00000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 3) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) [ 1389.047005][ T8816] FAULT_INJECTION: forcing a failure. [ 1389.047005][ T8816] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1389.061440][ T8816] CPU: 0 PID: 8816 Comm: syz-executor.3 Not tainted 5.16.0-syzkaller #0 [ 1389.069814][ T8816] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1389.080164][ T8816] Call Trace: [ 1389.083471][ T8816] [ 1389.086426][ T8816] dump_stack_lvl+0xcd/0x134 [ 1389.091045][ T8816] should_fail.cold+0x5/0xa [ 1389.095582][ T8816] _copy_from_user+0x2c/0x180 [ 1389.100301][ T8816] __do_sys_memfd_create+0xff/0x4f0 [ 1389.103750][ T8819] FAULT_INJECTION: forcing a failure. [ 1389.103750][ T8819] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1389.105529][ T8816] do_syscall_64+0x35/0xb0 [ 1389.105565][ T8816] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1389.105598][ T8816] RIP: 0033:0x7f49a637bfe9 [ 1389.105621][ T8816] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1389.105648][ T8816] RSP: 002b:00007f49a4cf0f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1389.105677][ T8816] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f49a637bfe9 [ 1389.105702][ T8816] RDX: 0000000000060000 RSI: 0000000000000000 RDI: 00007f49a63d51e0 [ 1389.105720][ T8816] RBP: 0000000000000007 R08: 0000000000030000 R09: 00007f49a4cf11d0 [ 1389.105738][ T8816] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000008100000 [ 1389.105756][ T8816] R13: 0000000020000100 R14: 0000000000200000 R15: 00000000200000c0 [ 1389.105777][ T8816] [ 1389.116340][ T8802] EXT4-fs (loop5): mount failed [ 1389.129854][ T8819] CPU: 1 PID: 8819 Comm: syz-executor.0 Not tainted 5.16.0-syzkaller #0 [ 1389.217777][ T8819] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1389.227840][ T8819] Call Trace: [ 1389.231124][ T8819] [ 1389.234058][ T8819] dump_stack_lvl+0xcd/0x134 [ 1389.238657][ T8819] should_fail.cold+0x5/0xa [ 1389.243174][ T8819] _copy_from_user+0x2c/0x180 [ 1389.247866][ T8819] __do_sys_memfd_create+0xff/0x4f0 [ 1389.253075][ T8819] do_syscall_64+0x35/0xb0 [ 1389.257505][ T8819] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1389.263411][ T8819] RIP: 0033:0x7ff9087ebfe9 [ 1389.267829][ T8819] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1389.287530][ T8819] RSP: 002b:00007ff907160f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1389.295954][ T8819] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff9087ebfe9 [ 1389.303930][ T8819] RDX: 0000000000060000 RSI: 0000000000000000 RDI: 00007ff9088451e0 [ 1389.311906][ T8819] RBP: 0000000000000007 R08: 0000000000030000 R09: 00007ff9071611d0 [ 1389.319883][ T8819] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000008100000 [ 1389.327857][ T8819] R13: 0000000020000100 R14: 0000000000200000 R15: 00000000200000c0 [ 1389.335835][ T8819] 11:23:02 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900), 0x0, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:23:02 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1bf713b549bc2817279312ee525f86cbf8eb3a4b1fbe40e2"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r2, r3, 0x0) 11:23:02 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:23:02 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 3) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1389.413869][ T8805] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 1389.435753][ T8793] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: writeback. [ 1389.495922][ T8821] FAULT_INJECTION: forcing a failure. [ 1389.495922][ T8821] name failslab, interval 1, probability 0, space 0, times 0 [ 1389.509159][ T8821] CPU: 1 PID: 8821 Comm: syz-executor.4 Not tainted 5.16.0-syzkaller #0 [ 1389.517617][ T8821] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1389.527788][ T8821] Call Trace: [ 1389.531077][ T8821] [ 1389.534028][ T8821] dump_stack_lvl+0xcd/0x134 [ 1389.538634][ T8821] should_fail.cold+0x5/0xa [ 1389.543155][ T8821] should_failslab+0x5/0x10 [ 1389.547681][ T8821] kmem_cache_alloc+0x5d/0x560 [ 1389.552463][ T8821] ? shmem_destroy_inode+0x70/0x70 [ 1389.557657][ T8821] shmem_alloc_inode+0x18/0x40 [ 1389.562435][ T8821] ? shmem_destroy_inode+0x70/0x70 [ 1389.567557][ T8821] alloc_inode+0x61/0x230 [ 1389.571900][ T8821] new_inode+0x27/0x2f0 [ 1389.576068][ T8821] ? lockdep_hardirqs_on+0x79/0x100 [ 1389.581276][ T8821] shmem_get_inode+0x195/0xc60 [ 1389.586051][ T8821] __shmem_file_setup+0xb8/0x310 [ 1389.591003][ T8821] __do_sys_memfd_create+0x1c6/0x4f0 [ 1389.596298][ T8821] do_syscall_64+0x35/0xb0 [ 1389.600733][ T8821] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1389.606644][ T8821] RIP: 0033:0x7fe5f515efe9 [ 1389.611069][ T8821] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1389.630687][ T8821] RSP: 002b:00007fe5f3ad3f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1389.639114][ T8821] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fe5f515efe9 [ 1389.647099][ T8821] RDX: 0000000000060000 RSI: 0000000000000000 RDI: 00007fe5f51b81e0 [ 1389.655084][ T8821] RBP: 0000000000000007 R08: 0000000000030000 R09: 00007fe5f3ad41d0 [ 1389.663066][ T8821] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000008100000 [ 1389.671041][ T8821] R13: 0000000020000100 R14: 0000000000200000 R15: 00000000200000c0 [ 1389.679020][ T8821] 11:23:02 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 3) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) [ 1389.723644][ T8824] FAULT_INJECTION: forcing a failure. [ 1389.723644][ T8824] name failslab, interval 1, probability 0, space 0, times 0 [ 1389.756237][ T8824] CPU: 1 PID: 8824 Comm: syz-executor.0 Not tainted 5.16.0-syzkaller #0 [ 1389.764628][ T8824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1389.774708][ T8824] Call Trace: [ 1389.778012][ T8824] [ 1389.780960][ T8824] dump_stack_lvl+0xcd/0x134 [ 1389.785586][ T8824] should_fail.cold+0x5/0xa [ 1389.790134][ T8824] should_failslab+0x5/0x10 [ 1389.794684][ T8824] kmem_cache_alloc+0x5d/0x560 [ 1389.799480][ T8824] ? lockdep_hardirqs_on+0x79/0x100 [ 1389.804713][ T8824] ? shmem_destroy_inode+0x70/0x70 [ 1389.809863][ T8824] shmem_alloc_inode+0x18/0x40 [ 1389.814652][ T8824] ? shmem_destroy_inode+0x70/0x70 [ 1389.817757][ T8825] loop5: detected capacity change from 0 to 4096 [ 1389.819788][ T8824] alloc_inode+0x61/0x230 [ 1389.819823][ T8824] new_inode+0x27/0x2f0 [ 1389.819852][ T8824] ? shmem_get_inode+0x2b/0xc60 [ 1389.819881][ T8824] shmem_get_inode+0x195/0xc60 [ 1389.819909][ T8824] __shmem_file_setup+0xb8/0x310 [ 1389.819937][ T8824] __do_sys_memfd_create+0x1c6/0x4f0 [ 1389.819968][ T8824] do_syscall_64+0x35/0xb0 [ 1389.820000][ T8824] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1389.820035][ T8824] RIP: 0033:0x7ff9087ebfe9 [ 1389.820058][ T8824] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1389.820083][ T8824] RSP: 002b:00007ff907160f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1389.820111][ T8824] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff9087ebfe9 [ 1389.820130][ T8824] RDX: 0000000000060000 RSI: 0000000000000000 RDI: 00007ff9088451e0 [ 1389.820155][ T8824] RBP: 0000000000000007 R08: 0000000000030000 R09: 00007ff9071611d0 [ 1389.820172][ T8824] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000008100000 [ 1389.820190][ T8824] R13: 0000000020000100 R14: 0000000000200000 R15: 00000000200000c0 [ 1389.820210][ T8824] 11:23:02 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 4) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) [ 1389.954973][ T8827] FAULT_INJECTION: forcing a failure. [ 1389.954973][ T8827] name failslab, interval 1, probability 0, space 0, times 0 [ 1389.984930][ T8827] CPU: 1 PID: 8827 Comm: syz-executor.3 Not tainted 5.16.0-syzkaller #0 [ 1389.993289][ T8827] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1390.003371][ T8827] Call Trace: [ 1390.006664][ T8827] [ 1390.009600][ T8827] dump_stack_lvl+0xcd/0x134 [ 1390.014203][ T8827] should_fail.cold+0x5/0xa [ 1390.018721][ T8827] should_failslab+0x5/0x10 [ 1390.023234][ T8827] kmem_cache_alloc+0x5d/0x560 [ 1390.028019][ T8827] ? shmem_destroy_inode+0x70/0x70 [ 1390.033141][ T8827] shmem_alloc_inode+0x18/0x40 [ 1390.037908][ T8827] ? shmem_destroy_inode+0x70/0x70 [ 1390.043027][ T8827] alloc_inode+0x61/0x230 [ 1390.047537][ T8827] new_inode+0x27/0x2f0 [ 1390.051703][ T8827] shmem_get_inode+0x195/0xc60 [ 1390.056480][ T8827] __shmem_file_setup+0xb8/0x310 [ 1390.061435][ T8827] ? shmem_file_setup+0x2/0x30 [ 1390.066244][ T8827] __do_sys_memfd_create+0x1c6/0x4f0 [ 1390.071556][ T8827] do_syscall_64+0x35/0xb0 [ 1390.076005][ T8827] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1390.081933][ T8827] RIP: 0033:0x7f49a637bfe9 [ 1390.086373][ T8827] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1390.106009][ T8827] RSP: 002b:00007f49a4cf0f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1390.114452][ T8827] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f49a637bfe9 [ 1390.122434][ T8827] RDX: 0000000000060000 RSI: 0000000000000000 RDI: 00007f49a63d51e0 [ 1390.130412][ T8827] RBP: 0000000000000007 R08: 0000000000030000 R09: 00007f49a4cf11d0 [ 1390.138391][ T8827] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000008100000 [ 1390.146365][ T8827] R13: 0000000020000100 R14: 0000000000200000 R15: 00000000200000c0 [ 1390.154344][ T8827] 11:23:03 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 4) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1390.238617][ T5127] blk_print_req_error: 2 callbacks suppressed [ 1390.238638][ T5127] I/O error, dev loop2, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1390.274769][ T8825] EXT4-fs warning (device loop5): ext4_enable_quotas:6842: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 1390.311873][ T8835] FAULT_INJECTION: forcing a failure. [ 1390.311873][ T8835] name failslab, interval 1, probability 0, space 0, times 0 [ 1390.325499][ T8835] CPU: 1 PID: 8835 Comm: syz-executor.4 Not tainted 5.16.0-syzkaller #0 [ 1390.333057][ T8825] EXT4-fs (loop5): mount failed [ 1390.333859][ T8835] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1390.333879][ T8835] Call Trace: [ 1390.333889][ T8835] [ 1390.333899][ T8835] dump_stack_lvl+0xcd/0x134 [ 1390.333931][ T8835] should_fail.cold+0x5/0xa [ 1390.333976][ T8835] should_failslab+0x5/0x10 [ 1390.334006][ T8835] kmem_cache_alloc+0x5d/0x560 [ 1390.334040][ T8835] security_inode_alloc+0x34/0x160 [ 1390.334074][ T8835] inode_init_always+0x5d8/0xd70 [ 1390.334104][ T8835] alloc_inode+0x82/0x230 [ 1390.334133][ T8835] new_inode+0x27/0x2f0 [ 1390.334161][ T8835] shmem_get_inode+0x195/0xc60 [ 1390.334188][ T8835] __shmem_file_setup+0xb8/0x310 [ 1390.334215][ T8835] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 1390.334250][ T8835] __do_sys_memfd_create+0x1c6/0x4f0 [ 1390.334280][ T8835] do_syscall_64+0x35/0xb0 [ 1390.334312][ T8835] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1390.334346][ T8835] RIP: 0033:0x7fe5f515efe9 [ 1390.334367][ T8835] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1390.334393][ T8835] RSP: 002b:00007fe5f3ad3f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1390.334421][ T8835] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fe5f515efe9 [ 1390.334440][ T8835] RDX: 0000000000060000 RSI: 0000000000000000 RDI: 00007fe5f51b81e0 [ 1390.334458][ T8835] RBP: 0000000000000007 R08: 0000000000030000 R09: 00007fe5f3ad41d0 11:23:03 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 4) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) [ 1390.334477][ T8835] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000008100000 [ 1390.334496][ T8835] R13: 0000000020000100 R14: 0000000000200000 R15: 00000000200000c0 [ 1390.334518][ T8835] [ 1390.678008][ T8838] loop2: detected capacity change from 0 to 4096 [ 1390.730291][ T8836] FAULT_INJECTION: forcing a failure. [ 1390.730291][ T8836] name failslab, interval 1, probability 0, space 0, times 0 [ 1390.744100][ T8836] CPU: 1 PID: 8836 Comm: syz-executor.0 Not tainted 5.16.0-syzkaller #0 [ 1390.752461][ T8836] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1390.762550][ T8836] Call Trace: [ 1390.765851][ T8836] [ 1390.768805][ T8836] dump_stack_lvl+0xcd/0x134 [ 1390.773512][ T8836] should_fail.cold+0x5/0xa 11:23:03 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a09", 0xb, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1390.778057][ T8836] should_failslab+0x5/0x10 [ 1390.782599][ T8836] kmem_cache_alloc+0x5d/0x560 [ 1390.787396][ T8836] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1390.793687][ T8836] security_inode_alloc+0x34/0x160 [ 1390.798823][ T8836] inode_init_always+0x5d8/0xd70 [ 1390.803795][ T8836] alloc_inode+0x82/0x230 [ 1390.808158][ T8836] new_inode+0x27/0x2f0 [ 1390.812344][ T8836] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1390.818532][ T8836] shmem_get_inode+0x195/0xc60 [ 1390.823330][ T8836] __shmem_file_setup+0xb8/0x310 [ 1390.828302][ T8836] __do_sys_memfd_create+0x1c6/0x4f0 [ 1390.833621][ T8836] do_syscall_64+0x35/0xb0 [ 1390.838079][ T8836] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1390.844014][ T8836] RIP: 0033:0x7ff9087ebfe9 [ 1390.848454][ T8836] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1390.868097][ T8836] RSP: 002b:00007ff907160f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 11:23:03 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 5) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) 11:23:03 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1390.876546][ T8836] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff9087ebfe9 [ 1390.884811][ T8836] RDX: 0000000000060000 RSI: 0000000000000000 RDI: 00007ff9088451e0 [ 1390.892812][ T8836] RBP: 0000000000000007 R08: 0000000000030000 R09: 00007ff9071611d0 [ 1390.900811][ T8836] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000008100000 [ 1390.908815][ T8836] R13: 0000000020000100 R14: 0000000000200000 R15: 00000000200000c0 [ 1390.916817][ T8836] [ 1390.950170][ T8843] FAULT_INJECTION: forcing a failure. [ 1390.950170][ T8843] name failslab, interval 1, probability 0, space 0, times 0 [ 1390.976012][ T8843] CPU: 0 PID: 8843 Comm: syz-executor.3 Not tainted 5.16.0-syzkaller #0 [ 1390.984410][ T8843] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1390.994504][ T8843] Call Trace: [ 1390.997799][ T8843] [ 1391.000750][ T8843] dump_stack_lvl+0xcd/0x134 [ 1391.005368][ T8843] should_fail.cold+0x5/0xa [ 1391.009904][ T8843] should_failslab+0x5/0x10 [ 1391.014441][ T8843] kmem_cache_alloc+0x5d/0x560 [ 1391.019254][ T8843] security_inode_alloc+0x34/0x160 [ 1391.024402][ T8843] inode_init_always+0x5d8/0xd70 [ 1391.026402][ T8847] FAULT_INJECTION: forcing a failure. [ 1391.026402][ T8847] name failslab, interval 1, probability 0, space 0, times 0 [ 1391.029361][ T8843] alloc_inode+0x82/0x230 [ 1391.029396][ T8843] new_inode+0x27/0x2f0 [ 1391.029425][ T8843] shmem_get_inode+0x195/0xc60 [ 1391.029454][ T8843] __shmem_file_setup+0xb8/0x310 [ 1391.060177][ T8843] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 1391.066448][ T8843] __do_sys_memfd_create+0x1c6/0x4f0 [ 1391.071757][ T8843] do_syscall_64+0x35/0xb0 [ 1391.076201][ T8843] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1391.082118][ T8843] RIP: 0033:0x7f49a637bfe9 [ 1391.086543][ T8843] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1391.106172][ T8843] RSP: 002b:00007f49a4cf0f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1391.114608][ T8843] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f49a637bfe9 [ 1391.122596][ T8843] RDX: 0000000000060000 RSI: 0000000000000000 RDI: 00007f49a63d51e0 [ 1391.130582][ T8843] RBP: 0000000000000007 R08: 0000000000030000 R09: 00007f49a4cf11d0 [ 1391.138567][ T8843] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000008100000 [ 1391.146554][ T8843] R13: 0000000020000100 R14: 0000000000200000 R15: 00000000200000c0 [ 1391.154546][ T8843] [ 1391.157593][ T8847] CPU: 1 PID: 8847 Comm: syz-executor.4 Not tainted 5.16.0-syzkaller #0 [ 1391.165958][ T8847] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1391.176033][ T8847] Call Trace: [ 1391.179327][ T8847] [ 1391.182261][ T8847] dump_stack_lvl+0xcd/0x134 [ 1391.186860][ T8847] should_fail.cold+0x5/0xa [ 1391.191379][ T8847] should_failslab+0x5/0x10 [ 1391.195893][ T8847] kmem_cache_alloc+0x5d/0x560 [ 1391.200669][ T8847] __d_alloc+0x2a/0x950 [ 1391.204835][ T8847] d_alloc_pseudo+0x19/0x70 [ 1391.209348][ T8847] alloc_file_pseudo+0xc6/0x250 [ 1391.214211][ T8847] ? alloc_file+0x590/0x590 [ 1391.218723][ T8847] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1391.225033][ T8847] ? shmem_get_inode+0x5d7/0xc60 [ 1391.229988][ T8847] __shmem_file_setup+0x144/0x310 [ 1391.235024][ T8847] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 1391.241288][ T8847] __do_sys_memfd_create+0x1c6/0x4f0 [ 1391.246587][ T8847] do_syscall_64+0x35/0xb0 [ 1391.251019][ T8847] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1391.257016][ T8847] RIP: 0033:0x7fe5f515efe9 [ 1391.261526][ T8847] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1391.281179][ T8847] RSP: 002b:00007fe5f3ad3f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1391.289611][ T8847] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fe5f515efe9 [ 1391.297590][ T8847] RDX: 0000000000060000 RSI: 0000000000000000 RDI: 00007fe5f51b81e0 [ 1391.305567][ T8847] RBP: 0000000000000007 R08: 0000000000030000 R09: 00007fe5f3ad41d0 [ 1391.313546][ T8847] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000008100000 [ 1391.321522][ T8847] R13: 0000000020000100 R14: 0000000000200000 R15: 00000000200000c0 [ 