r8}, {}, {0x0, r8}, {r7}, {0x0}, {0x0, r8}, {}, {}, {r7}, {}, {}, {}, {}, {r6}, {0x0}, {r7}, {r6}, {}, {r7, r8}, {}, {}, {0x0, r8}, {0x0, 0x0}, {}, {}, {}, {}, {}, {r7}, {}, {}, {r6}, {}, {0x0}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {r7, 0x0}, {r6, r8}, {}, {}, {r7, r8}, {0x0, r8}, {}, {}, {}, {}, {}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r6}, {0x0, r8}, {0x0, r8}, {r6, r8}, {r7, 0x0}, {}, {r6}, {r6, 0x0}, {}, {}, {r6}, {r6, r8}, {}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {0x0, 0x0}, {}, {}, {}, {r7}, {0x0, r8}, {r7, r8}, {0x0, r8}, {}, {0x0}, {}, {}, {r6}, {}, {0x0, r8}, {r7}, {r6}, {0x0, r8}, {r7, r8}, {}, {0x0, r8}, {}, {0x0, r8}, {r7}, {0x0, r8}, {r7}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {0x0, r8}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, r8}, {}, {0x0, 0x0}, {0x0}, {r6}, {0x0, r8}, {0x0, r8}, {0x0}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {r6, r8}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {0x0, 0x0}, {r6}, {}, {r6}, {}, {}, {}, {}, {r7, r8}, {0x0, 0x0}, {}, {r7, 0x0}, {0x0, r8}, {}, {}, {}, {}, {}, {0x0}, {r6}, {r7}, {}, {0x0, r8}, {0x0, 0x0}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, 0x0}, {r7}, {0x0, 0x0}, {}, {r7}, {0x0, r8}, {}, {0x0}, {}, {}, {}, {}, {}, {r7, r8}, {}, {0x0, r8}, {r6}, {}, {r7, r8}, {r7}, {0x0, r8}, {}, {}, {}, {}, {r6, r8}, {}, {}, {}, {r7}, {r7, 0x0}, {r6}, {}, {r7}, {0x0, 0x0}, {}, {}, {}, {0x0, r8}], 0x0, "2156816c73038c"})
ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000063c40)={0x0, [{}, {}, {}, {r33}, {}, {}, {}, {}, {}, {}, {}, {0x0, r21}, {}, {}, {}, {}, {}, {}, {r45}, {}, {}, {r39}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r43}, {}, {}, {}, {0x0, r26}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r34}, {}, {}, {}, {}, {0x0, r22}, {}, {r12}, {}, {}, {}, {0x0, r30}, {}, {}, {}, {}, {r17}, {}, {r50}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {r49}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r32}, {}, {r19, r51}, {}, {}, {}, {}, {}, {}, {}, {r27}, {}, {}, {}, {}, {}, {r31}, {0x0, r16}, {0x0, r53}, {}, {}, {0x0, r28}, {}, {0x0, r11}, {}, {0x0, r25}, {}, {r36}, {r14, r40}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r27}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r44}, {}, {}, {r18}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r41}, {}, {}, {0x0, r34}, {}, {}, {}, {}, {}, {}, {0x0, r52}, {}, {}, {r24}, {}, {}, {0x0, r23}, {}, {}, {}, {}, {}, {}, {}, {r13}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r29}, {}, {}, {}, {}, {}, {0x0, r46}, {}, {}, {}, {}, {0x0, r42}, {}, {}, {0x0, r34}, {r15}, {}, {}, {}, {}, {}, {}, {r38}, {}, {0x0, r47}, {0x0, r20}, {}, {}, {}, {r35, r9}, {}, {}, {0x0, r48}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r37}], 0xe1, "284a15e46bbc6d"})
ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000055f80)={0x1ff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {r5}, {}, {}, {}, {0x0, r8}], 0x81, "c3c66f1c3126fa"})
ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000058dc0)={0x0, 0x0, "5b9359ab037eb719567ecccaf6c780f1b1059c8abd2a9e42d760e59cae6311695eb7fc7ed1aff0d62f3c3c80ddc8579cd09bd7d54c6172c8ac795397b9440a67377edb71cdada967b40cbf6de15ecf2cce51cab9c6945d1b09c0c26749057948c549a686212b79013e2c00d5b2c3473ef757072faf093adfafa2ee7919b2a4c13c52b4f4fdb877420044ff6c2f394b559e837bde85124d290d1b82cbd624c289dc12717a04b963cda5271ba6daea2abe85983edcd9c082433bb22dd7c26ed1a6c90700b95f55f2858b1b7e151c6fcc0ad282a9d11a4791157bd07888f99c21758eff54fd5e1e6f4879dc45916435f24c51f468ca41ac63c11af19e3605185682", "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"})
ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000059dc0)={0x5a, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {0x0, r54}], 0x0, "dd8680cddeaca0"})
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00'], 0x0, 0x0)
22:07:43 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x10}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3448.530445][T21846] loop2: detected capacity change from 0 to 264192
22:07:43 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff})
mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x4000000, 0x4010, r1, 0xa829b000)
r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0)
getsockopt$X25_QBITINCL(r2, 0x106, 0x1, &(0x7f0000000080), &(0x7f0000000200)=0x4)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
[ 3448.574733][T21846] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:43 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0920100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:43 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}, 0x2}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:43 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x5865}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:43 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x11}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3448.684839][T22054] loop1: detected capacity change from 0 to 512
[ 3448.712663][T22054] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3448.719149][T22054] EXT4-fs (loop1): mount failed
22:07:43 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0)
[ 3448.754548][T22054] loop1: detected capacity change from 0 to 512
[ 3448.778007][T22067] loop2: detected capacity change from 0 to 264192
[ 3448.778808][T22054] EXT4-fs (loop1): corrupt root inode, run e2fsck
22:07:43 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x60}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3448.814979][T22067] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3448.821669][T22054] EXT4-fs (loop1): mount failed
22:07:43 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000014040d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:43 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0930100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:43 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x5c0b}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:43 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0)
ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1, 0x2, @buffer={0x0, 0x9d, &(0x7f0000000280)=""/157}, &(0x7f0000000200)="e5", 0x0, 0x0, 0x0, 0x100, 0x0})
r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0)
ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5", 0x0, 0x0, 0x0, 0x100, 0x0})
r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0)
ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5", 0x0, 0x0, 0x0, 0x100, 0x0})
r4 = creat(&(0x7f00000001c0)='./bus\x00', 0x102)
ioctl$SG_SET_COMMAND_Q(r4, 0x2284, &(0x7f0000000040)=0xfffffffe)
r5 = socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x800, 0x0, 0x103, 0x1}, 0x20)
setsockopt$inet6_int(r5, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4)
sendmsg$inet6(r5, &(0x7f0000000080)={&(0x7f0000000040)={0xa, 0x4e25, 0x80000, @remote, 0xfffffffc}, 0x1c, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="24000000000000002900000032000000fc00"/32, @ANYRES32=0x0, @ANYBLOB="0000257e828ba32d56dfeaa6d004d1d453fc0534947d0b8fd52ee92be7748f48d268497bc4d22468231a9a727aca08d557b32920d536ada1f756fcf788cfcd534d02427abdd1"], 0x28}, 0x0)
creat(&(0x7f00000001c0)='./bus\x00', 0x102)
write$binfmt_script(r0, &(0x7f0000000240)=ANY=[@ANYRES64=r3], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.'}, 0x0, 0x0)
22:07:43 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x300}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:43 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}, 0x3}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:43 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x500}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:43 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0940100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3449.047628][T22279] loop2: detected capacity change from 0 to 264192
[ 3449.077061][T22279] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:43 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'})
r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x102)
ioctl$SG_SET_COMMAND_Q(r1, 0x2284, &(0x7f0000000040)=0xfffffffe)
bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x7, 0x3ff, 0x8, 0x0, 0x24, r0, 0x4cca, '\x00', 0x0, r1, 0x2, 0x3, 0x3}, 0x40)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r2, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:43 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x6000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:43 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}, 0x4}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:43 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x600}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3449.221282][T22492] loop1: detected capacity change from 0 to 512
[ 3449.237922][T22492] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3449.246068][T22492] EXT4-fs (loop1): mount failed
[ 3449.259886][T22496] loop2: detected capacity change from 0 to 264192
[ 3449.276055][T22496] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3449.313204][T22492] loop1: detected capacity change from 0 to 512
22:07:44 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x700}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:44 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0950100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:44 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x5)
r2 = socket(0x0, 0x1, 0x0)
ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f0000000100)=0x6)
accept4$llc(r2, &(0x7f0000001980)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000019c0)=0x10, 0x80000)
sendmsg(r1, &(0x7f0000001940)={&(0x7f0000000040)=@tipc=@name={0x1e, 0x2, 0x3, {{0x43, 0x1}, 0x3}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000200)="a720f8baa4091b737ed7d468b11b9da6b6163111ed5af4cf060a52d07144c5200c8694be77a06807149da5bdb8ec44afb5c4cb958c68898c1897168bd706366a9b2e6d300c7a307abc15a49ce81bc3ed7f8bb98e6285747d3b37987bf7950427b45ecd3ffd2a38dc000939ddbee426e5af3dfca0fef1898dd53de2f280489934f22be72d61e2de2ec5da0d455a79d15c657133bcc3d82a4679ea28a994ba395a3e39bf457e970a7f03753d", 0xab}, {&(0x7f00000002c0)="56ed59c24e9d7c2d38675a0ebca6cc9ae8be358afbeef18cb751236a6ad58a3f52c2fdbab9d10f433634a8baadadf7b25c06a6c28952d964996df8617a6523ba6cba3f1875f8f6fbcee416b63dfb5018497608807c887eaccd2e825886f0d8d731f1c42178d90dc1e15d9bfaf4b414b184264aa66740415ba46a902ca79435800b413bf44c0d500481fac7fab5609483d45c6d16b253fd37ff9703bb51512b34254a036f053ab893b617c6173ab76ed8d3a861edf65a5b0db31dd653607bad99ca2dc6b926408f4aa440", 0xca}, {&(0x7f00000003c0)="7db4f4194ccaded16399572caf80ac0a6e32d0dea7e1c038fd4aa0066b46d7190d08c8cec6340061623474c80b37f8f9c9f5cd", 0x33}, {&(0x7f0000000400)="c23d77c9ec09bda1d169219373cebd699c126172a076982b70c8918951c78b7d6a38014e2423e75fdb9a1a7db2b0c9469cd30dad26b85f20ce2d53803baef41a4454aec0fc16c3342c0127751e876d629c5a57aa0db7526297a3f722fe4d045d2ec7b1160de12d62af1185e60f2b8b009b3fa0cb40b3a66c9673d542a6945c45991bf65e08c6eec908dcbf119c38201c421e1974b04679049b3ab09e0d707a8d005a1d2fb265eeda609b838abbe0cc6bfb2aaa44d40735ee9a80ebd30b7f", 0xbe}], 0x4, &(0x7f0000000500)=[{0xe8, 0x6, 0x5, "c072b9d7b35a779de0f751b9de46b3eb69f8a4cf1095745ecb22e445469638e175683b7ad54ff045787b1bc281eb740128ccb64d51ed8ec3e7a8f10343cf73f15ff9f47d048c023ba101c90ac6daaf2806b9597dfa653d1152fc2e4bd60e6248da2386b9b764989ae42d53e8c26d20f4934f0f153a795997e6d76d31494878c20db995ed2eda8ad246cb7c1a3971e927f1cc0be030b13ad785e37412611f3d70920abc838e581db83dce5f0497cc849bc439d12846ba6c4ee301755c611a436a879ead3a1eceecf55af875be50436eff7a"}, {0xa8, 0x107, 0x5, "5d3042968bc9e88379fb0a88d9cafce1e7476050745abbaca4eee3d5376b2531a22fe34e949c5731c93027d3404059b96de6cfbd5852cbb4f5cb0067c8a262f119b393a6476f3e5412e5c3e87295cbbae80098e863169ab33feadb89a9d92f92e2dabba3e2dafb74173b4848ead19bc5c857a34b218a2926ba362acc918546426afffa57631d2006235cccc8d7687fabaef8e07c"}, {0x1010, 0x1, 0x2b, "9abfdb7a29bd621543159bdc8d0baee3a42943126d8fd65e54b06b5153bf4f881eeca2937d9bbf89757d4212ad77fb7ba08229b1c7c1599639edc65a6bdd61b6bfe032e6024e740218c51ac719759b60952b8e6dc3a53693c77f737dadf171bba9eb516ae41d02ebb91494e9e521cc95f7f4d43ab88916ede1a8c2bb9fe6ac29439758e637838647ac3f2d83a0771fcc9e39a2b9913a30b476634b1d324806478276c28fcff48aecd137e919dc78e8dcf6b4ee444455dfb9e2123fe11824faba95489c1b721ef6671e3a1485cd7de064817c5aa676ee598534ab3a2cfc39ae55edf17a750b944400da14aec8ad88d7ff20b0b2e5c15bc1ef17b8d12a94fa4dc4f24530c2f1fd5433a0b66a35da5e56ac198634dda2f574b06731a45fc436fdb226749d347167845362e0b2a6f25588594ff89bca9937f43d84dabb5465a9a64752aee4718bea47134e9e85603e983149782c00277a515d8a3d911eb1aef1e2cdaadda3517b7c3a24c1a10946c3786e8cf51bd4785cb029e31c6a4f6b6fc896def6173144ccc345997b39c57bf96d45b1c1101bf4aa7054af8d66ac7b67a2ed7b2db87d0c412fe86bd3454f40782abec597c6e5c1094d4a01266372fd2f1e0d460c384a790d2dd859b4ec9b18ac1405e201f69910762ecb9b5502104bf1f3ae839364cbef43ce2023b55b7e7b6d56f31c3bbdafd2c7d74939cbda7c766b107af0b2b456fa55ffafd3d4daa143c05fb535c58a2d94d98cb0931d7b40130e0af03887d42917b89e6a8bebaf798e305ffcc509cabfbfbf9a8d3f8a8dad442c3897f3594950ffe8b93d179a50a393bce455543f322b788a44b4af8d3e00689b2931cb0953a62ae5dc67a1a0d96dabbd5cd487f6edf011e151db8fd52df25d0613008c7998ae52131c399f615f7dfce36a44366020c8f806265a7f87429331595a230491f4f61d431f736d74a72ec5f1030382a7bc2640b278c2afeb46c3fd32eae668b0e830c9df0c390316ba4d571ffbb3053ae0730302231ab90177a83afe583e487a5adcd093fc7577da8286b0c310bf4cbd351e5c2a748297870178b1c3739e7692fd4c7ec752c31a71b5f458ef54ec71a4a1f89b4f34b992e613bbba67bb194b7e61a69fb2cff3cfce31010e90ef6e71b5e17ba00511249e3725dc76c8deb4e9b78440cb54049b675438565bcc0338b8a30c2f125aa9a854d06b7b378d0aa8479a70f51c76df775566f773dbc6f2d64a513e31491f598cced2453831e2ba0ffbfb9422617865a53e6f87d3e5b28e6d4f8515634889075abd791cb3e2a689b196e5459254e24d39a81d0ca3d2ca8aa49b30921b716fa1a9b0fe9258dcb6d3d0ad604a0da1bded9c8451f58d8675a076db8385618d7909ef556e6525bc20b6daaa1d6c243fc648bd96f3c6f3a1a7440a0058954f8740e8ab02de86feee53b08cec053a425f8c12e055dcd741f1db8239353c77bf56cc1254e97ee3b32377fd9af9aaee1a05c8288d6d7f812b67ce6c9e1b4117711cce7d6b48d2de7cf2013f7202d680d1be6f2635dafab5a049ccbbfaf0a7665707a29d3e6742d0afc16b47f3ea6df90684120a7c7c2e72ae3c97433f6dd1c704cea9267394d0a60b81e5b72b5d1f7b55e9e88ae5777e4cd36991de8019c6bb54e2fc06a430cb1dcc001e4a82c699d5144b01c71ff40e1caf70c6fcdef1c910bd1c9897fdc7e61e753ffbfb56aeefd7bc014dd6424a896c3e16398b5bc79b505ceef3987c71b144529399762cf07332d875a9b2a850b4ec62092764ec3bcae6642a6620c744d987f74cfbca499bf44fb392a7b4551faa0d4ceff1563233a82b7bf5d74fc1cb9c9fd474dbc2ebea1e6d409f6205166aa4cc3ad31f2b03d4d91df11d29e2e28fe427bc2ac00cb518751ee7051843f545ca588f3f02c08c3038f4dcfb33f1bdbddb736664bd6a328dedf3e41e5a66b8af1c37299f1558b8978c659456b8cb9d6290e92c15f7b08ebdce7867b79e9cf641c5d2b49c705328e03e9a1c5afb0c291c9d5bc29c4846c8379d0687a8e7976ef86821799803560225d3c8e86ff4aa1bf06089543d7a6f437861be2d34fc0fed63be59f93c31d145a7ec2120dc5adaa5148fc29e20d04986565cbeb1d45499d7ecf98529052206c6b105d67a617d0370226d68cf0992d9fbd2805d3a4778a0c9e5517c59c2d7a0667a2e10c02233516454b202ea02c3c203927eb6cd38e274d313c029264914529d6f6f80fabaa9525b85d0c9885a89fad52040fe5db865e679d655d7c8636eca0c0eaec4a628eec446d4ccc946e2ef8ead926a7a53680d13479a941c6442e7f7a06e05ad49b031ae503792d05ba19caf516286a66b5c7f46381ce4bb51fb8296ccd0d54094353509e5c82042c4b5dce355ff600f588b8031e623d23ea48f5742366f9df40e2a4625feb0c918e3e4e0f6416f1eda4cfa7a712749630ec6eb80badc153f658cd65b6fa4be