1391.329499][ T8847] 11:23:04 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1391.463014][ T5513] I/O error, dev loop1, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1391.529618][ T8851] loop5: detected capacity change from 0 to 4096 11:23:04 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 5) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) 11:23:04 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1bf713b549bc2817279312ee525f86cbf8eb3a4b1fbe40e2"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r2, r3, 0x0) 11:23:04 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 5) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) 11:23:04 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 6) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) [ 1391.644093][ T8838] EXT4-fs: failed to create workqueue [ 1391.649562][ T8838] EXT4-fs (loop2): mount failed [ 1391.875273][ T8862] FAULT_INJECTION: forcing a failure. [ 1391.875273][ T8862] name failslab, interval 1, probability 0, space 0, times 0 [ 1391.905592][ T8862] CPU: 0 PID: 8862 Comm: syz-executor.0 Not tainted 5.16.0-syzkaller #0 [ 1391.910059][ T8851] Quota error (device loop5): v2_read_file_info: Free block number too big (0 >= 0). [ 1391.913967][ T8862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1391.913989][ T8862] Call Trace: [ 1391.913999][ T8862] [ 1391.914009][ T8862] dump_stack_lvl+0xcd/0x134 [ 1391.914042][ T8862] should_fail.cold+0x5/0xa [ 1391.914074][ T8862] should_failslab+0x5/0x10 [ 1391.914105][ T8862] kmem_cache_alloc+0x5d/0x560 [ 1391.914133][ T8862] ? irqentry_enter+0x28/0x50 [ 1391.914161][ T8862] __d_alloc+0x2a/0x950 [ 1391.914187][ T8862] ? lockdep_hardirqs_on+0x79/0x100 [ 1391.914218][ T8862] d_alloc_pseudo+0x19/0x70 [ 1391.914246][ T8862] alloc_file_pseudo+0xc6/0x250 [ 1391.914275][ T8862] ? alloc_file+0x590/0x590 [ 1391.914301][ T8862] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1391.914337][ T8862] ? shmem_get_inode+0x5d7/0xc60 [ 1391.914365][ T8862] __shmem_file_setup+0x144/0x310 [ 1391.914391][ T8862] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 1391.914426][ T8862] __do_sys_memfd_create+0x1c6/0x4f0 [ 1391.914457][ T8862] do_syscall_64+0x35/0xb0 [ 1391.914488][ T8862] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1391.914521][ T8862] RIP: 0033:0x7ff9087ebfe9 [ 1391.914549][ T8862] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1391.914577][ T8862] RSP: 002b:00007ff907160f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 11:23:05 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 1) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1391.914607][ T8862] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff9087ebfe9 [ 1391.914626][ T8862] RDX: 0000000000060000 RSI: 0000000000000000 RDI: 00007ff9088451e0 [ 1391.914645][ T8862] RBP: 0000000000000007 R08: 0000000000030000 R09: 00007ff9071611d0 [ 1391.914664][ T8862] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000008100000 [ 1391.914683][ T8862] R13: 0000000020000100 R14: 0000000000200000 R15: 00000000200000c0 [ 1391.914705][ T8862] [ 1392.000074][ T8853] loop1: detected capacity change from 0 to 4096 [ 1392.091637][ T8865] FAULT_INJECTION: forcing a failure. [ 1392.091637][ T8865] name failslab, interval 1, probability 0, space 0, times 0 [ 1392.100040][ T8851] EXT4-fs warning (device loop5): ext4_enable_quotas:6842: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 1392.108113][ T8865] CPU: 0 PID: 8865 Comm: syz-executor.3 Not tainted 5.16.0-syzkaller #0 [ 1392.108145][ T8865] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1392.108163][ T8865] Call Trace: [ 1392.108171][ T8865] [ 1392.108181][ T8865] dump_stack_lvl+0xcd/0x134 [ 1392.108212][ T8865] should_fail.cold+0x5/0xa [ 1392.108244][ T8865] should_failslab+0x5/0x10 [ 1392.108276][ T8865] kmem_cache_alloc+0x5d/0x560 [ 1392.108304][ T8865] ? lockdep_hardirqs_on+0x79/0x100 [ 1392.108333][ T8865] __d_alloc+0x2a/0x950 [ 1392.108359][ T8865] d_alloc_pseudo+0x19/0x70 [ 1392.108387][ T8865] alloc_file_pseudo+0xc6/0x250 [ 1392.108415][ T8865] ? alloc_file+0x590/0x590 [ 1392.108440][ T8865] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1392.108475][ T8865] ? shmem_get_inode+0x5d7/0xc60 [ 1392.108503][ T8865] __shmem_file_setup+0x144/0x310 [ 1392.108536][ T8865] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 1392.108571][ T8865] __do_sys_memfd_create+0x1c6/0x4f0 [ 1392.108600][ T8865] do_syscall_64+0x35/0xb0 [ 1392.108632][ T8865] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1392.108666][ T8865] RIP: 0033:0x7f49a637bfe9 [ 1392.108686][ T8865] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1392.122674][ T8851] EXT4-fs (loop5): mount failed [ 1392.124625][ T8865] RSP: 002b:00007f49a4ccff28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 11:23:05 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 6) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1392.124655][ T8865] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f49a637bfe9 [ 1392.124676][ T8865] RDX: 0000000000060000 RSI: 0000000000000000 RDI: 00007f49a63d51e0 [ 1392.124694][ T8865] RBP: 0000000000000007 R08: 0000000000030000 R09: 00007f49a4cd01d0 [ 1392.124711][ T8865] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000008100000 [ 1392.124729][ T8865] R13: 0000000020000100 R14: 0000000000200000 R15: 00000000200000c0 [ 1392.124750][ T8865] [ 1392.200670][ T8866] FAULT_INJECTION: forcing a failure. 11:23:05 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 6) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) [ 1392.200670][ T8866] name failslab, interval 1, probability 0, space 0, times 0 [ 1392.425084][ T8866] CPU: 0 PID: 8866 Comm: syz-executor.4 Not tainted 5.16.0-syzkaller #0 [ 1392.433440][ T8866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1392.443522][ T8866] Call Trace: [ 1392.446820][ T8866] [ 1392.449761][ T8866] dump_stack_lvl+0xcd/0x134 [ 1392.454376][ T8866] should_fail.cold+0x5/0xa [ 1392.458906][ T8866] should_failslab+0x5/0x10 [ 1392.463418][ T8866] kmem_cache_alloc+0x5d/0x560 [ 1392.468191][ T8866] ? d_instantiate+0x75/0x90 [ 1392.472785][ T8866] __alloc_file+0x21/0x280 [ 1392.477208][ T8866] alloc_empty_file+0x6d/0x170 [ 1392.481979][ T8866] alloc_file+0x59/0x590 [ 1392.486229][ T8866] alloc_file_pseudo+0x165/0x250 [ 1392.491174][ T8866] ? alloc_file+0x590/0x590 [ 1392.495684][ T8866] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1392.501954][ T8866] ? shmem_get_inode+0x5d7/0xc60 [ 1392.506902][ T8866] __shmem_file_setup+0x144/0x310 [ 1392.511931][ T8866] ? shmem_file_setup+0x2/0x30 [ 1392.516703][ T8866] __do_sys_memfd_create+0x1c6/0x4f0 [ 1392.521999][ T8866] do_syscall_64+0x35/0xb0 [ 1392.526429][ T8866] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1392.532344][ T8866] RIP: 0033:0x7fe5f515efe9 [ 1392.536763][ T8866] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1392.556375][ T8866] RSP: 002b:00007fe5f3ad3f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1392.564799][ T8866] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fe5f515efe9 [ 1392.572773][ T8866] RDX: 0000000000060000 RSI: 0000000000000000 RDI: 00007fe5f51b81e0 [ 1392.580751][ T8866] RBP: 0000000000000007 R08: 0000000000030000 R09: 00007fe5f3ad41d0 [ 1392.588725][ T8866] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000008100000 [ 1392.596700][ T8866] R13: 0000000020000100 R14: 0000000000200000 R15: 00000000200000c0 [ 1392.604680][ T8866] [ 1392.668959][ T8871] FAULT_INJECTION: forcing a failure. [ 1392.668959][ T8871] name failslab, interval 1, probability 0, space 0, times 0 [ 1392.672934][ T8870] FAULT_INJECTION: forcing a failure. [ 1392.672934][ T8870] name failslab, interval 1, probability 0, space 0, times 0 [ 1392.682264][ T8871] CPU: 0 PID: 8871 Comm: syz-executor.0 Not tainted 5.16.0-syzkaller #0 [ 1392.682299][ T8871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1392.682318][ T8871] Call Trace: [ 1392.682328][ T8871] [ 1392.682338][ T8871] dump_stack_lvl+0xcd/0x134 [ 1392.724078][ T8871] should_fail.cold+0x5/0xa [ 1392.728607][ T8871] should_failslab+0x5/0x10 [ 1392.733130][ T8871] kmem_cache_alloc+0x5d/0x560 [ 1392.737911][ T8871] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1392.744087][ T8871] __alloc_file+0x21/0x280 [ 1392.748524][ T8871] alloc_empty_file+0x6d/0x170 [ 1392.753304][ T8871] alloc_file+0x59/0x590 [ 1392.757562][ T8871] alloc_file_pseudo+0x165/0x250 [ 1392.762518][ T8871] ? alloc_file+0x590/0x590 [ 1392.767035][ T8871] ? clear_nlink+0x7e/0xa0 [ 1392.771472][ T8871] __shmem_file_setup+0x144/0x310 [ 1392.776513][ T8871] __do_sys_memfd_create+0x1c6/0x4f0 [ 1392.781819][ T8871] do_syscall_64+0x35/0xb0 [ 1392.786257][ T8871] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1392.792174][ T8871] RIP: 0033:0x7ff9087ebfe9 [ 1392.796598][ T8871] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1392.816222][ T8871] RSP: 002b:00007ff907160f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1392.824663][ T8871] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff9087ebfe9 [ 1392.832660][ T8871] RDX: 0000000000060000 RSI: 0000000000000000 RDI: 00007ff9088451e0 [ 1392.840644][ T8871] RBP: 0000000000000007 R08: 0000000000030000 R09: 00007ff9071611d0 [ 1392.848629][ T8871] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000008100000 [ 1392.856616][ T8871] R13: 0000000020000100 R14: 0000000000200000 R15: 00000000200000c0 [ 1392.864604][ T8871] [ 1392.867642][ T8870] CPU: 1 PID: 8870 Comm: syz-executor.2 Not tainted 5.16.0-syzkaller #0 [ 1392.875997][ T8870] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1392.886068][ T8870] Call Trace: [ 1392.889365][ T8870] [ 1392.892323][ T8870] dump_stack_lvl+0xcd/0x134 [ 1392.896942][ T8870] should_fail.cold+0x5/0xa [ 1392.901477][ T8870] should_failslab+0x5/0x10 [ 1392.906010][ T8870] __kmalloc+0x7b/0x4d0 [ 1392.910187][ T8870] ? __do_sys_memfd_create+0xac/0x4f0 [ 1392.915583][ T8870] ? strnlen_user+0x1e9/0x2a0 [ 1392.920284][ T8870] __do_sys_memfd_create+0xac/0x4f0 [ 1392.925509][ T8870] do_syscall_64+0x35/0xb0 [ 1392.929956][ T8870] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1392.935886][ T8870] RIP: 0033:0x7f8eac07bfe9 [ 1392.940321][ T8870] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1392.959960][ T8870] RSP: 002b:00007f8eaa9f0f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 11:23:05 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 7) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1392.968474][ T8870] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f8eac07bfe9 [ 1392.976450][ T8870] RDX: 0000000000060000 RSI: 0000000000000000 RDI: 00007f8eac0d51e0 [ 1392.984432][ T8870] RBP: 0000000000000007 R08: 0000000000030000 R09: 00007f8eaa9f11d0 [ 1392.992415][ T8870] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000008100000 [ 1393.000393][ T8870] R13: 0000000020000100 R14: 0000000000200000 R15: 00000000200000c0 [ 1393.008374][ T8870] 11:23:06 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a09", 0xb, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1393.065515][ T8853] EXT4-fs: failed to create workqueue [ 1393.136768][ T8853] EXT4-fs (loop1): mount failed 11:23:06 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 7) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) 11:23:06 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 2) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1393.157715][ T8876] FAULT_INJECTION: forcing a failure. [ 1393.157715][ T8876] name failslab, interval 1, probability 0, space 0, times 0 [ 1393.171960][ T8876] CPU: 1 PID: 8876 Comm: syz-executor.3 Not tainted 5.16.0-syzkaller #0 [ 1393.180330][ T8876] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1393.190418][ T8876] Call Trace: [ 1393.193723][ T8876] [ 1393.196696][ T8876] dump_stack_lvl+0xcd/0x134 [ 1393.201321][ T8876] should_fail.cold+0x5/0xa [ 1393.205857][ T8876] should_failslab+0x5/0x10 [ 1393.210387][ T8876] kmem_cache_alloc+0x5d/0x560 [ 1393.215167][ T8876] ? d_instantiate+0x75/0x90 [ 1393.219777][ T8876] __alloc_file+0x21/0x280 [ 1393.224213][ T8876] alloc_empty_file+0x6d/0x170 [ 1393.225118][ T8878] FAULT_INJECTION: forcing a failure. [ 1393.225118][ T8878] name failslab, interval 1, probability 0, space 0, times 0 [ 1393.228998][ T8876] alloc_file+0x59/0x590 [ 1393.229032][ T8876] alloc_file_pseudo+0x165/0x250 [ 1393.229060][ T8876] ? alloc_file+0x590/0x590 [ 1393.229087][ T8876] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1393.229123][ T8876] ? shmem_get_inode+0x5d7/0xc60 [ 1393.229150][ T8876] __shmem_file_setup+0x144/0x310 [ 1393.229176][ T8876] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 1393.229211][ T8876] __do_sys_memfd_create+0x1c6/0x4f0 [ 1393.229242][ T8876] do_syscall_64+0x35/0xb0 [ 1393.229274][ T8876] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1393.229307][ T8876] RIP: 0033:0x7f49a637bfe9 [ 1393.229328][ T8876] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1393.229355][ T8876] RSP: 002b:00007f49a4cf0f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1393.229384][ T8876] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f49a637bfe9 [ 1393.229403][ T8876] RDX: 0000000000060000 RSI: 0000000000000000 RDI: 00007f49a63d51e0 [ 1393.229422][ T8876] RBP: 0000000000000007 R08: 0000000000030000 R09: 00007f49a4cf11d0 [ 1393.229441][ T8876] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000008100000 [ 1393.229460][ T8876] R13: 0000000020000100 R14: 0000000000200000 R15: 00000000200000c0 [ 1393.229486][ T8876] [ 1393.323710][ T8880] FAULT_INJECTION: forcing a failure. [ 1393.323710][ T8880] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1393.331711][ T8878] CPU: 0 PID: 8878 Comm: syz-executor.0 Not tainted 5.16.0-syzkaller #0 [ 1393.331743][ T8878] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1393.331759][ T8878] Call Trace: [ 1393.331769][ T8878] [ 1393.331779][ T8878] dump_stack_lvl+0xcd/0x134 [ 1393.331808][ T8878] should_fail.cold+0x5/0xa [ 1393.331841][ T8878] should_failslab+0x5/0x10 [ 1393.331871][ T8878] kmem_cache_alloc+0x5d/0x560 [ 1393.331899][ T8878] security_file_alloc+0x34/0x170 [ 1393.331926][ T8878] __alloc_file+0xd8/0x280 [ 1393.331953][ T8878] alloc_empty_file+0x6d/0x170 [ 1393.331989][ T8878] alloc_file+0x59/0x590 [ 1393.332015][ T8878] alloc_file_pseudo+0x165/0x250 [ 1393.332041][ T8878] ? alloc_file+0x590/0x590 [ 1393.332067][ T8878] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1393.332102][ T8878] ? shmem_get_inode+0x5d7/0xc60 [ 1393.332135][ T8878] __shmem_file_setup+0x144/0x310 [ 1393.332163][ T8878] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 1393.332197][ T8878] __do_sys_memfd_create+0x1c6/0x4f0 11:23:06 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:23:06 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 7) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) 11:23:06 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 8) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1393.332225][ T8878] do_syscall_64+0x35/0xb0 [ 1393.332258][ T8878] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1393.332292][ T8878] RIP: 0033:0x7ff9087ebfe9 [ 1393.332314][ T8878] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1393.332340][ T8878] RSP: 002b:00007ff907160f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1393.332369][ T8878] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff9087ebfe9 [ 1393.332388][ T8878] RDX: 0000000000060000 RSI: 0000000000000000 RDI: 00007ff9088451e0 [ 1393.332406][ T8878] RBP: 0000000000000007 R08: 0000000000030000 R09: 00007ff9071611d0 [ 1393.332423][ T8878] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000008100000 [ 1393.332441][ T8878] R13: 0000000020000100 R14: 0000000000200000 R15: 00000000200000c0 [ 1393.332461][ T8878] [ 1393.484743][ T8882] loop5: detected capacity change from 0 to 4096 [ 1393.486295][ T8880] CPU: 1 PID: 8880 Comm: syz-executor.2 Not tainted 5.16.0-syzkaller #0 [ 1393.486325][ T8880] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1393.486342][ T8880] Call Trace: [ 1393.486351][ T8880] [ 1393.486360][ T8880] dump_stack_lvl+0xcd/0x134 [ 1393.486390][ T8880] should_fail.cold+0x5/0xa [ 1393.486421][ T8880] _copy_from_user+0x2c/0x180 [ 1393.486460][ T8880] __do_sys_memfd_create+0xff/0x4f0 [ 1393.486492][ T8880] do_syscall_64+0x35/0xb0 [ 1393.486524][ T8880] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1393.486558][ T8880] RIP: 0033:0x7f8eac07bfe9 [ 1393.486581][ T8880] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1393.486608][ T8880] RSP: 002b:00007f8eaa9f0f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1393.486636][ T8880] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f8eac07bfe9 [ 1393.486655][ T8880] RDX: 0000000000060000 RSI: 0000000000000000 RDI: 00007f8eac0d51e0 [ 1393.486674][ T8880] RBP: 0000000000000007 R08: 0000000000030000 R09: 00007f8eaa9f11d0 [ 1393.486692][ T8880] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000008100000 [ 1393.486710][ T8880] R13: 0000000020000100 R14: 0000000000200000 R15: 00000000200000c0 [ 1393.486730][ T8880] [ 1393.564086][ T8883] FAULT_INJECTION: forcing a failure. [ 1393.564086][ T8883] name failslab, interval 1, probability 0, space 0, times 0 [ 1393.656472][ T8887] FAULT_INJECTION: forcing a failure. [ 1393.656472][ T8887] name failslab, interval 1, probability 0, space 0, times 0 [ 1393.657191][ T8883] CPU: 1 PID: 8883 Comm: syz-executor.4 Not tainted 5.16.0-syzkaller #0 [ 1393.657224][ T8883] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1393.657242][ T8883] Call Trace: [ 1393.657250][ T8883] [ 1393.657259][ T8883] dump_stack_lvl+0xcd/0x134 [ 1393.657289][ T8883] should_fail.cold+0x5/0xa [ 1393.657322][ T8883] should_failslab+0x5/0x10 [ 1393.657352][ T8883] kmem_cache_alloc+0x5d/0x560 [ 1393.657380][ T8883] security_file_alloc+0x34/0x170 [ 1393.657408][ T8883] __alloc_file+0xd8/0x280 [ 1393.657434][ T8883] alloc_empty_file+0x6d/0x170 [ 1393.657462][ T8883] alloc_file+0x59/0x590 [ 1393.657489][ T8883] alloc_file_pseudo+0x165/0x250 [ 1393.657519][ T8883] ? alloc_file+0x590/0x590 [ 1393.657544][ T8883] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1393.657579][ T8883] ? shmem_get_inode+0x5d7/0xc60 [ 1393.657607][ T8883] __shmem_file_setup+0x144/0x310 [ 1393.657633][ T8883] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 1393.657669][ T8883] __do_sys_memfd_create+0x1c6/0x4f0 [ 1393.657698][ T8883] do_syscall_64+0x35/0xb0 [ 1393.657731][ T8883] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1393.657764][ T8883] RIP: 0033:0x7fe5f515efe9 [ 1393.657792][ T8883] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1393.657822][ T8883] RSP: 002b:00007fe5f3ad3f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1393.657850][ T8883] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fe5f515efe9 [ 1393.657871][ T8883] RDX: 0000000000060000 RSI: 0000000000000000 RDI: 00007fe5f51b81e0 [ 1393.657890][ T8883] RBP: 0000000000000007 R08: 0000000000030000 R09: 00007fe5f3ad41d0 [ 1393.657908][ T8883] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000008100000 [ 1393.657926][ T8883] R13: 0000000020000100 R14: 0000000000200000 R15: 00000000200000c0 [ 1393.657943][ T8883] [ 1393.996487][ T8887] CPU: 0 PID: 8887 Comm: syz-executor.0 Not tainted 5.16.0-syzkaller #0 [ 1394.004849][ T8887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1394.014937][ T8887] Call Trace: [ 1394.018238][ T8887] [ 1394.021189][ T8887] dump_stack_lvl+0xcd/0x134 [ 1394.024563][ T8888] FAULT_INJECTION: forcing a failure. [ 1394.024563][ T8888] name failslab, interval 1, probability 0, space 0, times 0 [ 1394.025801][ T8887] should_fail.cold+0x5/0xa [ 1394.025836][ T8887] should_failslab+0x5/0x10 [ 1394.025867][ T8887] __kmalloc+0x7b/0x4d0 [ 1394.025893][ T8887] ? tomoyo_realpath_from_path+0xc3/0x620 [ 1394.025924][ T8887] ? rcu_read_lock_sched_held+0x3a/0x70 [ 1394.025956][ T8887] tomoyo_realpath_from_path+0xc3/0x620 [ 1394.025986][ T8887] tomoyo_path_perm+0x21b/0x400 [ 1394.026012][ T8887] ? tomoyo_path_perm+0x1c1/0x400 [ 1394.026039][ T8887] ? tomoyo_check_open_permission+0x380/0x380 [ 1394.026074][ T8887] security_path_truncate+0xcf/0x140 [ 1394.026108][ T8887] do_sys_ftruncate+0x390/0x740 [ 1394.026140][ T8887] do_syscall_64+0x35/0xb0 [ 1394.026172][ T8887] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1394.026205][ T8887] RIP: 0033:0x7ff9087ebfa7 [ 1394.026227][ T8887] Code: 48 89 e7 e8 cb e5 ff ff 48 8b 4c 24 18 64 48 2b 0c 25 28 00 00 00 75 05 48 83 c4 28 c3 e8 21 1a 00 00 90 b8 4d 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 [ 1394.026253][ T8887] RSP: 002b:00007ff907160f28 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 1394.026282][ T8887] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff9087ebfa7 [ 1394.026302][ T8887] RDX: 0000000000060000 RSI: 0000000000200000 RDI: 0000000000000005 [ 1394.026320][ T8887] RBP: 0000000000000007 R08: 0000000000030000 R09: 00007ff9071611d0 [ 1394.026338][ T8887] R10: 0000000000000007 R11: 0000000000000217 R12: 0000000000000005 [ 1394.026356][ T8887] R13: 0000000000000005 R14: 0000000000200000 R15: 00000000200000c0 [ 1394.026376][ T8887] [ 1394.026484][ T8887] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1394.054903][ T8888] CPU: 1 PID: 8888 Comm: syz-executor.3 Not tainted 5.16.0-syzkaller #0 [ 1394.066593][ T8887] loop0: detected capacity change from 0 to 4096 [ 1394.068782][ T8888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1394.068802][ T8888] Call Trace: [ 1394.068811][ T8888] [ 1394.068821][ T8888] dump_stack_lvl+0xcd/0x134 [ 1394.068858][ T8888] should_fail.cold+0x5/0xa [ 1394.068890][ T8888] should_failslab+0x5/0x10 [ 1394.068923][ T8888] kmem_cache_alloc+0x5d/0x560 [ 1394.068952][ T8888] security_file_alloc+0x34/0x170 [ 1394.068978][ T8888] ? security_file_free+0xd0/0xd0 [ 1394.069003][ T8888] __alloc_file+0xd8/0x280 [ 1394.069029][ T8888] alloc_empty_file+0x6d/0x170 [ 1394.069057][ T8888] alloc_file+0x59/0x590 [ 1394.069082][ T8888] alloc_file_pseudo+0x165/0x250 [ 1394.069110][ T8888] ? alloc_file+0x590/0x590 [ 1394.069135][ T8888] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1394.069170][ T8888] ? shmem_get_inode+0x5d7/0xc60 [ 1394.069197][ T8888] __shmem_file_setup+0x144/0x310 [ 1394.069224][ T8888] __do_sys_memfd_create+0x1c6/0x4f0 [ 1394.069254][ T8888] do_syscall_64+0x35/0xb0 [ 1394.069287][ T8888] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1394.069320][ T8888] RIP: 0033:0x7f49a637bfe9 [ 1394.069341][ T8888] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1394.069367][ T8888] RSP: 002b:00007f49a4cf0f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1394.069395][ T8888] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f49a637bfe9 [ 1394.069416][ T8888] RDX: 0000000000060000 RSI: 0000000000000000 RDI: 00007f49a63d51e0 [ 1394.069435][ T8888] RBP: 0000000000000007 R08: 0000000000030000 R09: 00007f49a4cf11d0 [ 1394.363379][ T8888] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000008100000 [ 1394.371363][ T8888] R13: 0000000020000100 R14: 0000000000200000 R15: 00000000200000c0 [ 1394.379353][ T8888] 11:23:07 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 3) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) 11:23:07 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a09", 0xb, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1394.481321][ T8882] Quota error (device loop5): v2_read_file_info: Free block number too big (0 >= 0). [ 1394.491008][ T8882] EXT4-fs warning (device loop5): ext4_enable_quotas:6842: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 1394.506303][ T8882] EXT4-fs (loop5): mount failed 11:23:07 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 8) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) [ 1394.535309][ T5513] I/O error, dev loop1, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 11:23:07 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 8) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) [ 1394.700851][ T8899] FAULT_INJECTION: forcing a failure. [ 1394.700851][ T8899] name failslab, interval 1, probability 0, space 0, times 0 [ 1394.705285][ T8897] loop5: detected capacity change from 0 to 4096 [ 1394.715846][ T8899] CPU: 1 PID: 8899 Comm: syz-executor.3 Not tainted 5.16.0-syzkaller #0 [ 1394.715884][ T8899] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1394.715903][ T8899] Call Trace: [ 1394.715914][ T8899] [ 1394.715925][ T8899] dump_stack_lvl+0xcd/0x134 [ 1394.715958][ T8899] should_fail.cold+0x5/0xa [ 1394.715992][ T8899] ? __should_failslab+0x21/0xf0 [ 1394.716020][ T8899] should_failslab+0x5/0x10 [ 1394.716051][ T8899] __kmalloc+0x7b/0x4d0 [ 1394.716078][ T8899] ? tomoyo_realpath_from_path+0xc3/0x620 [ 1394.716109][ T8899] ? rcu_read_lock_sched_held+0x3a/0x70 [ 1394.716141][ T8899] tomoyo_realpath_from_path+0xc3/0x620 [ 1394.716172][ T8899] ? tomoyo_path_perm+0x1c6/0x400 [ 1394.716201][ T8899] tomoyo_path_perm+0x21b/0x400 [ 1394.716227][ T8899] ? tomoyo_path_perm+0x1c1/0x400 [ 1394.716256][ T8899] ? tomoyo_check_open_permission+0x380/0x380 [ 1394.716285][ T8899] ? mark_held_locks+0x9f/0xe0 [ 1394.716320][ T8899] security_path_truncate+0xcf/0x140 [ 1394.818023][ T8899] do_sys_ftruncate+0x390/0x740 [ 1394.822893][ T8899] do_syscall_64+0x35/0xb0 [ 1394.827324][ T8899] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1394.833232][ T8899] RIP: 0033:0x7f49a637bfa7 [ 1394.837652][ T8899] Code: 48 89 e7 e8 cb e5 ff ff 48 8b 4c 24 18 64 48 2b 0c 25 28 00 00 00 75 05 48 83 c4 28 c3 e8 21 1a 00 00 90 b8 4d 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 [ 1394.857264][ T8899] RSP: 002b:00007f49a4cf0f28 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 1394.865698][ T8899] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f49a637bfa7 [ 1394.873703][ T8899] RDX: 0000000000060000 RSI: 0000000000200000 RDI: 0000000000000005 [ 1394.881690][ T8899] RBP: 0000000000000007 R08: 0000000000030000 R09: 00007f49a4cf11d0 [ 1394.889667][ T8899] R10: 0000000000000007 R11: 0000000000000217 R12: 0000000000000005 [ 1394.897643][ T8899] R13: 0000000000000005 R14: 0000000000200000 R15: 00000000200000c0 [ 1394.905620][ T8899] [ 1394.908726][ T8899] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1394.939922][ T8899] loop3: detected capacity change from 0 to 4096 [ 1395.009893][ T8894] FAULT_INJECTION: forcing a failure. [ 1395.009893][ T8894] name failslab, interval 1, probability 0, space 0, times 0 [ 1395.024184][ T8894] CPU: 0 PID: 8894 Comm: syz-executor.2 Not