0ac9dbdef35d2e6423410a086640522360632b30ff51624c12b0a0aedbf9c9a209c685484fa4cd5f871a217c289df87e3f1cd8950570cac4e23e7ad2df7667af03c6bc55bd2d4e5551eb110ef9759beec1f019248e1e8a9fe3daa5c0d15ee6845713bdbfc0414211a147f5a46c52a3107132d3b0bf7635a006a529c3d92d2b525d4d24c42eb866015d61574ddc44e4f0e218b9383822c255bee56f2bb7cfdee43a68903f04d2e1bfdc464dacb64718f403cca37acc9f842b7f78c3953f61d61d43a0e6110838ae42efbc46ad792b4fb021af81c77668138ef43d0b8c7d3eeec19639a362fa8ad0246382136890ffd41be8f3b7f83d988ecdd5b33005c617d3b7338f24bd9c0f78ab8da71d2b7351b16a90bf664c321c3d6dff3f9c06158f5cef7e23ff7376c88800539958874549f232c4825e889e52c9a02770891626448d5808935a520448e92c83107276e2ccd92509fd02ee2603d43a7672c76ce99e8a2ab06011ea6d1475e65d95aff95aa84bdf098018dfc686f348e81ca973a8dc741078403c6589ba48b6fd40eda163a2127ccfb610fb64953294111e848a9e409896f3cc1b7cfa3cb4400c8b1e529f8be29f0e60b2a591a2415040d600f6ff12cce8be8c272d74a2c0c529dc31297cb9372cf50b0454db15465d0795e43472c0ff1b796792715623fb7e0848a6189fc4d882defa7b8a599bf9d6d1ad334416e13666eb439454a88efb15744110af4cfe33b872858ba75468df4deb22dd5234581ad1ac5575422f881b9e7d58ca1d37fbb32e2e23b257b6ac3826f461c39fad44fabc4ba8673e7fe0c2e87a746b04874d8ef066ce7fdb0de15e29920fe6cde5868ae4efe4dbf54b5567f77b817a2eac3bc2eb8edc90113bd0618796fe438af3234b55a68ec9688493e57b620a98d210a05bb42d51d641d6547e2bf47812cd17ca5116428b0bcd28b3eb8380232d7e003a2f5a870cf0aa9b85db981ab14cefb1850f39b2cb2072e6d4b4e398367b6d48a3223e1b913ce6a3aa43c66b52a00a56a70b947a19d0330c4216a4be5ee3c07856b0e23432a0ca931879b96478735ee87ea912eb6f3a805d3a5ad51c1e5aea8b2fd63a338fbe60f42db97b8d37d65011221c7658599693df03aacf0932d0577d83083b812e1cebab431610dc88e4475b25bd4967d186ade187d09ba908c9549e815fe2af03a1a5d70ead989bab7a311b5b04c1808b8c1bea858cecd0af3b591f97f01ba356300e1288c36737178790be082b410f8d4f07dac4d0b421ef8688d3e55510d8041767bb4d330debec20be169df8634888a4db8abf80013b67eef59af1f05a13457932d0fded62f6478f161d8b64e0ba99f65ebe116b382dc9aaa698fc6518bacbabe6f8da1c9cff42a9234abdb49b7e57f7c6a1ec60410659f404ac6923db4b8a1435c83fd628c243e9810111eda4ae50af9a074858854482ca12e9cb1db7739d14cc239e8b9bac1c1559fc581795c65bbc3302b4f2e358be615209484e11825cad72a82560b264ed6642177d9f81a2139f720fa6c21f5882a1830c33a89c44e35cdf48da5da248dd4ce036d5e84b2643574934d22321d9ab5ac6304e1377470b32e084cad3780eae016fb239689c70199860962d2641bf0134bf8c71375a65c1e406b312ebc516e58e33cccda1a0b83f4397477e36ae8156f0a80ca48e5f31c763b1bce9e912112235d47b25d6e03fee3bc48838f569e371763c52df76f2bc4baa322e2099023770549dc9e3510ba784342f7ade557fa79714b9c4a571e2ec5599ce1a1f1755b919260ccffe7f666657573de8b3c3564cf0c1eabb306b74b19ffa4a1fe2e0733691717c97f805d0829310fba0d78224d127895dfd1f96332703415fde457a5e35f8c9b8fa15ddc82a538fbab4bec91f1048aedf99c85fd4b442de338a895f2697cbe18a01b546930b7f64b91aa3af79c1a3c7d70f0d0f1bdae5a44c77ed4eb159b0fb6be94cc56bd0dd9e11e32f99dcaadf057ef3ba74eacb8c0543a4ad3e03caa34890e44abb9f2beb6fc58d84ae94cde0392db42cb051a359e51ba5f517d259fb870b0311660eebbde34d3749d5b9c14c7b546b6c407a366ffd4d4d4c9f2c816b0135457d2185800c5285f6fed5baf2bdf927831ff32910beebf07daeeb416bc7562b57bd08b96a9030248e9a2152bda70ec0fdbf5992abe08a283ad515b99edc07de752010260ea8fdb95b8b1b0d3de1370a78fd11c09b2d7a09d5bc7381667a4bd41ab1bb158b1fc9e24c3f8681b729fc76211df028523f8858f98be78c63fac9aff0866c0e2463dde57be30ea4a862deca551e6cb931204b8758a63e5b96d6fdc43027a2d5769619a70069d1a670ba0305b4385d47c87e50463744e1feca11211dfb923b17fd6aff14e966cd96856c2655c38de6ff8388cbb7a0ea26f77119c070029c77d695fba219eec916f17eb3c2b85a1689ad1a1d9d68180ac1e368c3bc2d8ed409b093cfd0947b748d5e2eb62b8da67cd8874764120697e2c4eb9f81f0c6f524c0ab695355336fb35c6d975c6f62d0e51c3980cd42ed0d77ad3375f27b8ae6d4a09881e6a51260303ef92a151859beec13cd71b9da2cdaf48e527e917f01edca08b844d05cf4e72b3b1a187b340f798c93a76b24ede30263943f9bde36cb74a1845780aa7c700bbce2337d24e485e05cfb1ead1fadfdc75c5645351ade76c35aeeee4d411ceb5edaca0f831f33fae3c65bcad8b8f6f7ed7bc8069e3972fd1a9101889a583905050063f24679f1bae55a67ef5adb9e8a9d498d656267f6270a0a20f27ee741e65a5063e79a39f1d07d11b851bc394719073c7a6fa17a1fac041f82598bb82f8198b1e76cc26e41b0e803bed43d98127541b9775801764610d7611c0373b72aa08a457691ccd9aea5f2a57664044e6ffb288686b6691f68737436f408f7641b7936e2316f80f047e6f6264ed7087e33f25fff5cc0652b4a5dd7e07293d9c33ed12aafaf801077b90221e1f318772fc0daa2d36ca7e26fa68ccc8245fd389b487b7e24b651e7a99f338bce332f370ad2b7462176810f840359a6f18209c6abd80989e36993266c245773d51a8a1cc74af2a8d25b318acff34eab9edce6e9a29b423673fd7f309baf941b0bba54c822b03391ec8dc7ed1028e24152698b5338c1196daced35c740314b4676c35113ca6f9a8c99abf9bd97fd21f71fe72fe8d5e04883d8e2eb2aa57fd4e462674ad8dcff66c579b0b17ee48b3d43241abc3f3cacfcdb0e4ffdc428cb0a9dbe619f8c3e6ecb8ab13de8ab8c49b042697c0b5fa7675dc53f7704"}, {0xa8, 0x0, 0x101, "cc3384f8c699323d1ed6baffd7e1a6d913ae66ed5e8a7690b9f1daaf68baf8ecc9d5b3ee9b4e01003dae27e18d5d6ccd63308eff40040352d27772e9bbc6cb7b8956f22b572b44623385082b67b516dd1d32e7851aa09628dec246b9bef4c2a0d7b2fd1735e824a66e12217b8d5e5b79bc321de3ed74acbfde6dda3e46470bd7859ea6cbb3985d666624359f623bfe4593bcf073"}, {0x28, 0x10d, 0x8, "ab00368876c3f12250a6b6f5a5356511922fb5cd7456a9"}, {0xf8, 0x102, 0x7, "dfcdcec34bdf80259da39966e5eb02a311e10567296cf62b6f9f7198aa137598ddc64a456974b264ba4fd614bdb0e087cd24c91bee98d7229c5dc6c2fbbb3944a7c16e9940af197e89d8dce20c5770c8551664e56b65890774ed07d979d3157ab94e5567de456001bca09153f7b3db71238c541b2a806728afa630549d4592acdbc98cb614b5aa236bc646ad67f2b32ae6f4bf38239ad71c8c492aac5603703449cf7c3244457fcce085b6a2b84d98b801720262ad974660dea88ff41593058e1c535f058a8bd0e4534babef1f3c7ee3545203c25c1d9b41fc9af2f369cf9a45d1fdd9dd66f42f8f"}, {0xd0, 0x0, 0xfffffffe, "6ce057188e75fe29cac0c081d9dd225da0d08734fe0d403c7fc539d36284210342c0cb101cd431bea4203ab325534573f1f5f059075352e1c3013666ae59f734f6329e3bf29606964cd80ec4aaf668b162c7e8566f1fbe54e6a92aa30e25ef45477c2bdabefd5dbd3f49572f4cc7bcdcde951de36e92b1302bf435125227b62a64b7db0988cdc63d4fb4973f1adfee170559132bf47160e99ad1a8a53a13388ecb2e181fd6fb2e4f4392761748f71a78b8febdcd143b6204298338a94947f8"}], 0x1438}, 0xc800)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:44 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x6558}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:44 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000014140d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:44 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}, 0x5}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3449.369108][T22492] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3449.397946][T22492] EXT4-fs (loop1): mount failed
22:07:44 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x900}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3449.479071][T22712] loop2: detected capacity change from 0 to 264192
[ 3449.495594][T22712] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:44 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0960100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:44 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x680b}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:44 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0xa00}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:44 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}, 0x6}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:44 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0xb00}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3449.698763][T22928] loop2: detected capacity change from 0 to 264192
[ 3449.719492][T22928] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:44 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0970100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:44 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x6c0b}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3449.815592][T22936] loop1: detected capacity change from 0 to 512
22:07:44 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0xc00}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:44 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}, 0x7}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3449.895518][T23039] loop2: detected capacity change from 0 to 264192
[ 3449.918508][T23039] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3450.100500][T22936] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3450.170271][T22936] EXT4-fs (loop1): mount failed
[ 3450.310592][T22936] loop1: detected capacity change from 0 to 512
[ 3450.431694][T22936] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3450.610277][T22936] EXT4-fs (loop1): mount failed
22:07:45 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000014240d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:45 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0xf00}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:45 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0980100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:45 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x700c}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:45 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}, 0x8}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:45 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x1100}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:45 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0990100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3450.907813][T23353] loop2: detected capacity change from 0 to 264192
[ 3450.938128][T23353] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:45 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x216b}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:45 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x740b}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:45 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}, 0x9}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:45 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x4788}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3451.124758][T23566] loop2: detected capacity change from 0 to 264192
[ 3451.147302][T23567] loop1: detected capacity change from 0 to 512
[ 3451.159538][T23566] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:45 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc09a0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3451.310403][T23677] loop2: detected capacity change from 0 to 264192
[ 3451.331462][T23677] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3451.338978][T23567] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3451.378225][T23567] EXT4-fs (loop1): mount failed
[ 3451.603081][T23567] loop1: detected capacity change from 0 to 512
[ 3451.689030][T23567] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3451.801655][T23567] EXT4-fs (loop1): mount failed
22:07:46 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000014340d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:46 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x4888}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:46 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x8100}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:46 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}, 0xa}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:46 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc09b0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:46 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x5865}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3452.133187][T23784] loop2: detected capacity change from 0 to 264192
[ 3452.155835][T23784] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:46 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc09c0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:46 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x6000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:46 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x840b}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:46 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}, 0xb}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:46 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x6558}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3452.350009][T23992] loop2: detected capacity change from 0 to 264192
[ 3452.375839][T23992] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:47 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x6b21}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3452.593760][T24203] loop1: detected capacity change from 0 to 512
[ 3452.881634][T24203] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3453.142508][T24203] EXT4-fs (loop1): mount failed
[ 3453.350473][T24203] loop1: detected capacity change from 0 to 512
[ 3453.388085][T24203] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3453.395966][T24203] EXT4-fs (loop1): mount failed
22:07:48 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000014440d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:48 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc09d0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:48 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}, 0xc}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:48 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x880b}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:48 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x8100}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:48 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="a0e2608ef176a6ccd4479f7efec45c1504943f6a5c827e7fe8ad62f80c270272e405bd64173c0dacf2f1bb413968518a78ce0d91479e74330c2a6c873ff0a9723bcb4cda941c3516b2ad857bd29ca1d440348f2ccf26c03bf6b74f4a062df929a225a94a1da8d80000005588be8c34032fe4db031f"], 0x0, 0x0)
ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0)
ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0})
ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0xfffffffffffffffe, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {r2}, {}, {}, {}, {0x0, 0x0}, {}, {r2}, {}, {}, {}, {}, {}, {r2}, {0x0, r3}, {0x0}, {r2}, {0x0, r3}, {}, {}, {r1}, {}, {}, {}, {r1, r3}, {}, {}, {0x0, r3}, {r2, r3}, {}, {r1, r3}, {}, {0x0, r3}, {r2}, {0x0}, {0x0, r3}, {}, {}, {r2}, {}, {}, {}, {}, {r1}, {0x0}, {r2}, {r1}, {}, {r2, r3}, {}, {}, {0x0, r3}, {0x0, 0x0}, {}, {}, {}, {}, {}, {r2}, {}, {}, {r1}, {}, {0x0}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {0x0, r3}, {0x0, r3}, {0x0, r3}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {r2, 0x0}, {r1, r3}, {}, {}, {r2, r3}, {0x0, r3}, {}, {}, {}, {}, {}, {0x0, r3}, {0x0, r3}, {0x0, r3}, {r1}, {0x0, r3}, {0x0, r3}, {r1, r3}, {r2, 0x0}, {}, {r1}, {r1, 0x0}, {}, {}, {r1}, {r1, r3}, {}, {0x0, r3}, {0x0, r3}, {0x0, r3}, {0x0, r3}, {0x0, r3}, {0x0, 0x0}, {}, {}, {}, {r2}, {0x0, r3}, {r2, r3}, {0x0, r3}, {}, {0x0}, {}, {}, {r1}, {}, {0x0, r3}, {r2}, {r1}, {0x0, r3}, {r2, r3}, {}, {0x0, r3}, {}, {0x0, r3}, {r2}, {0x0, r3}, {r2}, {r1}, {}, {}, {}, {0x0, r3}, {r1, r3}, {0x0, r3}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, r3}, {}, {0x0, 0x0}, {0x0}, {r1}, {0x0, r3}, {0x0, r3}, {0x0}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {r1, r3}, {}, {0x0, r3}, {}, {}, {0x0, r3}, {0x0, 0x0}, {r1}, {}, {r1}, {}, {}, {}, {}, {r2, r3}, {0x0, 0x0}, {}, {r2, 0x0}, {0x0, r3}, {}, {}, {}, {}, {}, {0x0}, {r1}, {r2}, {}, {0x0, r3}, {0x0, 0x0}, {}, {}, {}, {0x0, r3}, {r1}, {0x0, 0x0}, {r2}, {0x0, 0x0}, {}, {r2}, {0x0, r3}, {}, {0x0}, {}, {}, {}, {}, {}, {r2, r3}, {}, {0x0, r3}, {r1}, {}, {r2, r3}, {r2}, {0x0, r3}, {}, {}, {}, {}, {r1, r3}, {}, {}, {}, {r2}, {r2, 0x0}, {r1}, {}, {r2}, {0x0, 0x0}, {}, {}, {}, {0x0, r3}], 0x0, "2156816c73038c"})
ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000063c40)={0x0, [{}, {}, {}, {r28}, {}, {}, {}, {}, {}, {}, {}, {0x0, r16}, {}, {}, {}, {}, {}, {}, {r40}, {}, {}, {r34}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r38}, {}, {}, {}, {0x0, r21}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r29}, {}, {}, {}, {}, {0x0, r17}, {}, {r7}, {}, {}, {}, {0x0, r25}, {}, {}, {}, {}, {r12}, {}, {r45}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {r44}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r27}, {}, {r14, r46}, {}, {}, {}, {}, {}, {}, {}, {r22}, {}, {}, {}, {}, {}, {r26}, {0x0, r11}, {0x0, r48}, {}, {}, {0x0, r23}, {}, {0x0, r6}, {}, {0x0, r20}, {}, {r31}, {r9, r35}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r22}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r39}, {}, {}, {r13}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r36}, {}, {}, {0x0, r29}, {}, {}, {}, {}, {}, {}, {0x0, r47}, {}, {}, {r19}, {}, {}, {0x0, r18}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r24}, {}, {}, {}, {}, {}, {0x0, r41}, {}, {}, {}, {}, {0x0, r37}, {}, {}, {0x0, r29}, {r10}, {}, {}, {}, {}, {}, {}, {r33}, {}, {0x0, r42}, {0x0, r15}, {}, {}, {}, {r30, r4}, {}, {}, {0x0, r43}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r32}], 0xe1, "284a15e46bbc6d"})
ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000055f80)={0x1ff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0x81, "c3c66f1c3126fa"})
ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000050b40)={0x0, 0x0, "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", "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"})
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0})
ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0xfffffffffffffffe, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {r51}, {}, {}, {}, {}, {}, {r51}, {}, {}, {}, {}, {}, {r51}, {0x0, r52}, {}, {r51}, {0x0, r52}, {}, {}, {r50}, {}, {}, {}, {r50, r52}, {}, {}, {0x0, r52}, {r51, r52}, {}, {r50, r52}, {}, {0x0, r52}, {r51}, {}, {0x0, r52}, {}, {}, {r51}, {}, {}, {}, {}, {r50}, {}, {r51}, {r50}, {}, {r51, r52}, {}, {}, {0x0, r52}, {}, {}, {}, {}, {}, {}, {r51}, {}, {}, {r50}, {}, {}, {}, {}, {r51}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r52}, {0x0, r52}, {0x0, r52}, {0x0, r52}, {}, {}, {}, {}, {}, {}, {}, {r51}, {r50, r52}, {}, {}, {r51, r52}, {0x0, r52}, {}, {}, {}, {}, {}, {0x0, r52}, {0x0, r52}, {0x0, r52}, {r50}, {0x0, r52}, {0x0, r52}, {r50, r52}, {r51}, {}, {r50}, {r50}, {}, {}, {r50}, {r50, r52}, {}, {0x0, r52}, {0x0, r52}, {0x0, r52}, {0x0, r52}, {0x0, r52}, {}, {}, {}, {}, {r51}, {0x0, r52}, {r51, r52}, {0x0, r52}, {}, {}, {}, {}, {r50}, {}, {0x0, r52}, {r51}, {r50}, {0x0, r52}, {r51, r52}, {}, {0x0, r52}, {}, {0x0, r52}, {r51}, {0x0, r52}, {r51}, {r50}, {}, {}, {}, {0x0, r52}, {r50, r52}, {0x0, r52}, {}, {}, {}, {}, {0x0, r52}, {}, {}, {}, {r50}, {0x0, r52}, {0x0, r52}, {}, {}, {}, {}, {}, {}, {}, {0x0, r52}, {r50, r52}, {}, {0x0, r52}, {}, {}, {0x0, r52}, {}, {r50}, {}, {r50}, {}, {}, {}, {}, {r51, r52}, {}, {}, {r51}, {0x0, r52}, {}, {}, {}, {}, {}, {}, {r50}, {r51}, {}, {0x0, r52}, {}, {}, {}, {}, {0x0, r52}, {r50}, {}, {r51}, {}, {}, {r51}, {0x0, r52}, {}, {}, {}, {}, {}, {}, {}, {r51, r52}, {}, {0x0, r52}, {r50}, {}, {r51, r52}, {r51}, {0x0, r52}, {}, {}, {}, {}, {r50, r52}, {}, {}, {}, {r51}, {r51}, {r50}, {}, {r51}, {}, {}, {}, {}, {0x0, r52}], 0x0, "2156816c73038c"})
ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000051b40)={{0x0, 0x9, 0x29, 0x10001, 0x100000001, 0x3f, 0x727d, 0x80000001, 0x7ff, 0x8, 0x10000, 0x4, 0x7, 0x2, 0x40}})
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000052b40)={0x0})
ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000052d40)={0x0, 0x0, "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", "9f349acd38317106e356518073df6bf9cd91008c5f261f8cccc79f2cbf57f8fbf60bb19d2fb1036cb94625921fba0c9835916b6f076bf1ed10b512da82a47dc3d9ce3812c27261d3ecacb0a335b1ec68fc17225b49a833941a36c631dc95052422593b3349ee962e9a63315679a379742c7cb03ea7de1017f26bc7c4a615da1ca1d9eb749014f47f99ab36c306d9787541ea52317b3c6c22b6e37720058778995008d5081c3895f6fd9cf413e9e72c7cc5a6b23743e88e326ad595c685d3a08e8c61175a252e9e238d6a549d356af4a70bb605224c0647d6aadbb1a2e5252800ccf5dc0a0d823844833e47fda9b0fccc1b11b70766bc5814524c45b54bbcccfb189ac2ab7afcc09c29f380893374e560403c688eb295f051542aec8dc7216c5f4d2fffaef71ffd3bcf1383973b6816da37308f018c16ad5603ba5bf1cc148d151903fdaf749135ee816d4289d22526cd339237d9557b30fbb8f17742dbcf147e9712b3695b1bf0e91a37704ab708ba01b27f32519a6aa564364bad069a5f3b4006c38a3117b360591918a9fa39b4bf519a445c74ea81ddcae750b4149cfa36ae90acbe2b2707768c79f6a14d582819499feeabf83bc29886c482f2fabebf8487dba1f0633956ee7cd8d3d60fc88cb4a5a8117f1e7f9319a67f00ed29118f8ab5cbf20fb0da67db2c8acd53ceaab558752dc9502560af21f90b6ed7657d863fbc0e78d750378a9a6b5592a5e644a32bc7dcc7828efde753393deab594c6eb8bca35394cf82314226ff89192f4405f907b2c98e406f35ae366116241e9cfbea20fb5881adbeebc459ddf97044a9178280da35f94f6c991309272ff3203d91176c502ce606f0bc68113510971ea2246c9e210989f138f7ba7bcb0ba642fa2b003b00c641d62039dd65faa5cddccc1a6f870d17132929d08a0700f2bf32c9eb677991fd3561fe64c54c97697f3eac6886232c6b30808d35a9c91c23f287ee25d4c3ca3da21f4e7d2f032eaf6d96b9e3733b1048bdf9742496ee0e79f987d24a2a8567e948510337313b352b5c3f3028a04cba01d248aed4789921002ed5956234ea87e03d26c5df5a51f96ff82c04da9020562c1af1a38c5bd0541ea592bbae532b829f321a8bd9b0be1a49188eafeba9396803b5b98ff6aebcd4aa934781a695f5d7009a3f2882c9f67a55960ea99cc8abd216d8f819846d197ea254c4f075d7340a8650b0ff2892d5a86f2896577be72b7016a5c1305fb18d63e3e96380c8fa516110f4697328cb676d03451a097b98a3be09c65a979b0f4d919054da9e04ebc1174ce21a724d2f621de52b5c552c484ab2c57acab9a16470cbaeedaceb9db07f944791c6324c343b6c8328ae0869c5efebcd52cbb5e8c36277d97fd73cbd97739748fbdf64aa2a387f9919ad131e4f4439ada087091103efa0306ca5fed383895785e484b9264d30288b14f4681706dee9729fb0d2ff57c6aa288fa417fd131dea65324e871264295d918fa21b86f8adbc9a912a13cd6428be191bb9a7a89705f898fec3600da97769a9d77de2d72de8d26c02e04a1aa26aad67cbfdd71d9889935f8bdc70c33b2262a900b91f332254f082bf408f646c36b453b874f510289a8f04d628028276a1068d033d6989d0ad2aff61539f216f3c8d9111d215e39c940c3fb785466be4ed4711d4fde22095c607008c5ea385465692110558ed7c88a86798dc7b8721b2a99162cd9fd1582bd1792e48dacdfcb80f4712d612c908a4d6b62d9382f5935ebe0835b64be1ac34a48aaa7215bfeeb13b2b3ecbe3887a97e1416f1f9eebce6d9b492f7f090e8506aff4880671ba52ef59542b02f32a3cdad10c8b81de2e0202867617cf39879b383356a85ea6732df072a3571961fc461c5086f4fba45144f899440a585bd247f54107cad1ad97d896ca77988f6ce027c1b5d90f82d8cfa47c9bca9583c0c8773deeb5ae413f68dc939f41183bbc67725eb4f432ad4b1a4022767fdce26860ae59909e34be662ea13f5b5ba9c494d3ff8fa7bdc53e89e66917d98223afcb7ede8f6eaad537d119b375638f9be6d563c954a04c67c17b77466afeb5baa76cd4d497f8cf1d5a0ccb38af268d7ac65e58cbb99ce27d87bbf3996425029c3cef9e61ac52d07c883b1e04e0f05e6d104440cd7d4be17cc4e452ef50cf10468b110fd0c54ab6bc39d930504f394a36dc5aa6bf04aaf7865e48bdfe9e5bec8cd90b6cf02cc69e6f5747c6f1648a5fe5eefbf72f0ecf8c4277c350ad56600bccf42c804b9a460e377c04c55524a8d9a0a0473f65d15cc6fc5f8ad3e508cf559c9ce783e6f6ab2868c065d8176b26c44a399bcdeb851853e7fcd851ccf5f120d0ca573350100b4f956cb1087e68d08f8b868a00f7a442299cf82e63c828a8f52317b76c01e85203c0b5789488c3b5314e1176e9076812ce36b1a8a444e5d80c9054f608962e5522fba850efd37d1f427e3fac7d0d6f16fda5455c8f41e9b5a390b83fd83968d49c43d126dd52c5e1c6246e42c33af5b8929801ce96f2e22802335b0264d693745c6ddb6879a935e2d0259f788d88892cd39327b0faf309d09c07c6adb2c2808dc930611c35760de57ec2afa21411c6d2f431e25ceb25bf7cc01621d0a82bc39979fe5827a201d8719ec7a08ca7183cdba52dc667d322f07dd848b9bedc3615c5d4dd7e19edb33e6cfa689fb7246eb80336ba46fe67eaade14e8383c126f61eebc0b28e6ff6424f99484a32b6ad4fa0a7004b39be060117acead7e768d20638bc1d0b4a9ff70a92a031749007df3db7b16196a9751d11248e4ac51ee9fe26f61dc11f761a8537d426f0484cbc68575b1297d046b2911259ecec24d6904ac69e0d5bbc0b640dce9d455f78258c3f57d12699cacdb78fe53c481565ffdd2152a9909dca791b821c5661c3e908cecbc986dfdc2de942aee497fbad8782744d2581484a3d9ff2f9aa29875b62662f796c6f72fb50fc54a599ab0071aba24e03c074975f7c7d0051cc160dd9d05a72ae2577a5163ee2bb1702c0f8b829e8a06d7c62e397def706c8125c4aa4a4a3506dd0e10d5c33162c187c1f1ae9c3740ca7412556728df21defdc750dc73d8f7af035c59b2e3875ef0d4ca24b663c76b3024795bede7c4fff133ab9e15d8b2f16ceb3530fa87c861e750fc9e84cce5c13eed5d8d02a21fc719c8837e8d88460ecc5834f49f5bde7c7e78b2904f7baaf800c8862aab7f4814f3109e2d97872bee787ff18c79a53ea7f3c36678278772f918e17a9e4e74f33624043aa7d9636ecd8e4897567c74f731d5067f4630218ef0164fa2ea9db847ed9261c03ea69ed240f71bc3c8eed8f9a2f44e35fcd2803923e58d240fbc6cc77d9b77b8b6134effe6578f979073f514b13f333e4283134e2cf593199c412e1a76c544cf5a11e57927638e6a94676cf9ff209c1e2f8526b425622fe5eaa4dbd4f5ba216518ded9965881e6e24299864eadd43af593513f90e2796c3df4f99866027e0e5be411306b92ddb3f133adca4e4132213a8823a0739fb4ce47927dd168663d1b36cc450dc858082a6d91f8a7110646c3a79766c5c5597e2e46f000c842dde0a2724715f3a615cdfbd2f62e5e1b2875048a6cdb15fdb80edc0ab25d2e4e3d179ced6a907087f0ecf35d90b8b80c4508364d1e542a510daffda9736774d69f855348ee4bb5ec55768b01cc67a12471feb7008e00f307d7ed61fb9884af8e3a7fdd228bf455d9fd1962a08eab69483f7bef3b3a0d734bd1fc8228a06c1a86cdd2059a5a8014a03ae98d00175f20c345640fc38a338a0cbdf9bca2ee38416b2899c23593e5ab88abbc2826159fb3a11f4f55d26c3298fd77948830573a615653ca959ad33157e7bac4d0e68f58e8c41773ab1de766b0bb7169a3e12ab19c3abac257e5e5d26dd67a7dc3de1d55af3429eefe0de5687c4e93cc1b80d5bad8c9f0040d13830b3ebc745dda87f9d3882633b2abc728aadc5ed6394656bfdef25e0c5b20a3a0458e076aa4430d0539258f368e143b71377632c6dd4a816033d780250e8bb5daa79a381d65e3f249cf46f0541738e49869f5aded1dfcb5ac4bb0b617819de598162ce18056deee753dc25781fde6564912664ef1de9301ee039f9f6c44b697159d7b40d91993d8a515644c5cd3514cca7c0f04b78a8b789ed0a60e55a7244d692805cb03d8bd8491c631e46076cfbe07141ece6e39e038e28267313d97080ce5ba317f55062c19a34d4f12968709d81ee77f83dc4dde6d28bd725e895c42062fcddfd81effd3384997aa9c5a57e1866a0b879339a962ae83f82aa5ef4b5316ebbfffd4cf79ae5d195b08869d2af9a164c39b2136e09acf81913a8aa5410e90d858166e3b892a7a04892d34902d96a8c641b92ebc38ebd68bd7a28ccd52c5e0807f00ce3af14bdb7a0845dec7e9b5231c9f6cf3b74bacd3f2111124d0f6897ff98b100b7be8f0f3e40a66d82c1c0c09c1ae14e5ef5d61914ba38c006f1deb50e6ba9a563be53c24b9a70fe5a7a391d4eb3fee89f0d7c3064019eb04d1b01c40977f68647a428b58e040f4180d0da7b34e5d2fddb864d4550841556b633d985bb35ced1be7d1da6fe44bcaa7ac2cd242195806037bd72fcc86bed41ce59c2263583387ba6d6a4ef6cc4981b7c29920cc39b9da9dd1daa2c1708a03d2351c8c746b1594334f62d0774e379a4af4441dc04984bc766958aa06977bb15b5033c5cdd3bbaa55e607c72927695552fe515ef6f6891388d7df6b552ca0c4e7f7e7137b7a341733ab7f17092c3a0ccb7acb5faa49fcce939a5671209552d135e2d5fc392e5a5ce05092d3a5a77a3844d67cbdb229d6e9e744c23fafd1d76873344cc0ad4f4fb57e89336a67ca7133c38e83595d885ced613385679d58912735f433586c7c85780beed3c90cd5860a3f1c0995b4a98d2d568277f838a390f60b9aaaf240c97a3eb03397534993cb98d6694994e26e19abdffa7bd2c87284eb37eb62c3e8df9599e01d0eafd5e2ea0a30ef37e8ede068373f45f8e2ecc67358d75ee7e689f53f84de768f5f3488a16e634905db94898ae4026c309ab2f9b568d7e1fc51037b7b03117d95724e53e68d48e3590be4b4533f87a3c574f0e799c7dfae41578ec3d6613288ab17b4edd63c1e3fd86e7e8701c750dd0e2d9b0256e0fb17cee24b6949d19e0d49b38b7b9dd96e60dc7661fdca7c93c1eb615436e205dd85e40c960a3f4425716f3d4339ff0bf9a1caf487ee087d71b77509f53e6cfd00155364d9dd882a28527f60e1a59d70ee1eaa57740ce8792f579aa7bb1ee7aada36a6888f40b998a93e726adc420a692328a7b4b3eedd5f2e0d95289eed1fcb07f4549a7a9c0870e6c437a08c6f826993da7d37af27ce1e89b7e015f0efcd"})
ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000053d40)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r49}, {r50}, {r53}, {r54}, {r55}], 0x9, "c22dba8c65e406"})
22:07:48 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x8847}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3453.500694][T24213] loop2: detected capacity change from 0 to 264192
22:07:48 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
getsockname$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r2, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0)
ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5", 0x0, 0x0, 0x0, 0x100, 0x0})
fsetxattr$security_capability(r3, &(0x7f0000000440), &(0x7f0000000480)=@v1={0x1000000, [{0x3b}]}, 0xc, 0x1)
r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0)
ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5", 0x0, 0x0, 0x0, 0x100, 0x0})
pread64(r4, &(0x7f0000000200)=""/154, 0x9a, 0xca)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000000, 0x40010, r2, 0xc0240000)
getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000001540)={@multicast2, @private, 0x0}, &(0x7f0000001580)=0xc)
bpf$PROG_LOAD(0x5, &(0x7f0000001640)={0x16, 0x4, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x200}, [@alu={0x4, 0x0, 0x7, 0x2, 0x4, 0xc, 0x9d04472991804902}]}, &(0x7f0000000500)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000540)=""/4096, 0x41000, 0x0, '\x00', r5, 0x1, 0xffffffffffffffff, 0x8, &(0x7f00000015c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000001600)={0x3, 0x9, 0x7fffffff, 0x401}, 0x10, 0x0, r0}, 0x78)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="fd81473b518849dfb71219d95d63664ecf9000"], 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000340)={'sit0\x00', &(0x7f00000002c0)={'ip6_vti0\x00', r1, 0x29, 0x1f, 0x6, 0xffff, 0x12, @private2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x0, 0xf807, 0xd3, 0x5}})
bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xfc38d9436194e9e7, 0x2661, 0x10001, 0x857, 0x2, r2, 0xced8, '\x00', r6, 0xffffffffffffffff, 0x0, 0x5, 0x1}, 0x40)
22:07:48 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}, 0xd}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3453.541342][T24213] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:48 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x8847}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:48 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc09e0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:48 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x8848}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3453.627198][T24420] loop1: detected capacity change from 0 to 512
[ 3453.647782][T24420] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3453.657053][T24420] EXT4-fs (loop1): mount failed
22:07:48 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000014540d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3453.684188][T24420] loop1: detected capacity change from 0 to 512
[ 3453.693147][T24420] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3453.701353][T24420] EXT4-fs (loop1): mount failed
22:07:48 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x0, 0x400)
ftruncate(r1, 0x4)
22:07:48 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x34000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3453.765759][T24434] loop2: detected capacity change from 0 to 264192
[ 3453.801389][T24434] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:48 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc09f0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:48 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x8848}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:48 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}, 0xe}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:48 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x400300}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3453.876452][T24637] loop1: detected capacity change from 0 to 512
[ 3453.895478][T24637] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3453.902011][T24637] EXT4-fs (loop1): mount failed
22:07:48 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x275a, 0x0)
r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x102)
ioctl$SG_SET_COMMAND_Q(r1, 0x2284, &(0x7f0000000040)=0xfffffffe)
sendmsg(r1, &(0x7f0000001500)={&(0x7f0000000200)=@l2={0x1f, 0x7, @any, 0x7, 0x2}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)="6d0b94be6a42eaf60e33a18ff31bc6651f03000000000000003b962604d19e4f9d36d6a497876b71f591e1d845", 0x2d}], 0x1, &(0x7f0000000280)=[{0x58, 0x113, 0x5, "913279b09deec1bfb203f457bc6b1df84414205981fa8d1245b862a1cfa83709c3c7949109b87f226ce500e1fbf2146dd4dd00a5781d3904de7cd86b2caf91b100"}, {0x18, 0x117, 0xffffffff, "1bbbe3b83f4116"}, {0x38, 0x0, 0x9, "8a2bcfc7bb7ec5a34f69ef7bb4a9aa9702ac7bf743710816a53e90cb6daea26984724127a1a9f0"}, {0x50, 0x116, 0x1808, "5e6784e24ed5322041308531c8ee97ef82a18278205f55b5f67b0c18895db5c2b6d8eaca3c315922ca622012b44c57b1546d4f5334735be35dacbe7f55"}, {0x80, 0x102, 0x3, "fcecce31ce2bef00f2de1523a1444bc8e119f9af78548c8afa0b15191a7279aa13cfa419e2c7edd97162e272d7aba0a4ae4bfda009605882fd78f11f55581dacbc11693aaccd8e13cb3fddc485fce4e5ada498e4b3ec2714e1e845f74b8a4ccf16641550d5156ace61ce7e6f5d32c388"}, {0xc0, 0xff, 0x7, "a74eab78a6e05478c5bda5f65d2aa82a3a4ed62df10c7353951ac468c50cc38b682eb277b52c4a5d090a24a63b5f05d95b4ab8796172896c8462c9dc06b50530db2d72d85fe76d97a22cbce90afb620147cfeaf9ec0306c7cb13ac7f60af09c0d0764875545cd4eed7458aa8ff7852354d0f8907a4612a250ea085cfe60c1d453d7713ce5fd625066ca873831bbaa80f268cc0615f87c04ad7a1432711f708845c9e297c6b7062d047aee925bb019c"}, {0x1010, 0x119, 0x401, "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"}], 0x1248}, 0x40800)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000040)=@v2={0x2000000, [{}, {0x0, 0x2}]}, 0x14, 0x1)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
[ 3453.946028][T24637] loop1: detected capacity change from 0 to 512
[ 3453.956845][T24637] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3453.963667][T24637] EXT4-fs (loop1): mount failed
22:07:48 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x1000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:48 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000014640d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:48 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x9c0b}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3454.029547][T24650] loop2: detected capacity change from 0 to 264192
[ 3454.053833][T24650] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:48 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0a00100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:48 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x2000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:48 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}, 0xf}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:48 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000000), &(0x7f0000000140)=@v3={0x3000000, [{0x6, 0x6584}, {0x1ff, 0x7fff}], 0xee00}, 0x18, 0x0)
r1 = socket(0x0, 0x1, 0x0)
ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x6)
getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000200)=""/247, &(0x7f0000000080)=0xf7)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="5f62747266022e2d00"], 0x0, 0x0)
22:07:48 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x3000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:48 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xb80d}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3454.256556][T24865] loop2: detected capacity change from 0 to 264192
[ 3454.272988][T24865] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:48 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}, 0x10}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:48 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x4000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:49 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0a10100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:49 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x800, 0x0)
r2 = openat(r0, &(0x7f0000000200)='./file0\x00', 0x101883, 0xa3)
write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0x7, 0x100, "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", 0x7f, 0x40, 0x5, 0xcf, 0x6, 0x3f, 0x7f}}}, 0x120)
ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r1, 0x8008f513, &(0x7f0000000080))
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
getsockname(r2, &(0x7f0000000380)=@nfc_llcp, &(0x7f0000000400)=0x80)
[ 3454.340617][T25071] loop1: detected capacity change from 0 to 512
[ 3454.386601][T25071] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3454.394777][T25071] EXT4-fs (loop1): mount failed
[ 3454.448623][T25071] loop1: detected capacity change from 0 to 512
[ 3454.458546][T25071] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3454.466453][T25071] EXT4-fs (loop1): mount failed
22:07:49 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000014740d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:49 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x5000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:49 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xbc0a}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:49 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}, 0x11}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:49 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="62747266732ead00"], 0x0, 0x0)
22:07:49 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0a20100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3454.526183][T25168] loop2: detected capacity change from 0 to 264192
[ 3454.556786][T25168] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:49 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x6000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:49 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x7000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:49 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
set_mempolicy(0x1, &(0x7f0000000200)=0x6, 0x100000001)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x3)
r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='blkio.bfq.io_queued_recursive\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYRESDEC=r0, @ANYRES64=r0, @ANYRES16=r0, @ANYRESHEX=r0], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
r1 = socket(0x6, 0x5, 0x4)
ioctl$AUTOFS_IOC_PROTOSUBVER(r1, 0x80049367, &(0x7f0000000100))
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:49 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xc00a}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3454.723627][T25301] loop2: detected capacity change from 0 to 264192
[ 3454.755295][T25301] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:49 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}, 0x12}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:49 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0a30100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3454.845515][T25508] loop1: detected capacity change from 0 to 512
[ 3454.863858][T25508] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3454.871487][T25508] EXT4-fs (loop1): mount failed
[ 3454.916625][T25508] loop1: detected capacity change from 0 to 512
[ 3454.948369][T25508] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3454.955784][T25508] EXT4-fs (loop1): mount failed
22:07:49 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000014840d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:49 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x8000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:49 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="62744ad6082c2d00"], 0x0, 0x0)
22:07:49 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xc00d}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:49 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0a40100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:49 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}, 0x14}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3454.992729][T25620] loop2: detected capacity change from 0 to 264192
[ 3455.015148][T25620] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:49 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x9000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:49 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="6701b22e2fce"], 0x0, 0x0)
22:07:49 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xd40a}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:49 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0xa000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:49 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0ef0000}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3455.202908][T25832] loop2: detected capacity change from 0 to 264192
[ 3455.210093][T25833] loop1: detected capacity change from 0 to 512
[ 3455.224397][T25832] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:49 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="62747266732e2d005000d1da9aabe80acacef12bce63c86e43b49f81cd14ed3c27f8e4070000000afed028fa3cba61505d18b742e58e252fcd53a555f8f9602eb2e0d874d6cc2ec2cd995c799e0baa127252ccf7"], 0x0, 0x0)
[ 3455.291392][T25833] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3455.298765][T25833] EXT4-fs (loop1): mount failed
[ 3455.351691][T25833] loop1: detected capacity change from 0 to 512
[ 3455.360984][T25833] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3455.370195][T25833] EXT4-fs (loop1): mount failed
22:07:50 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000014940d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:50 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}, 0x19}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:50 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0xb000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:50 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xd80a}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:50 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0)
fsetxattr$security_capability(r0, &(0x7f00000001c0), 0x0, 0x0, 0x2)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
r2 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0x264102, 0x0)
ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000200)={{0x1, 0x1, 0x38, r2}, './file0\x00'})
r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0)
ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x53, 0xfffffffffffffffe, 0xa1, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000500)="e72fd7c96f8088000000004d7d0379e58d1419eaabb4ee56e02cb0de93f0774f05dc781b130649b2dcfb48f37dce19b819e42eb6ed2dbe88706c8616e669b0e6e53d7800364abb9f636156cf03120637f5cc2b47b444dbbf3b232f8375f207e9ccb84d86673f3fa0bfeb156889149288b5a21821a0fd4ca12f3978bd953a51e1a5010117be61a87e55819694383b79d9379dcd42ceb8613e59c2c476b922763eb1", 0x0, 0x0, 0x0, 0x100, 0x0})
write$binfmt_script(r3, &(0x7f0000000400)=ANY=[@ANYRESOCT=r4, @ANYBLOB="72602bdfab9ea647186ec4d58f2f9c677f296dc5884783708b234644e605f020103553a8b565b3a7fbd07b80fb0f47cee20ce1157bd8979460c9e986db17c4187daf3d0e0112d5428bfedd17c95c74bb0348693d56f2bb5841e43ab59f544b0317b2751f6d9adf8a9b0d8c7c7201c2118ba6481390bf407ac399a5b835928a2ccc44ec8a8ccb363979e54fdc4d70652f0a4b0147e2c59bd7a97f9e3b094c6e85b03c1a70660b429c789329de13943688d96c934b41b295c9a8a67ed389d0ba966850ed561bd393bb", @ANYRESDEC=r4], 0xfea7)
ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r3, 0xc0189373, &(0x7f0000000240)={{0x1, 0x1, 0x18, r4, {0x4}}, './file0\x00'})
setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r5, 0x84, 0x72, &(0x7f0000000280)={0x0, 0x128, 0x20}, 0xc)
fsetxattr$security_capability(r1, &(0x7f0000000140), &(0x7f0000000000)=@v2={0x2000000, [{0x5, 0x1}, {0xfffffffe}]}, 0x14, 0x2)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5)
setuid(r6)
r7 = getgid()
setxattr$system_posix_acl(&(0x7f0000000400)='./file0\x00', &(0x7f0000001500)='system.posix_acl_default\x00', &(0x7f0000001740)=ANY=[@ANYBLOB="02000000010006000000000002000100", @ANYRES32=0xee00, @ANYBLOB="02000200", @ANYRES32=r6, @ANYBLOB="040000000000000008000500", @ANYRES32=r7, @ANYBLOB="10000500000000002000f512b7a29f060000000000"], 0x3c, 0x2)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000300)={{0x1, 0x1, 0x18, r2, {0x0, r7}}, './file1\x00'})
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="ce42a600b490f298ee650adc0400a66f4b0410a0201209"], 0x0, 0x0)
set_mempolicy(0x0, &(0x7f0000000040)=0xaba, 0x18)
22:07:50 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0f00000}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3455.400191][T26050] loop2: detected capacity change from 0 to 264192
[ 3455.418060][T26050] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:50 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0xc000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:50 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}, 0x46}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3455.570060][ T24] audit: type=1400 audit(1639001270.192:752): avc: denied { setattr } for pid=26158 comm="syz-executor.4" name="IEEE-802.15.4-MAC" dev="sockfs" ino=672585 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1
[ 3455.604896][ C0] sd 0:0:1:0: tag#5170 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s
[ 3455.614793][ C0] sd 0:0:1:0: tag#5170 CDB: opcode=0xe7 (vendor)
[ 3455.621145][ C0] sd 0:0:1:0: tag#5170 CDB[00]: e7 2f d7 c9 6f 80 88 00 00 00 00 4d 7d 03 79 e5
[ 3455.630276][ C0] sd 0:0:1:0: tag#5170 CDB[10]: 8d 14 19 ea ab b4 ee 56 e0 2c b0 de 93 f0 77 4f
[ 3455.639297][ C0] sd 0:0:1:0: tag#5170 CDB[20]: 05 dc 78 1b 13 06 49 b2 dc fb 48 f3 7d ce 19 b8
[ 3455.648530][ C0] sd 0:0:1:0: tag#5170 CDB[30]: 19 e4 2e b6 ed 2d be 88 70 6c 86 16 e6 69 b0 e6
[ 3455.657581][ C0] sd 0:0:1:0: tag#5170 CDB[40]: e5 3d 78 00 36 4a bb 9f 63 61 56 cf 03 12 06 37
22:07:50 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xdc0a}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:50 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB='btr-\x00'], 0x0, 0x0)
[ 3455.666642][ C0] sd 0:0:1:0: tag#5170 CDB[50]: f5 cc 2b 47 b4 44 db bf 3b 23 2f 83 75 f2 07 e9
[ 3455.675692][ C0] sd 0:0:1:0: tag#5170 CDB[60]: cc b8 4d 86 67 3f 3f a0 bf eb 15 68 89 14 92 88
[ 3455.684746][ C0] sd 0:0:1:0: tag#5170 CDB[70]: b5 a2 18 21 a0 fd 4c a1 2f 39 78 bd 95 3a 51 e1
[ 3455.693786][ C0] sd 0:0:1:0: tag#5170 CDB[80]: a5 01 01 17 be 61 a8 7e 55 81 96 94 38 3b 79 d9
[ 3455.702918][ C0] sd 0:0:1:0: tag#5170 CDB[90]: 37 9d cd 42 ce b8 61 3e 59 c2 c4 76 b9 22 76 3e
[ 3455.711963][ C0] sd 0:0:1:0: tag#5170 CDB[a0]: b1
22:07:50 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0xf000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3455.733835][T26265] loop2: detected capacity change from 0 to 264192
[ 3455.754107][T26265] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3455.763899][T26268] loop1: detected capacity change from 0 to 512
22:07:50 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0f10000}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3455.802621][T26268] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3455.824646][T26268] EXT4-fs (loop1): mount failed
[ 3455.871919][T26268] loop1: detected capacity change from 0 to 512
[ 3455.880843][T26268] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3455.888056][T26268] EXT4-fs (loop1): mount failed
22:07:50 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000014a40d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:50 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x10000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:50 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}, 0x47}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:50 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
syz_open_dev$sg(&(0x7f0000000040), 0x2, 0x101681)
setxattr$incfs_size(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200), &(0x7f0000000240)=0x88f, 0x8, 0x3)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='.\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
ioctl$EXT4_IOC_GET_ES_CACHE(0xffffffffffffffff, 0xc020662a, &(0x7f0000000280)={0x9e, 0xdb6, 0x3, 0x2, 0x2, [{0x8, 0x6d, 0xfffffffffffffffe, '\x00', 0x80}, {0x80, 0x4, 0x3, '\x00', 0x1004}]})
22:07:50 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xe00a}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:50 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x11000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3455.962933][T26480] loop2: detected capacity change from 0 to 264192
[ 3455.977079][T26480] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:50 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0f20000}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:50 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}, 0x48}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:50 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.origin\x00', 0x0, 0x26)
r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x102)
ioctl$SG_SET_COMMAND_Q(r1, 0x2284, &(0x7f0000000040)=0xfffffffe)
sendmsg$NL80211_CMD_GET_REG(r1, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0xfc, 0x0, 0x8, 0x70bd2c, 0x25dfdbfb, {}, [@NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x81}, @NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'bb\x00'}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x7c}, @NL80211_ATTR_REG_ALPHA2={0x6, 0x21, 'b\x00'}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0xff}, @NL80211_ATTR_REG_RULES={0xb8, 0x22, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x20000006}]}, {0x54, 0x0, 0x0, 0x1, [@NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x10001}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0xffffffff}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x8000}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0xa44}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x1}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x1}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0xb2c}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x1f}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0xfff}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x355}]}, {0x54, 0x0, 0x0, 0x1, [@NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x4}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x8000}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x4}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x1}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x9}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x8}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x7}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x5}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x800}]}]}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8}]}, 0xfc}, 0x1, 0x0, 0x0, 0x14}, 0x880)
22:07:50 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x60000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:50 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xe40a}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3456.146978][T26698] loop1: detected capacity change from 0 to 512
[ 3456.158007][T26698] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3456.166115][T26698] EXT4-fs (loop1): mount failed
[ 3456.194696][T26701] loop2: detected capacity change from 0 to 264192
[ 3456.205602][T26698] loop1: detected capacity change from 0 to 512
[ 3456.214119][T26698] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3456.216073][T26701] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3456.230315][T26698] EXT4-fs (loop1): mount failed
22:07:50 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0f30000}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:50 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000014b40d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:50 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x65580000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:50 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x1, 0x5)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000200))
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000080)='cpuacct.usage_percpu\x00', 0x0, 0x0)
fremovexattr(r0, &(0x7f0000000400)=@known='system.posix_acl_access\x00')
r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x102)
ioctl$SG_SET_COMMAND_Q(r1, 0x2284, &(0x7f0000000040)=0xfffffffe)
openat$cgroup_ro(r1, &(0x7f0000000440)='cpu.stat\x00', 0x0, 0x0)
ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file1\x00'})
22:07:50 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}, 0x4c}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:51 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xf80a}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:51 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x6b210000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:51 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0f40000}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3456.405033][T26913] loop2: detected capacity change from 0 to 264192
[ 3456.424726][T26913] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:51 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
r0 = socket(0x0, 0x1, 0x0)
ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f0000000100)=0x6)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r1, &(0x7f0000000040)=ANY=[@ANYRES64=r1, @ANYRESOCT=r1], 0xfea7)
fsetxattr$security_capability(r1, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
[ 3456.474817][T26920] loop1: detected capacity change from 0 to 512
[ 3456.505498][T26920] EXT4-fs (loop1): corrupt root inode, run e2fsck
22:07:51 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x81000000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:51 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}, 0x60}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3456.551667][T26920] EXT4-fs (loop1): mount failed
22:07:51 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xfc0a}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:51 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0f50000}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3456.593588][T26920] loop1: detected capacity change from 0 to 512
[ 3456.607260][T27130] loop2: detected capacity change from 0 to 264192
[ 3456.614836][T26920] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3456.622856][T26920] EXT4-fs (loop1): mount failed
[ 3456.628281][T27130] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:51 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000014c40d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:51 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'gretap0\x00', 0x0})
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@newtclass={0x40, 0x28, 0x10, 0x70bd2a, 0x25dfdbfd, {0x0, 0x0, 0x0, r0, {0x3, 0xc}, {0x10, 0xffe0}, {0xfff1, 0x4}}, [@TCA_RATE={0x6, 0x5, {0x1, 0xde}}, @tclass_kind_options=@c_taprio={0xb}, @TCA_RATE={0x6, 0x5, {0x4, 0x20}}]}, 0x40}, 0x1, 0x0, 0x0, 0xc88c1}, 0x1)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfea7)
sendmsg$nl_netfilter(r1, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000300)={0x160, 0x6, 0xb, 0x801, 0x70bd2a, 0x25dfdbff, {0x5, 0x0, 0x1}, [@nested={0x2c, 0x10, 0x0, 0x1, [@typed={0x14, 0x6d, 0x0, 0x0, @ipv6=@loopback}, @typed={0x14, 0x9, 0x0, 0x0, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}]}, @nested={0x11d, 0x8c, 0x0, 0x1, [@typed={0x8, 0x7a, 0x0, 0x0, @fd=r1}, @generic="dbb22ff42fb5b2ec3f9a2db531ea39e8e1afdb", @typed={0x14, 0x46, 0x0, 0x0, @ipv6=@dev={0xfe, 0x80, '\x00', 0x22}}, @generic="5bab55a175c38c187b176de57390e9a0761a52e6bbecb2137d6499234ca7a6f9501f8aa948d20f3268bf9073dafdd5f33d2c2a0b7d6696f48aef4491302e2aaea57a1e9bd5eec0b61c22c2a7b21b3905620cd799ef0b4e7dabd57aa1620751b714b6b088c541ed7d41acde2375efa599e34cb3e3f71a86520db30b5094a3da45bb631aa7a722a436c3a6e5cfa4f5f4426911b4a66580f2bb5ee7d7ab2ffa6acfccf2fc99c701467d593ad0a6300c41383ff39cacd1ad2a4aa85840d852cf4b211c0ef7c12fedddb82974974d57af7e953c403fcf7721b43f7bee500661d1a8bd7af4", @typed={0x8, 0x76, 0x0, 0x0, @u32=0x7f}]}]}, 0x160}, 0x1, 0x0, 0x0, 0x40090}, 0x8000)
ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000500)={{0x1, 0x1, 0x18, r1}, './file0\x00'})
fsetxattr$security_capability(r2, &(0x7f0000000540), &(0x7f0000000580)=@v3={0x3000000, [{0x9, 0x1}, {0xee33, 0xa4}], 0xee00}, 0x18, 0x2)
fsetxattr$security_capability(r1, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:51 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x81ffffff}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:51 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x1a000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3456.792507][T27145] loop2: detected capacity change from 0 to 264192
[ 3456.823131][T27145] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:51 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}, 0x63}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:51 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0f60000}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:51 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x88470000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:51 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)=@known='trusted.overlay.origin\x00', 0x0, 0x0)
[ 3456.885273][T27351] loop1: detected capacity change from 0 to 512
[ 3456.903636][T27351] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3456.910188][T27351] EXT4-fs (loop1): mount failed
[ 3456.942542][T27351] loop1: detected capacity change from 0 to 512
[ 3456.951822][T27351] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3456.958343][T27351] EXT4-fs (loop1): mount failed
22:07:51 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000014d40d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:51 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x88480000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:51 executing program 4:
ioctl$SCSI_IOCTL_GET_BUS_NUMBER(0xffffffffffffffff, 0x5386, &(0x7f0000000280))
set_mempolicy(0x8000, &(0x7f0000000240)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000080)=0x5a)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
r2 = creat(&(0x7f00000001c0)='./bus\x00', 0x102)
ioctl$SG_SET_COMMAND_Q(r2, 0x2284, &(0x7f0000000040)=0xfffffffe)
openat(r2, &(0x7f0000000200)='./file1\x00', 0x20000, 0x84)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB='btrfs\b\x00\x00'], 0x0, 0x0)
22:07:51 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0f70000}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3457.055318][T27363] loop2: detected capacity change from 0 to 264192
[ 3457.081957][T27363] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:51 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}, 0x64}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:51 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x34000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:51 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x88a8ffff}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3457.176718][T27570] loop1: detected capacity change from 0 to 512
[ 3457.193494][T27570] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3457.201496][T27570] EXT4-fs (loop1): mount failed
22:07:51 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x9effffff}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3457.259509][T27578] loop2: detected capacity change from 0 to 264192
[ 3457.276148][T27578] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3457.284488][T27570] loop1: detected capacity change from 0 to 512
22:07:51 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x102)
ioctl$SG_SET_COMMAND_Q(r0, 0x2284, &(0x7f0000000040)=0xfffffffe)
bpf$ITER_CREATE(0x21, &(0x7f0000000300)={r0}, 0x8)
r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x102)
ioctl$SG_SET_COMMAND_Q(r1, 0x2284, &(0x7f0000000040)=0xfffffffe)
r2 = creat(&(0x7f00000001c0)='./bus\x00', 0x102)
ioctl$SG_SET_COMMAND_Q(r2, 0x2284, &(0x7f0000000040)=0xfffffffe)
r3 = creat(&(0x7f00000001c0)='./bus\x00', 0x102)
ioctl$SG_SET_COMMAND_Q(r3, 0x2284, &(0x7f0000000040)=0xfffffffe)
r4 = openat$cgroup_ro(r3, &(0x7f00000002c0)='blkio.bfq.io_service_time\x00', 0x275a, 0x0)
write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r4, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0)
r5 = socket(0x0, 0x1, 0x0)
ioctl$EXT4_IOC_CHECKPOINT(r5, 0x4004662b, &(0x7f0000000100)=0x6)
sendmsg$NL80211_CMD_SET_CHANNEL(r5, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x30, 0x0, 0x100, 0x70bd29, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0x100, 0x5c}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x20000005}, 0x4000000)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:51 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0f80000}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:52 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}, 0x68}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:52 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x40000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3457.323909][T27570] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3457.344090][T27570] EXT4-fs (loop1): mount failed
22:07:52 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000014e40d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:52 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0xeaffffff}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:52 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0f90000}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3457.458269][T27791] loop2: detected capacity change from 0 to 264192
[ 3457.483261][T27791] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:52 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
set_mempolicy(0x3, &(0x7f0000000080)=0x7270, 0x3)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v1={0x1000000, [{0xb7e, 0xfffffffb}]}, 0xc, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:52 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0xefffffff}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:52 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}, 0x69}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:52 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xb0000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3457.599118][T28001] loop1: detected capacity change from 0 to 512
[ 3457.616833][T28001] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3457.623559][T28001] EXT4-fs (loop1): mount failed
[ 3457.642509][T28001] loop1: detected capacity change from 0 to 512
[ 3457.652726][T28001] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3457.661938][T28001] EXT4-fs (loop1): mount failed
22:07:52 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000014f40d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:52 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x42)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xa, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:52 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0xf0ffffff}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3457.698336][T28006] loop2: detected capacity change from 0 to 264192
[ 3457.718131][T28006] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:52 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0fa0000}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:52 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}, 0x6c}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:52 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x200000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:52 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0xfeffffff}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:52 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'})
write$binfmt_script(r1, &(0x7f0000000200)={'#! ', './file1', [{0x20, ':!'}, {}, {0x20, 'security.capability\x00'}, {0x20, 'security.capability\x00'}, {0x20, 'security.capability\x00'}, {0x20, '-\x00'}, {0x20, 'cpuacct.stat\x00'}, {0x20, '-\x00'}], 0xa, "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"}, 0x1062)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
[ 3457.884228][T28222] loop1: detected capacity change from 0 to 512
[ 3457.902881][T28222] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3457.909387][T28222] EXT4-fs (loop1): mount failed
[ 3457.921032][T28225] loop2: detected capacity change from 0 to 264192
22:07:52 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0fb0000}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:52 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0xffffa888}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3457.936244][T28225] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:52 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x400300}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:52 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0xffffff7f}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3458.055020][T28222] loop1: detected capacity change from 0 to 512
[ 3458.092201][T28382] loop2: detected capacity change from 0 to 264192
[ 3458.098922][ T1403] ==================================================================
[ 3458.107172][ T1403] BUG: KCSAN: data-race in __jbd2_journal_drop_transaction / start_this_handle
[ 3458.116082][ T1403]
[ 3458.118384][ T1403] write to 0xffff888103c27878 of 8 bytes by task 28382 on cpu 0:
[ 3458.126072][ T1403] start_this_handle+0xd37/0x1050
[ 3458.131073][ T1403] jbd2__journal_start+0x1fc/0x3f0
[ 3458.136156][ T1403] __ext4_journal_start_sb+0x159/0x310
[ 3458.141664][ T1403] __ext4_new_inode+0xd95/0x2fc0
[ 3458.146673][ T1403] ext4_mkdir+0x28a/0x760
[ 3458.150998][ T1403] vfs_mkdir+0x2c8/0x3d0
[ 3458.155225][ T1403] do_mkdirat+0x12e/0x2c0
[ 3458.159582][ T1403] __x64_sys_mkdir+0x40/0x50
[ 3458.164148][ T1403] do_syscall_64+0x44/0xd0
[ 3458.168548][ T1403] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 3458.174423][ T1403]
[ 3458.176729][ T1403] read to 0xffff888103c27878 of 8 bytes by task 1403 on cpu 1:
[ 3458.184245][ T1403] __jbd2_journal_drop_transaction+0x1f0/0x2f0
[ 3458.190375][ T1403] __jbd2_journal_remove_checkpoint+0x2d5/0x3a0
[ 3458.196599][ T1403] jbd2_journal_commit_transaction+0x23f1/0x3460
[ 3458.202914][ T1403] kjournald2+0x263/0x480
[ 3458.207222][ T1403] kthread+0x2c7/0x2e0
[ 3458.211443][ T1403] ret_from_fork+0x1f/0x30
[ 3458.215845][ T1403]
[ 3458.218153][ T1403] value changed: 0x0000000000000000 -> 0xffff888136c11c00
[ 3458.225232][ T1403]
[ 3458.227537][ T1403] Reported by Kernel Concurrency Sanitizer on:
[ 3458.233668][ T1403] CPU: 1 PID: 1403 Comm: jbd2/sda1-8 Not tainted 5.16.0-rc4-syzkaller #0
[ 3458.242065][ T1403] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 3458.252093][ T1403] ==================================================================
[ 3458.269911][T28222] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3458.276634][T28222] EXT4-fs (loop1): mount failed
[ 3458.291930][T28382] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:52 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000015040d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:52 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x800, 0x0, 0x103, 0x1}, 0x20)
setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4)
r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./bus\x00'}, 0x10)
pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000280)="d45d22744ca3f7792ca2f25d0a683e02cc37903834c7ce0bd472e5c893fd21c41b217d0332d607c532efeda874624633a31ca7879fe59f359ea875a78fc8660c10463ce991d8537d8c684f4a15ca55af0266396220dbd95fddd4d0d6ef109782ccdd6701ac2f4ea88da5f413720a6a9f1d8822023c062dae8824d2c4ac266689458e07d5ad3604f6472ec1f0e22f19e4cb078f73b7efc44b79ae063d3e036390c3de5dab02cb67bc1ba9868a805089905b227eec44ea1ab907d27ab6ade75edce0b298e9b4345f170001a905d916b7f0c81e0aad84bab11d", 0xd8}, {&(0x7f0000000380)="5ec5b8e82675299f03fbce7b6d889d7a5996ac124af08ee50873dba4bc6b468ae0425c4fe1a78692ec43d733198a1e759f4d642fb0819e02a989826bb5b0c8ccf8a912dc90873360b4d329991a3a272b1591f03af0474b612c1e95ea38c990c197653a4688959766d10fd01560b5b0d41655ef1ebbcfa6d74cc3a942df56290b72f3c242e54131a1b6c360dd638b29055cd28f32156aea127ea185267408e2115bca7150d65e54f0b7d08c494a2150260053ce63cf1d8d9163999a33a5704773d3bd8b3e", 0xc4}, {&(0x7f0000000480)="52bf040da93834118e476d550f3224ac7acbed06126851063ec848af4a588265718d22527ca774e232d941671702c72814b1ac4151b74745dfc77a19e4e747b5a02a28dd68f8ab73245d6ec2310aac5c74e06c64d7cec5d6eb67", 0x5a}, {&(0x7f0000000500)="7cfba5aac1480565373fa59a8fe795", 0xf}], 0x4, 0x8, 0x34)
sendmsg$inet6(r1, &(0x7f0000000080)={&(0x7f0000000040)={0xa, 0x4e25, 0x80000, @remote, 0xfffffffc}, 0x1c, 0x0, 0x0, &(0x7f0000000100)=[@pktinfo={{0x24, 0x29, 0x32, {@private0}}}], 0x28}, 0x0)
r3 = creat(&(0x7f00000001c0)='./bus\x00', 0x102)
ioctl$SG_SET_COMMAND_Q(r3, 0x2284, &(0x7f0000000040)=0xfffffffe)
ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0x0, r3, 0x5, 0x1, 0x7fff, 0x101})
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:52 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}, 0x74}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:52 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0fc0000}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:53 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0xffffff81}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:53 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xa00100}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:53 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x141)
ioctl$SG_SET_COMMAND_Q(r1, 0x2284, &(0x7f0000000040)=0xfffffffe)
setsockopt$inet_mreq(r1, 0x0, 0x20, &(0x7f0000000040)={@remote, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x8)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
setxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200), &(0x7f0000000240)=@sha1={0x1, "be7eeb399a1b3153ded6e889a69c37f006bad8cd"}, 0x15, 0x1)
22:07:53 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}, 0x7a}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:53 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0xffffff9e}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:53 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0fd0000}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3458.543629][T28539] loop2: detected capacity change from 0 to 264192
[ 3458.565956][T28539] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3458.616245][T28658] loop1: detected capacity change from 0 to 512
[ 3458.636478][T28658] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3458.644540][T28658] EXT4-fs (loop1): mount failed
22:07:53 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0xffffffea}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:53 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="060000546942aaa592bcbbabf1dab2f897e7bfa0ceeb1095e3282b4faa3511a4aec2c63e682f877a80dc13b33ba0a32757f0e06e3175aa8e520da26850099c24fb02000000fcddcc7db0d5f558a15b2ec9785365f4c4bb7b929793bd2247d7737c721e9d67b6780e376b226fb7e177c4544d7dcb5c651f9a224de5ca6706b3083e5ec5f6a9088bae62231487d10d8ad511ae1b40032b3d3bd321367e993156fe8ae3a4af9db8a0bfa545e892dabc55643b03de439c254277d613a17843d56425f70b44d6cb6ad3001f08fbe68652a88c0c538e866ecccda660de5ce34a175cb72d45fe0b20248a822a011001eef8987387c5d78653fb45077c6f"], 0x0, 0x0)
[ 3458.729318][T28680] loop2: detected capacity change from 0 to 264192
[ 3458.760067][T28680] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3458.770180][T28658] loop1: detected capacity change from 0 to 512
22:07:53 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000015140d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:53 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0xffffffef}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:53 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xca9a3b}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:53 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0fe0000}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:53 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}, 0x300}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:53 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
[ 3458.782110][T28658] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3458.789117][T28658] EXT4-fs (loop1): mount failed
22:07:53 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0xfffffff0}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:53 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
sendmsg$MPTCP_PM_CMD_GET_LIMITS(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000200)={0xd4, 0x0, 0x2, 0x70bd2d, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_ADDR={0x54, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @private2}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e22}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @remote}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @remote}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x3}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_ADDR={0x34, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @initdev={0xac, 0x1e, 0x1, 0x0}}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x8}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x1}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x6}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x1}, 0x20000040)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
[ 3458.948668][T28885] loop2: detected capacity change from 0 to 264192
[ 3458.974106][T28885] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:53 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x1000000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:53 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc0ff0000}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:53 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0xfffffffe}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:53 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}, 0x500}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3459.101905][T29092] loop1: detected capacity change from 0 to 512
[ 3459.119515][T29092] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3459.128284][T29092] EXT4-fs (loop1): mount failed
[ 3459.183436][T29092] loop1: detected capacity change from 0 to 512
[ 3459.194970][T29102] loop2: detected capacity change from 0 to 264192
[ 3459.211909][T29092] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3459.217510][T29102] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3459.260414][T29092] EXT4-fs (loop1): mount failed
22:07:53 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000015240d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:53 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0)
ioctl$SG_GET_RESERVED_SIZE(r1, 0x2272, &(0x7f0000000080))
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:53 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:53 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc4a20100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:53 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x2000000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:53 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}, 0x600}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:53 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x0, 0x2}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:54 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0)
r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r1, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:54 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc59f0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3459.399681][T29314] loop2: detected capacity change from 0 to 205313
[ 3459.415643][T29314] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:54 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x0, 0x3}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:54 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x3000000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:54 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
[ 3459.552870][T29524] loop1: detected capacity change from 0 to 512
[ 3459.566685][T29524] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3459.575301][T29524] EXT4-fs (loop1): mount failed
22:07:54 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000015340d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:54 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}, 0x700}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:54 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x0, 0x4}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3459.611906][T29524] loop1: detected capacity change from 0 to 512
[ 3459.622518][T29524] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3459.630592][T29524] EXT4-fs (loop1): mount failed
[ 3459.630994][T29529] loop2: detected capacity change from 0 to 264192
[ 3459.655418][T29529] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:54 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc5a20100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:54 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="62744f667313fdacb34f54bc2e2a2cce4200be2d0064c1fd99a4479c98ab25b84c5a0000cb75918fdb8c919ec40700ebf839aeb8a5b988a9ab4bf93bb73fc1b0effbbae5fc14548fa51bd9d075831d0000"], 0x0, 0x0)
22:07:54 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x0, 0x5}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:54 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x4000000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:54 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}, 0x80b}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:54 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x0, 0x6}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:54 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc5a60100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3459.848417][T29744] loop2: detected capacity change from 0 to 264192
[ 3459.855348][T29742] loop1: detected capacity change from 0 to 512
[ 3459.863581][T29744] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3459.879718][T29742] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3459.886671][T29742] EXT4-fs (loop1): mount failed
22:07:54 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)=@known='trusted.overlay.nlink\x00', 0x0, 0x0)
[ 3459.919940][T29742] loop1: detected capacity change from 0 to 512
[ 3459.927466][T29742] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3459.935727][T29742] EXT4-fs (loop1): mount failed
22:07:54 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000015440d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:54 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x0, 0x7}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:54 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x40b0000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:54 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}, 0x900}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3460.084756][T29961] loop2: detected capacity change from 0 to 264192
[ 3460.100011][T29961] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:54 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc69f0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:54 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f0000000200))
22:07:54 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x0, 0x8}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:54 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x0, 0x9}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:54 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x5000000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:54 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}, 0xa00}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:54 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
socket$nl_generic(0x10, 0x3, 0x10)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
r1 = socket(0x0, 0x1, 0x0)
ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x6)
mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xef69c531bd52bcb4, 0x12, r1, 0x911d4000)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x0)
[ 3460.272990][T30088] loop1: detected capacity change from 0 to 512
[ 3460.286666][T30156] loop2: detected capacity change from 0 to 264192
[ 3460.309193][T30088] EXT4-fs (loop1): corrupt root inode, run e2fsck
22:07:55 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xc6a30100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3460.333509][T30088] EXT4-fs (loop1): mount failed
[ 3460.340081][T30156] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3460.373366][T30088] loop1: detected capacity change from 0 to 512
22:07:55 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000015540d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3460.387334][T30088] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3460.396301][T30088] EXT4-fs (loop1): mount failed
22:07:55 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x0, 0xa}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:55 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x6000000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:55 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}, 0xa78}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:55 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x1)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
[ 3460.583274][T30396] loop2: detected capacity change from 0 to 264192
[ 3460.596376][T30396] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:55 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xcda10100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:55 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x0, 0xb}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3460.652744][T30403] loop1: detected capacity change from 0 to 512
[ 3460.669397][T30403] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3460.679019][T30403] EXT4-fs (loop1): mount failed
22:07:55 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x0, 0xc}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:55 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB='-\x00\x00\x00\x00\x00\x00\x00'], 0x0, 0x0)
[ 3460.779181][T30415] loop2: detected capacity change from 0 to 264192
[ 3460.804096][T30403] loop1: detected capacity change from 0 to 512
[ 3460.822385][T30415] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:55 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x7000000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:55 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xcea10100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:55 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}, 0xa94}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:55 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000015640d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:55 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x0, 0xf}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3460.837575][T30403] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3460.844279][T30403] EXT4-fs (loop1): mount failed
22:07:55 executing program 4:
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:55 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x0, 0x10}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:55 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x8000000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:55 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}, 0xaa8}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:55 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xcea50100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3461.027151][T30636] loop2: detected capacity change from 0 to 264192
[ 3461.049484][T30636] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:55 executing program 4:
stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0})
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc)
setresuid(0x0, r2, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000380)=0xc)
mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x100400, &(0x7f00000006c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, r0}}, {@nodevmap}, {@dfltuid={'dfltuid', 0x3d, r0}}, {@uname={'uname', 0x3d, '$'}}, {@msize={'msize', 0x3d, 0x6}}, {@cachetag={'cachetag', 0x3d, '#{\xb7[\x00\x00\x00\x00\x00\x00\x00'}}, {@debug={'debug', 0x3d, 0x5}}, {@cache_loose}, {@posixacl}, {@msize={'msize', 0x3d, 0xcec}}], [{@fsuuid={'fsuuid', 0x3d, {[0x4, 0x37, 0x64, 0x61, 0x34, 0x36, 0x35, 0x32], 0x2d, [0x31, 0x33, 0x62, 0x38], 0x2d, [0x65, 0x32, 0x38, 0x34], 0x2d, [0x62, 0x32, 0x31, 0x31], 0x2d, [0x61, 0x66, 0x63, 0x63, 0xd6, 0x36, 0x37, 0x39]}}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_type={'subj_type', 0x3d, ',:!(]&'}}, {@uid_lt={'uid<', r2}}, {@euid_gt={'euid>', r3}}, {@pcr={'pcr', 0x3d, 0x1f}}]}})
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
set_mempolicy(0x8000, &(0x7f0000000040)=0x9, 0x1)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r4, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
r5 = creat(&(0x7f00000001c0)='./bus\x00', 0x102)
ioctl$SG_SET_COMMAND_Q(r5, 0x2284, &(0x7f0000000040)=0xfffffffe)
ioctl$TUNSETQUEUE(r5, 0x400454d9, &(0x7f0000000080)={'veth1_to_bond\x00'})
[ 3461.115789][T30837] loop1: detected capacity change from 0 to 512
[ 3461.135448][T30837] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3461.143146][T30837] EXT4-fs (loop1): mount failed
22:07:55 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x0, 0x11}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3461.185511][T30837] loop1: detected capacity change from 0 to 512
[ 3461.194134][T30837] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3461.202443][T30837] EXT4-fs (loop1): mount failed
22:07:55 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000015740d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:55 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
set_mempolicy(0x8000, &(0x7f0000000180)=0x8001, 0x7)
r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
r1 = socket$tipc(0x1e, 0x5, 0x0)
fallocate(r1, 0x1e, 0x2000000, 0x3)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0000000000000000ceb0f2a39e3052530640cda756cc97edba54cfb8c28469cdcb4214e5372c387a1a783caeda6b052e3fd98339c155f12bdf283a89f5cf81fad9c4b66144a3e71f1b3f20b56b0016d40ac309d705ca4131021d8b2152a739d93606ba02009b3160ec20bf18e53c4d4a03403d512c45350d982b7f20a364"], 0x0, 0x0)
22:07:55 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xd78d0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:55 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x9000000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3461.244165][T30847] loop2: detected capacity change from 0 to 264192
[ 3461.266509][T30847] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:55 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}, 0xab4}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:55 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x0, 0x60}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:56 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x0, 0x300}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:56 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0xffffffc1}}, './file1\x00'})
sendfile(r0, r1, &(0x7f0000000080)=0xffffffffffff5016, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="321b4dc79e70db43"], 0x0, 0x0)
[ 3461.438185][T31061] loop2: detected capacity change from 0 to 264192
[ 3461.454375][T31060] loop1: detected capacity change from 0 to 512
[ 3461.481474][T31061] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:56 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xd88d0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:56 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}, 0xab8}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:56 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xa000000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:56 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x0, 0x500}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3461.525192][T31060] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3461.534312][T31060] EXT4-fs (loop1): mount failed
[ 3461.583018][T31060] loop1: detected capacity change from 0 to 512
[ 3461.592120][T31060] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3461.599033][T31060] EXT4-fs (loop1): mount failed
22:07:56 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000015840d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:56 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
r1 = socket(0x0, 0x1, 0x0)
r2 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000300), 0x105800, 0x0)
fstat(r2, &(0x7f0000000340))
ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x6)
ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0})
sendmsg$NL80211_CMD_FRAME(r1, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x60, 0x0, 0x4, 0x70bd2a, 0x25dfdbff, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x759f, 0x36}}}}, [@NL80211_ATTR_DONT_WAIT_FOR_ACK={0x4}, @NL80211_ATTR_CSA_C_OFFSETS_TX={0x12, 0xcd, [0xfffa, 0x5, 0x7f, 0x1b, 0x26b9, 0x6, 0x93]}, @NL80211_ATTR_FRAME={0x1e, 0x33, @disassoc={@wo_ht={{0x0, 0x0, 0xa, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1}, {0x7}, @device_a, @device_b, @initial, {0x7, 0x2}}, 0x1e, @void}}]}, 0x60}, 0x1, 0x0, 0x0, 0x20010}, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:56 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x0, 0x600}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:56 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xd8910100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3461.672963][T31279] loop2: detected capacity change from 0 to 264192
[ 3461.702361][T31279] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:56 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}, 0xac4}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:56 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xc000000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:56 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x0, 0x700}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:56 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="62747266732e2d00ed0783458f257b5e6814a02a80153cfcee94fb8235e033b41b8873c92d2b4cb092c8cbc26d8b9c6a6c05982513d09faa3202e7334b2a239aa9027c392b59f2b575aa944199ebdee346a363b0b5d0437bcf53d885dab904ba1b12001fb75af522625c5eadc90c0dd08e37089acf1b4baa5412b25e43968e4204f7dc89e7c97290f1959f270790b3beaadf21c6e31894b89093ce12e85dd7e08c38566a3e4eec01b5e98025341c4fe00e4659116f892efb3259043b92b3a40b3b384f9bb45dcd804ba997174a49ff46e82034dcdc443a9ed162b3e76010f5c89ebfd4bc63723c82023fcbf35d0a58d7e93abc0a4296ea426cb0e7a49fbda891b18b"], 0x0, 0x0)
ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000a00)=ANY=[@ANYBLOB="0100000000000000000000009e6f3b3d4d0f0dab48626609eddfdcaccf926274287db84279624cb220c0d628d40a6d4f94b1c1af9ffb4ea2f6f9b21abb33652118aa441864bc67457606988b777d5241733bbaaf9bb9ebf2d6ec12146d05f35ae519c30f03806afdae1f0aa9ecc07298ea14a712370c28609659ed7ef040a6c277f41129d3f1dabeafea843c8b01bceb3d57fff5972f1675abc8021d1332ed1c27ea37c38cfcdd334e777f9b80426078e94d4f1dafdf1fc0794c89df5a073252fac73f67d34ced76f9b4e4e7e4a57dac287709cc5c9612ed87e9df478b3f333ebd8f853f4d212e6e5072", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00'])
r2 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x80000)
ioctl$NS_GET_OWNER_UID(r0, 0xb704, &(0x7f0000000280)=0x0)
ioctl$SG_SET_COMMAND_Q(0xffffffffffffffff, 0x2284, &(0x7f0000000040)=0xfffffffe)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000880)='cpuset.memory_pressure\x00', 0x0, 0x0)
r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000004c0), 0x88360, 0x0)
bind$inet(r4, &(0x7f00000006c0)={0x2, 0x4e23, @rand_addr=0x64010102}, 0x10)
stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
r6 = syz_mount_image$iso9660(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x80000001, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000440)="448bfef373432de491cb0de801f5e842fd5c09b787d3d05b89b72e85d5c18ba789827065e255111804ae70a15d983d79b7afffaf2f41ea2ffb2de3", 0x3b, 0x9}, {&(0x7f0000000480)="349bbb6921453552f3cbd0d46f9960c2077a3443f182c1", 0x17, 0x2}, {&(0x7f00000004c0), 0x0, 0x8}, {&(0x7f0000000500)="b466e92640933c5d8e87fc8316d54d768772854abc775339fd2dfbc1cd43ec2aa025e1ebc078574bfd8d0e8c2fc686ad15deefe8955778b674032a207a2defdb3453fc70b9c485e30fee1120ce6d2decd0444745c45128468c22fd75a3b7dd269c9c2ba7ca3c10d6a3a78671a9e931dae4d9a9702cbbb41bdc5306d07524fa4258736078dc46e4db03ace4f9ff3bf0764a9d13291758", 0x96, 0x4}], 0x888428, &(0x7f0000000640)=ANY=[@ANYBLOB='unhide,uid=', @ANYRESHEX=r3, @ANYBLOB=',overriderockperm,check=strict,utf8,gid=', @ANYRESHEX, @ANYBLOB=',cieck=st\t\x00ct,mask=MAY_APPEND,\x00'])
r7 = syz_open_dev$vcsn(&(0x7f0000000700), 0x6, 0x60002)
sendmsg$nl_route(r7, &(0x7f0000000840)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000800)={&(0x7f0000000b00)=ANY=[@ANYBLOB="600000002100000329bd7000fcdbdf25022080fb01000000010000000c002e400000000000000f73080001007f00000114000300766574683000000000000000000000000c000c40000000000000000508000200ac14141808000200ac1414bb382c16ae3d308464c832a685b17c929eaad4c53f548173b517410e66a2c9f46735c1d331b1532d9eb48742c0137ef8aafdd9d467d6be641e783852d3a5"], 0x60}, 0x1, 0x0, 0x0, 0x4080}, 0x20044040)
fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000200)='\x00', &(0x7f0000000240)='./file0\x00', r6)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000300000000000000", @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=r5, @ANYBLOB='./file0\x00'])
[ 3461.840035][T31492] loop1: detected capacity change from 0 to 512
[ 3461.850480][T31493] loop2: detected capacity change from 0 to 264192
[ 3461.861416][T31492] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3461.868568][T31492] EXT4-fs (loop1): mount failed
[ 3461.875297][T31493] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:56 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xdca40100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:56 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x0, 0x900}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3461.929162][T31492] loop1: detected capacity change from 0 to 512
[ 3461.961285][T31492] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3461.974879][T31492] EXT4-fs (loop1): mount failed
22:07:56 executing program 4:
set_mempolicy(0x1, &(0x7f0000000040)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="f4bd503bd4da8ce8"], 0x0, 0x0)
22:07:56 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}, 0xac8}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:56 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000015940d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:56 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xc0b0000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:56 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x0, 0xa00}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3462.079305][T31708] loop2: detected capacity change from 0 to 193537
[ 3462.096155][T31708] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:56 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xe99c0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:56 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000080)='./binderfs/binder0\x00', 0x800, 0x0)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000200))
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040)=@random={'trusted.', '-\x00'}, 0x0, 0x3a)
22:07:56 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x0, 0xb00}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:56 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0xf000000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:56 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}, 0xad4}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3462.278673][T31921] loop1: detected capacity change from 0 to 512
[ 3462.292512][T31921] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3462.299018][T31921] EXT4-fs (loop1): mount failed
[ 3462.308097][T31924] loop2: detected capacity change from 0 to 264192
22:07:57 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xea9c0100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3462.324893][T31921] loop1: detected capacity change from 0 to 512
[ 3462.332817][T31924] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3462.341098][T31921] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3462.347804][T31921] EXT4-fs (loop1): mount failed
22:07:57 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000015a40d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:57 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x0, 0xc00}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:57 executing program 4:
set_mempolicy(0x2, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:57 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x0, 0xf00}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:57 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x10000000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:57 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}, 0xadc}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:57 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xeaa00100}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:57 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
set_mempolicy(0x0, &(0x7f0000000040)=0xffffffffffffffff, 0x2)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
[ 3462.500241][T31955] loop2: detected capacity change from 0 to 52225
[ 3462.526805][T31955] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3462.578024][T32143] loop1: detected capacity change from 0 to 512
[ 3462.593381][T32143] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3462.599861][T32143] EXT4-fs (loop1): mount failed
22:07:57 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x0, 0x1100}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3462.635255][T32143] loop1: detected capacity change from 0 to 512
[ 3462.643081][T32143] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3462.652415][T32143] EXT4-fs (loop1): mount failed
22:07:57 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x100b0000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:57 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000200)=@v3={0x3000000, [{0x9, 0x7f}, {0x9, 0x9}], 0xffffffffffffffff}, 0x18, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
accept$phonet_pipe(r0, &(0x7f0000000040), &(0x7f0000000080)=0x10)
22:07:57 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x0, 0x216b}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:57 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000015b40d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:57 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}, 0xae0}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3462.744602][T32159] loop2: detected capacity change from 0 to 53249
[ 3462.765363][T32159] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:57 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xf1ee0000}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:57 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x0, 0x4788}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:57 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x19000000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:57 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
set_mempolicy(0x0, &(0x7f0000000200)=0x200, 0x81)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x800, 0x0, 0x103, 0x1}, 0x20)
setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4)
sendmsg$inet6(r1, &(0x7f0000000080)={&(0x7f0000000040)={0xa, 0x4e25, 0x80000, @remote, 0xfffffffc}, 0x1c, 0x0, 0x0, &(0x7f0000000100)=[@pktinfo={{0x24, 0x29, 0x32, {@private0}}}], 0x28}, 0x0)
mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3000008, 0x2010, r1, 0xe7d2f000)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:57 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}, 0xae4}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:57 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x0, 0x4888}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:57 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xf2ee0000}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
[ 3462.983403][T32470] loop2: detected capacity change from 0 to 3584
[ 3462.985944][T32471] loop1: detected capacity change from 0 to 512
[ 3463.007469][T32470] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
[ 3463.016581][T32471] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3463.025248][T32471] EXT4-fs (loop1): mount failed
22:07:57 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x4, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
sendmmsg(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x10)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
set_mempolicy(0x4000, &(0x7f0000000040)=0x7f, 0x8)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:57 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x200c0000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3463.111908][T32471] loop1: detected capacity change from 0 to 512
[ 3463.131557][T32471] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3463.145143][T32471] EXT4-fs (loop1): mount failed
22:07:57 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000015c40d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:57 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x0, 0x5865}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3463.218441][T32686] loop2: detected capacity change from 0 to 69120
[ 3463.244397][T32686] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:57 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0xf2f20000}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:57 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x0, 0x6000}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:57 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:57 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}, 0xaf4}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:58 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x280b0000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3463.403575][ T432] loop1: detected capacity change from 0 to 512
[ 3463.421828][ T432] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3463.429285][ T432] EXT4-fs (loop1): mount failed
22:07:58 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x0, 0x6558}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
[ 3463.475513][ T438] loop2: detected capacity change from 0 to 70144
[ 3463.493357][ T432] loop1: detected capacity change from 0 to 512
[ 3463.503520][ T438] EXT4-fs (loop2): VFS: Can't find ext4 filesystem
22:07:58 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="020000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:58 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000040)='cpuset.effective_cpus\x00', 0x0, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
22:07:58 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}, 0xb00}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3463.530357][ T432] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3463.538459][ T432] EXT4-fs (loop1): mount failed
22:07:58 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000015d40d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:58 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x380b0000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:58 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x0, 0x6b21}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:58 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="040000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:58 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0xd4c19c73c267747e)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x13, r0, 0x0)
ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)=0x3f)
r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0)
fcntl$dupfd(r0, 0x406, r1)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', '-\x00'}, 0x0, 0x0)
set_mempolicy(0x8000, &(0x7f0000000280)=0x3, 0x1)
sendto$unix(r0, &(0x7f0000000200)="cb123a2b8c5bd700687e3e1b65b625f3d75ebbcff2d726afdf768652c7f0005360385729b144b28fd3ca6daa9bc6f458ed52e4c2d2f84ddd100076eb494248d8716898dd869e7cfc8495b1bc583bae5b8ecde2c0dc6e1135128cd5be5fe9addba23ee21258c9219092be850c0e2e8af38bacf06b207a3b47", 0x78, 0x40090, 0x0, 0x0)
[ 3463.689515][ T653] loop2: detected capacity change from 0 to 512
[ 3463.708529][ T653] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors
[ 3463.719448][ T653] EXT4-fs (loop2): group descriptors corrupted!
22:07:58 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}, 0xb08}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:58 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x0, 0x8100}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:58 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x3b9aca00}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
[ 3463.845486][ T837] loop1: detected capacity change from 0 to 512
[ 3463.866563][ T837] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3463.874325][ T837] EXT4-fs (loop1): mount failed
[ 3463.923229][ T869] loop2: detected capacity change from 0 to 512
[ 3463.923824][ T837] loop1: detected capacity change from 0 to 512
[ 3463.943576][ T837] EXT4-fs (loop1): corrupt root inode, run e2fsck
[ 3463.950413][ T837] EXT4-fs (loop1): mount failed
[ 3463.957647][ T869] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none.
22:07:58 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010400)="050000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:58 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
set_mempolicy(0x0, &(0x7f0000000040)=0x8, 0x800)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x102)
ioctl$SG_SET_COMMAND_Q(r1, 0x2284, &(0x7f0000000040)=0xfffffffe)
ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r1, 0x8982, &(0x7f0000000080)={0x8, 'veth1_virt_wifi\x00', {'xfrm0\x00'}, 0x200})
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'btrfs.', ';\x00'}, 0x0, 0x0)
[ 3463.971300][ T869] ext4 filesystem being mounted at /root/syzkaller-testdir032332098/syzkaller.5It2Wo/12188/file0 supports timestamps until 2038 (0x7fffffff)
22:07:58 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x0, 0x8847}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:58 executing program 1:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000015e40d1f4655fd2f4655fd2f4655f00000000000004", 0x1b, 0x8c80}], 0x0, &(0x7f0000013800))
22:07:58 executing program 5:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x40000000}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:58 executing program 0:
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x401}, 0x0)
sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0)
perf_event_open(&(0x7f0000001900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}, 0xb0c}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400})
22:07:58 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newtaction={0xe68, 0x30, 0x1, 0x0, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{}, [{}, {0x0, 0x8848}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0)
22:07:58 executing program 4:
set_mempolicy(0x3, &(0x7f00000000c0)=0x7, 0x4)
fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0)
write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7)
fsetxattr$security_capability(r0, &(0x7f0000000140), &(0x7f0000000000)=@v2, 0x14, 0x0)
mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0)
r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x102)
ioctl$SG_SET_COMMAND_Q(r1, 0x2284, &(0x7f0000000040)=0xfffffffe)
ioctl$BTRFS_IOC_RM_DEV(r1, 0x5000940b, &(0x7f0000000200)={{r0}, "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"})
getxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000001240)=@random={'os2.', '\\$O\xe2(-\xbe>\xd3\xabx3K\xda\x0f\x868\x1c`=\xff\xad\x93\xf4\x93\xa8\x7f\vK\t\x8a\xe3hf$s\xf8\xb7\xb8\xadV\xd2\x87!9\x9e\xc0\x953\x85\xc6\xd9{\x8eE\xf1\xa8b\xc0\xab$\x8b1\\\x87c\xa0\x82\xed/\xd8\xab\xea\xc2\xe7\x8c\xad\xd7\xff\xa3\x11oP\xd6\xd5.t'}, 0x0, 0x0)
[ 3464.197254][ T1087] loop2: detected capacity change from 0 to 512
[ 3464.224316][ T1087] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none.
22:07:58 executing program 2:
set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0xa1)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c0000