tainted 5.16.0-syzkaller #0 [ 1395.032560][ T8894] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1395.042638][ T8894] Call Trace: [ 1395.045929][ T8894] [ 1395.048867][ T8894] dump_stack_lvl+0xcd/0x134 [ 1395.053481][ T8894] should_fail.cold+0x5/0xa [ 1395.058044][ T8894] should_failslab+0x5/0x10 [ 1395.062574][ T8894] kmem_cache_alloc+0x5d/0x560 [ 1395.067364][ T8894] ? shmem_destroy_inode+0x70/0x70 [ 1395.072502][ T8894] shmem_alloc_inode+0x18/0x40 [ 1395.077285][ T8894] ? shmem_destroy_inode+0x70/0x70 [ 1395.082416][ T8894] alloc_inode+0x61/0x230 [ 1395.086772][ T8894] new_inode+0x27/0x2f0 [ 1395.090953][ T8894] shmem_get_inode+0x195/0xc60 [ 1395.095735][ T8894] __shmem_file_setup+0xb8/0x310 [ 1395.100693][ T8894] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 1395.106960][ T8894] __do_sys_memfd_create+0x1c6/0x4f0 [ 1395.112270][ T8894] do_syscall_64+0x35/0xb0 [ 1395.116733][ T8894] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1395.122653][ T8894] RIP: 0033:0x7f8eac07bfe9 [ 1395.127083][ T8894] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1395.146707][ T8894] RSP: 002b:00007f8eaa9f0f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1395.155145][ T8894] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f8eac07bfe9 [ 1395.163129][ T8894] RDX: 0000000000060000 RSI: 0000000000000000 RDI: 00007f8eac0d51e0 [ 1395.171116][ T8894] RBP: 0000000000000007 R08: 0000000000030000 R09: 00007f8eaa9f11d0 [ 1395.179102][ T8894] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000008100000 [ 1395.187085][ T8894] R13: 0000000020000100 R14: 0000000000200000 R15: 00000000200000c0 [ 1395.195071][ T8894] [ 1395.258250][ T8903] FAULT_INJECTION: forcing a failure. [ 1395.258250][ T8903] name failslab, interval 1, probability 0, space 0, times 0 [ 1395.271681][ T8887] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback. [ 1395.299154][ T8903] CPU: 1 PID: 8903 Comm: syz-executor.4 Not tainted 5.16.0-syzkaller #0 [ 1395.307511][ T8903] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1395.317595][ T8903] Call Trace: [ 1395.320603][ T8900] loop1: detected capacity change from 0 to 4096 [ 1395.327202][ T8903] [ 1395.327216][ T8903] dump_stack_lvl+0xcd/0x134 [ 1395.327249][ T8903] should_fail.cold+0x5/0xa [ 1395.327282][ T8903] should_failslab+0x5/0x10 [ 1395.327320][ T8903] __kmalloc+0x7b/0x4d0 [ 1395.327345][ T8903] ? tomoyo_realpath_from_path+0xc3/0x620 [ 1395.327376][ T8903] ? rcu_read_lock_sched_held+0x3a/0x70 [ 1395.327408][ T8903] tomoyo_realpath_from_path+0xc3/0x620 [ 1395.327436][ T8903] ? tomoyo_path_perm+0x1c6/0x400 [ 1395.327460][ T8903] tomoyo_path_perm+0x21b/0x400 [ 1395.327486][ T8903] ? tomoyo_path_perm+0x1c1/0x400 [ 1395.327512][ T8903] ? tomoyo_check_open_permission+0x380/0x380 [ 1395.327546][ T8903] ? security_path_truncate+0x94/0x140 [ 1395.327580][ T8903] ? security_path_truncate+0xb8/0x140 [ 1395.327613][ T8903] security_path_truncate+0xcf/0x140 [ 1395.327646][ T8903] do_sys_ftruncate+0x390/0x740 [ 1395.327678][ T8903] do_syscall_64+0x35/0xb0 [ 1395.327711][ T8903] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1395.327744][ T8903] RIP: 0033:0x7fe5f515efa7 [ 1395.327766][ T8903] Code: 48 89 e7 e8 cb e5 ff ff 48 8b 4c 24 18 64 48 2b 0c 25 28 00 00 00 75 05 48 83 c4 28 c3 e8 21 1a 00 00 90 b8 4d 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 [ 1395.327792][ T8903] RSP: 002b:00007fe5f3ad3f28 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 1395.327822][ T8903] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fe5f515efa7 [ 1395.327842][ T8903] RDX: 0000000000060000 RSI: 0000000000200000 RDI: 0000000000000005 [ 1395.327857][ T8903] RBP: 0000000000000007 R08: 0000000000030000 R09: 00007fe5f3ad41d0 [ 1395.474010][ T8903] R10: 0000000000000007 R11: 0000000000000217 R12: 0000000000000005 [ 1395.481997][ T8903] R13: 0000000000000005 R14: 0000000000200000 R15: 00000000200000c0 [ 1395.489981][ T8903] [ 1395.493140][ T8903] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1395.502659][ T8899] EXT4-fs: failed to create workqueue 11:23:08 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1395.508216][ T8899] EXT4-fs (loop3): mount failed [ 1395.510788][ T8903] loop4: detected capacity change from 0 to 4096 [ 1395.548054][ T8897] Quota error (device loop5): v2_read_file_info: Free block number too big (0 >= 0). 11:23:08 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900", 0x10, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1395.557874][ T8897] EXT4-fs warning (device loop5): ext4_enable_quotas:6842: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 1395.573416][ T8897] EXT4-fs (loop5): mount failed 11:23:08 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) 11:23:08 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 4) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) 11:23:08 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 9) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) [ 1395.663204][ T8903] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. [ 1395.680586][ T8900] EXT4-fs: failed to create workqueue [ 1395.680603][ T8900] EXT4-fs (loop1): mount failed 11:23:08 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1395.848769][ T8915] FAULT_INJECTION: forcing a failure. [ 1395.848769][ T8915] name failslab, interval 1, probability 0, space 0, times 0 [ 1395.862148][ T8915] CPU: 0 PID: 8915 Comm: syz-executor.2 Not tainted 5.16.0-syzkaller #0 [ 1395.870511][ T8915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1395.880591][ T8915] Call Trace: [ 1395.883889][ T8915] [ 1395.886838][ T8915] dump_stack_lvl+0xcd/0x134 [ 1395.891456][ T8915] should_fail.cold+0x5/0xa [ 1395.895989][ T8915] should_failslab+0x5/0x10 [ 1395.900527][ T8915] kmem_cache_alloc+0x5d/0x560 [ 1395.905318][ T8915] security_inode_alloc+0x34/0x160 [ 1395.910466][ T8915] inode_init_always+0x5d8/0xd70 [ 1395.915438][ T8915] ? __sanitizer_cov_trace_pc+0x3c/0x60 [ 1395.921023][ T8915] alloc_inode+0x82/0x230 [ 1395.925381][ T8915] new_inode+0x27/0x2f0 [ 1395.929564][ T8915] ? shmem_get_inode+0x9b/0xc60 [ 1395.934435][ T8915] shmem_get_inode+0x195/0xc60 [ 1395.939229][ T8915] __shmem_file_setup+0xb8/0x310 [ 1395.944197][ T8915] ? get_unused_fd_flags+0x5e/0x80 [ 1395.949344][ T8915] __do_sys_memfd_create+0x1c6/0x4f0 [ 1395.954663][ T8915] do_syscall_64+0x35/0xb0 [ 1395.959110][ T8915] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1395.965045][ T8915] RIP: 0033:0x7f8eac07bfe9 [ 1395.969483][ T8915] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1395.989125][ T8915] RSP: 002b:00007f8eaa9f0f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 11:23:08 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:23:08 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1395.997571][ T8915] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f8eac07bfe9 [ 1396.005569][ T8915] RDX: 0000000000060000 RSI: 0000000000000000 RDI: 00007f8eac0d51e0 [ 1396.013568][ T8915] RBP: 0000000000000007 R08: 0000000000030000 R09: 00007f8eaa9f11d0 [ 1396.021583][ T8915] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000008100000 [ 1396.029670][ T8915] R13: 0000000020000100 R14: 0000000000200000 R15: 00000000200000c0 [ 1396.037668][ T8915] [ 1396.212119][ T8917] loop3: detected capacity change from 0 to 4096 [ 1396.232356][ T8924] loop5: detected capacity change from 0 to 4096 11:23:09 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 5) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1396.435455][ T5150] I/O error, dev loop4, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1396.623337][ T8917] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 1396.680445][ T8933] FAULT_INJECTION: forcing a failure. [ 1396.680445][ T8933] name failslab, interval 1, probability 0, space 0, times 0 [ 1396.693431][ T5215] I/O error, dev loop0, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1396.722015][ T8933] CPU: 1 PID: 8933 Comm: syz-executor.4 Not tainted 5.16.0-syzkaller #0 [ 1396.726430][ T8924] Quota error (device loop5): v2_read_file_info: Free block number too big (0 >= 0). [ 1396.730396][ T8933] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1396.730418][ T8933] Call Trace: [ 1396.730427][ T8933] [ 1396.730436][ T8933] dump_stack_lvl+0xcd/0x134 [ 1396.730470][ T8933] should_fail.cold+0x5/0xa [ 1396.730502][ T8933] should_failslab+0x5/0x10 [ 1396.730533][ T8933] __kmalloc+0x7b/0x4d0 11:23:09 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1396.730559][ T8933] ? tomoyo_encode2.part.0+0xe9/0x3a0 [ 1396.730589][ T8933] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 1396.730625][ T8933] tomoyo_encode2.part.0+0xe9/0x3a0 [ 1396.730655][ T8933] ? tomoyo_realpath_from_path+0xc3/0x620 [ 1396.730687][ T8933] tomoyo_encode+0x28/0x50 11:23:09 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x466, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1396.730714][ T8933] tomoyo_realpath_from_path+0x186/0x620 [ 1396.730743][ T8933] ? tomoyo_profile+0x42/0x50 [ 1396.730767][ T8933] tomoyo_path_perm+0x21b/0x400 [ 1396.730794][ T8933] ? tomoyo_path_perm+0x1c1/0x400 [ 1396.730820][ T8933] ? tomoyo_check_open_permission+0x380/0x380 [ 1396.730855][ T8933] security_path_truncate+0xcf/0x140 [ 1396.730888][ T8933] do_sys_ftruncate+0x390/0x740 [ 1396.730919][ T8933] do_syscall_64+0x35/0xb0 [ 1396.730951][ T8933] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1396.730984][ T8933] RIP: 0033:0x7fe5f515efa7 [ 1396.731006][ T8933] Code: 48 89 e7 e8 cb e5 ff ff 48 8b 4c 24 18 64 48 2b 0c 25 28 00 00 00 75 05 48 83 c4 28 c3 e8 21 1a 00 00 90 b8 4d 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 [ 1396.731033][ T8933] RSP: 002b:00007fe5f3ad3f28 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 1396.731060][ T8933] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fe5f515efa7 [ 1396.731080][ T8933] RDX: 0000000000060000 RSI: 0000000000200000 RDI: 0000000000000005 [ 1396.731099][ T8933] RBP: 0000000000000007 R08: 0000000000030000 R09: 00007fe5f3ad41d0 [ 1396.731118][ T8933] R10: 0000000000000007 R11: 0000000000000217 R12: 0000000000000005 [ 1396.731135][ T8933] R13: 0000000000000005 R14: 0000000000200000 R15: 00000000200000c0 [ 1396.731155][ T8933] [ 1396.731297][ T8933] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1396.742967][ T8924] EXT4-fs warning (device loop5): ext4_enable_quotas:6842: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 1396.890875][ T8934] FAULT_INJECTION: forcing a failure. [ 1396.890875][ T8934] name failslab, interval 1, probability 0, space 0, times 0 [ 1396.940410][ T8924] EXT4-fs (loop5): mount failed [ 1397.041765][ T8934] CPU: 1 PID: 8934 Comm: syz-executor.2 Not tainted 5.16.0-syzkaller #0 [ 1397.050122][ T8934] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1397.060203][ T8934] Call Trace: [ 1397.063494][ T8934] [ 1397.066435][ T8934] dump_stack_lvl+0xcd/0x134 [ 1397.071040][ T8934] should_fail.cold+0x5/0xa [ 1397.075551][ T8934] should_failslab+0x5/0x10 [ 1397.080066][ T8934] kmem_cache_alloc+0x5d/0x560 [ 1397.084844][ T8934] ? lockdep_hardirqs_on+0x79/0x100 [ 1397.090049][ T8934] __d_alloc+0x2a/0x950 [ 1397.094209][ T8934] ? irqentry_enter+0x28/0x50 [ 1397.098890][ T8934] d_alloc_pseudo+0x19/0x70 [ 1397.103406][ T8934] alloc_file_pseudo+0xc6/0x250 [ 1397.108263][ T8934] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1397.114434][ T8934] ? alloc_file+0x590/0x590 [ 1397.118948][ T8934] ? lockdep_annotate_inode_mutex_key+0x43/0x180 [ 1397.125286][ T8934] ? __shmem_file_setup+0xc9/0x310 [ 1397.130433][ T8934] __shmem_file_setup+0x144/0x310 [ 1397.135553][ T8934] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 1397.141807][ T8934] __do_sys_memfd_create+0x1c6/0x4f0 [ 1397.147101][ T8934] do_syscall_64+0x35/0xb0 [ 1397.151528][ T8934] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1397.157429][ T8934] RIP: 0033:0x7f8eac07bfe9 [ 1397.161852][ T8934] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1397.181466][ T8934] RSP: 002b:00007f8eaa9f0f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1397.189882][ T8934] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f8eac07bfe9 11:23:09 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200002, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) [ 1397.197858][ T8934] RDX: 0000000000060000 RSI: 0000000000000000 RDI: 00007f8eac0d51e0 [ 1397.205836][ T8934] RBP: 0000000000000007 R08: 0000000000030000 R09: 00007f8eaa9f11d0 [ 1397.213808][ T8934] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000008100000 [ 1397.221782][ T8934] R13: 0000000020000100 R14: 0000000000200000 R15: 00000000200000c0 [ 1397.229762][ T8934] [ 1397.240006][ T5513] I/O error, dev loop1, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 11:23:10 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 10) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) [ 1397.240181][ T5150] I/O error, dev loop4, sector 3968 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1397.264402][ T5150] Buffer I/O error on dev loop4, logical block 496, async page read [ 1397.291761][ T8936] loop1: detected capacity change from 0 to 4096 [ 1397.297363][ T5513] I/O error, dev loop1, sector 3968 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1397.381611][ T8939] loop0: detected capacity change from 0 to 768 11:23:10 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900", 0x10, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1397.425673][ T5513] Buffer I/O error on dev loop1, logical block 496, async page read [ 1397.507717][ T8939] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (96 blocks) [ 1397.662480][ T8947] FAULT_INJECTION: forcing a failure. [ 1397.662480][ T8947] name failslab, interval 1, probability 0, space 0, times 0 [ 1397.677025][ T8947] CPU: 0 PID: 8947 Comm: syz-executor.4 Not tainted 5.16.0-syzkaller #0 [ 1397.685380][ T8947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1397.695544][ T8947] Call Trace: [ 1397.698827][ T8947] [ 1397.701760][ T8947] dump_stack_lvl+0xcd/0x134 [ 1397.706360][ T8947] should_fail.cold+0x5/0xa [ 1397.710876][ T8947] should_failslab+0x5/0x10 [ 1397.715392][ T8947] __kmalloc+0x7b/0x4d0 [ 1397.719556][ T8947] ? tomoyo_encode2.part.0+0xe9/0x3a0 [ 1397.724937][ T8947] ? tomoyo_encode2.part.0+0x60/0x3a0 [ 1397.730322][ T8947] tomoyo_encode2.part.0+0xe9/0x3a0 [ 1397.735534][ T8947] tomoyo_encode+0x28/0x50 [ 1397.739960][ T8947] tomoyo_realpath_from_path+0x186/0x620 [ 1397.745612][ T8947] ? tomoyo_profile+0x42/0x50 [ 1397.750294][ T8947] tomoyo_path_perm+0x21b/0x400 [ 1397.755153][ T8947] ? tomoyo_path_perm+0x1c1/0x400 [ 1397.760195][ T8947] ? tomoyo_check_open_permission+0x380/0x380 [ 1397.766284][ T8947] security_path_truncate+0xcf/0x140 [ 1397.771585][ T8947] do_sys_ftruncate+0x390/0x740 [ 1397.776445][ T8947] do_syscall_64+0x35/0xb0 [ 1397.780877][ T8947] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1397.786780][ T8947] RIP: 0033:0x7fe5f515efa7 [ 1397.791200][ T8947] Code: 48 89 e7 e8 cb e5 ff ff 48 8b 4c 24 18 64 48 2b 0c 25 28 00 00 00 75 05 48 83 c4 28 c3 e8 21 1a 00 00 90 b8 4d 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 [ 1397.810822][ T8947] RSP: 002b:00007fe5f3ad3f28 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 1397.819243][ T8947] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fe5f515efa7 [ 1397.827393][ T8947] RDX: 0000000000060000 RSI: 0000000000200000 RDI: 0000000000000005 [ 1397.835454][ T8947] RBP: 0000000000000007 R08: 0000000000030000 R09: 00007fe5f3ad41d0 [ 1397.843427][ T8947] R10: 0000000000000007 R11: 0000000000000217 R12: 0000000000000005 [ 1397.851489][ T8947] R13: 0000000000000005 R14: 0000000000200000 R15: 00000000200000c0 [ 1397.859468][ T8947] 11:23:10 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 6) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) 11:23:10 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4ff, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1397.862670][ T8947] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1397.888129][ T8947] loop4: detected capacity change from 0 to 4096 [ 1397.939722][ T8936] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: writeback. 11:23:10 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1398.101260][ T8947] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. [ 1398.110129][ T8953] FAULT_INJECTION: forcing a failure. [ 1398.110129][ T8953] name failslab, interval 1, probability 0, space 0, times 0 [ 1398.124032][ T5338] I/O error, dev loop5, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1398.148422][ T8953] CPU: 1 PID: 8953 Comm: syz-executor.2 Not tainted 5.16.0-syzkaller #0 [ 1398.156813][ T8953] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1398.166899][ T8953] Call Trace: [ 1398.170195][ T8953] [ 1398.173138][ T8953] dump_stack_lvl+0xcd/0x134 [ 1398.177767][ T8953] should_fail.cold+0x5/0xa [ 1398.182310][ T8953] should_failslab+0x5/0x10 [ 1398.186847][ T8953] kmem_cache_alloc+0x5d/0x560 [ 1398.191650][ T8953] ? d_instantiate+0x75/0x90 [ 1398.196274][ T8953] __alloc_file+0x21/0x280 [ 1398.200727][ T8953] alloc_empty_file+0x6d/0x170 [ 1398.205546][ T8953] alloc_file+0x59/0x590 [ 1398.209835][ T8953] alloc_file_pseudo+0x165/0x250 [ 1398.214804][ T8953] ? alloc_file+0x590/0x590 [ 1398.219345][ T8953] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1398.225631][ T8953] ? shmem_get_inode+0x5d7/0xc60 [ 1398.230616][ T8953] __shmem_file_setup+0x144/0x310 [ 1398.235686][ T8953] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 1398.241964][ T8953] __do_sys_memfd_create+0x1c6/0x4f0 [ 1398.247288][ T8953] do_syscall_64+0x35/0xb0 [ 1398.251744][ T8953] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1398.257678][ T8953] RIP: 0033:0x7f8eac07bfe9 [ 1398.262122][ T8953] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1398.281762][ T8953] RSP: 002b:00007f8eaa9f0f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1398.290209][ T8953] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f8eac07bfe9 11:23:11 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900", 0x10, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:23:11 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200003, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) 11:23:11 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 11) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) [ 1398.298297][ T8953] RDX: 0000000000060000 RSI: 0000000000000000 RDI: 00007f8eac0d51e0 [ 1398.306300][ T8953] RBP: 0000000000000007 R08: 0000000000030000 R09: 00007f8eaa9f11d0 [ 1398.314301][ T8953] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000008100000 [ 1398.322302][ T8953] R13: 0000000020000100 R14: 0000000000200000 R15: 00000000200000c0 [ 1398.330305][ T8953] [ 1398.369909][ T5215] I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 11:23:11 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900000000", 0x13, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:23:11 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x641, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1398.459890][ T8962] loop3: detected capacity change from 0 to 4096 11:23:11 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 7) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1398.677290][ T8962] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 1398.697526][ T8966] loop5: detected capacity change from 0 to 4096 11:23:11 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1398.757832][ T5513] I/O error, dev loop1, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1398.869147][ T8970] FAULT_INJECTION: forcing a failure. [ 1398.869147][ T8970] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1398.883752][ T8970] CPU: 0 PID: 8970 Comm: syz-executor.4 Not tainted 5.16.0-syzkaller #0 [ 1398.892119][ T8970] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1398.902200][ T8970] Call Trace: [ 1398.905500][ T8970] [ 1398.908445][ T8970] dump_stack_lvl+0xcd/0x134 [ 1398.913061][ T8970] should_fail.cold+0x5/0xa [ 1398.917605][ T8970] prepare_alloc_pages+0x17b/0x570 [ 1398.922743][ T8970] __alloc_pages+0x12f/0x500 [ 1398.927354][ T8970] ? __alloc_pages_slowpath.constprop.0+0x20d0/0x20d0 [ 1398.930655][ T8966] Quota error (device loop5): v2_read_file_info: Free block number too big (0 >= 0). [ 1398.934138][ T8970] ? lockdep_hardirqs_on+0x79/0x100 [ 1398.934232][ T8970] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1398.944575][ T8966] EXT4-fs warning (device loop5): ext4_enable_quotas:6842: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 1398.948878][ T8970] ? policy_node+0xd6/0x110 [ 1398.948986][ T8970] alloc_pages_vma+0xf3/0x760 [ 1398.949013][ T8970] shmem_alloc_page+0x11f/0x1f0 [ 1398.949039][ T8970] ? shmem_link+0x360/0x360 [ 1398.949065][ T8970] ? __vm_enough_memory+0x60/0x360 11:23:11 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200004, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) [ 1398.949094][ T8970] ? __vm_enough_memory+0x60/0x360 [ 1398.949124][ T8970] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 1398.949154][ T8970] ? __vm_enough_memory+0x184/0x360 [ 1398.949183][ T8970] shmem_alloc_and_acct_page+0x161/0x8c0 [ 1398.949214][ T8970] shmem_getpage_gfp+0x643/0x22d0 [ 1398.949244][ T8970] ? shmem_is_huge+0x2f0/0x2f0 [ 1398.949271][ T8970] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 1398.949303][ T8970] ? fault_in_readable+0x11c/0x190 [ 1398.949330][ T8970] ? fault_in_writeable+0x120/0x120 [ 1398.949357][ T8970] shmem_write_begin+0xff/0x1e0 [ 1398.949386][ T8970] generic_perform_write+0x205/0x510 [ 1398.949462][ T8970] ? generic_file_readonly_mmap+0x1b0/0x1b0 [ 1398.949491][ T8970] ? iunique+0x330/0x330 [ 1398.949521][ T8970] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 1398.949552][ T8970] ? generic_write_checks+0x2a9/0x380 [ 1398.949582][ T8970] __generic_file_write_iter+0x1c7/0x510 [ 1398.949642][ T8970] generic_file_write_iter+0xd7/0x220 [ 1398.949671][ T8970] ? iov_iter_init+0x45/0x1b0 [ 1398.949700][ T8970] new_sync_write+0x431/0x660 [ 1398.949732][ T8970] ? new_sync_read+0x6e0/0x6e0 [ 1398.949767][ T8970] vfs_write+0x7cd/0xae0 [ 1398.949793][ T8970] __x64_sys_pwrite64+0x1fd/0x250 [ 1398.949819][ T8970] ? ksys_pwrite64+0x1a0/0x1a0 [ 1398.949845][ T8970] ? syscall_enter_from_user_mode+0x2b/0x70 [ 1398.949878][ T8970] do_syscall_64+0x35/0xb0 [ 1398.949910][ T8970] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1398.949944][ T8970] RIP: 0033:0x7fe5f5111fb7 [ 1398.949966][ T8970] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1398.949992][ T8970] RSP: 002b:00007fe5f3ad3f00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1398.950021][ T8970] RAX: ffffffffffffffda RBX: 00007fe5f51a89c8 RCX: 00007fe5f5111fb7 [ 1398.950041][ T8970] RDX: 0000000000000066 RSI: 0000000020010000 RDI: 0000000000000005 [ 1398.950059][ T8970] RBP: 0000000000000007 R08: 0000000000000000 R09: 00007fe5f3ad41d0 [ 1398.950077][ T8970] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000005 [ 1398.950095][ T8970] R13: 0000000000000005 R14: 0000000020000200 R15: 0000000000000000 [ 1398.950114][ T8970] [ 1399.001061][ T5150] I/O error, dev loop4, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1399.042957][ T8976] FAULT_INJECTION: forcing a failure. [ 1399.042957][ T8976] name failslab, interval 1, probability 0, space 0, times 0 [ 1399.052983][ T8966] EXT4-fs (loop5): mount failed [ 1399.078436][ T8973] loop1: detected capacity change from 0 to 4096 [ 1399.080712][ T8976] CPU: 0 PID: 8976 Comm: syz-executor.2 Not tainted 5.16.0-syzkaller #0 [ 1399.080753][ T8976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1399.080773][ T8976] Call Trace: [ 1399.080785][ T8976] [ 1399.080795][ T8976] dump_stack_lvl+0xcd/0x134 [ 1399.080850][ T8976] should_fail.cold+0x5/0xa [ 1399.080885][ T8976] should_failslab+0x5/0x10 [ 1399.080917][ T8976] kmem_cache_alloc+0x5d/0x560 [ 1399.080946][ T8976] security_file_alloc+0x34/0x170 [ 1399.080975][ T8976] __alloc_file+0xd8/0x280 [ 1399.081001][ T8976] alloc_empty_file+0x6d/0x170 [ 1399.081028][ T8976] alloc_file+0x59/0x590 [ 1399.081055][ T8976] alloc_file_pseudo+0x165/0x250 [ 1399.081083][ T8976] ? alloc_file+0x590/0x590 [ 1399.081108][ T8976] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1399.081144][ T8976] ? shmem_get_inode+0x5d7/0xc60 [ 1399.081171][ T8976] __shmem_file_setup+0x144/0x310 [ 1399.081199][ T8976] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 1399.081234][ T8976] __do_sys_memfd_create+0x1c6/0x4f0 [ 1399.081264][ T8976] do_syscall_64+0x35/0xb0 [ 1399.081298][ T8976] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1399.401114][ T8976] RIP: 0033:0x7f8eac07bfe9 [ 1399.405541][ T8976] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1399.425164][ T8976] RSP: 002b:00007f8eaa9f0f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1399.433590][ T8976] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f8eac07bfe9 [ 1399.441576][ T8976] RDX: 0000000000060000 RSI: 0000000000000000 RDI: 00007f8eac0d51e0 [ 1399.449556][ T8976] RBP: 0000000000000007 R08: 0000000000030000 R09: 00007f8eaa9f11d0 [ 1399.457538][ T8976] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000008100000 11:23:12 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900000000", 0x13, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1399.465519][ T8976] R13: 0000000020000100 R14: 0000000000200000 R15: 00000000200000c0 [ 1399.473506][ T8976] [ 1399.509649][ T8980] loop0: detected capacity change from 0 to 768 11:23:12 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 12) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) [ 1399.724217][ T8980] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (96 blocks) [ 1399.760345][ T8973] EXT4-fs: failed to create workqueue [ 1399.766700][ T8973] EXT4-fs (loop1): mount failed [ 1399.848578][ T5215] I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 11:23:12 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:23:12 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900000000", 0x13, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1399.893436][ T8986] FAULT_INJECTION: forcing a failure. [ 1399.893436][ T8986] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1399.907093][ T8986] CPU: 1 PID: 8986 Comm: syz-executor.4 Not tainted 5.16.0-syzkaller #0 [ 1399.915466][ T8986] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1399.925547][ T8986] Call Trace: [ 1399.928848][ T8986] [ 1399.931803][ T8986] dump_stack_lvl+0xcd/0x134 [ 1399.936435][ T8986] should_fail.cold+0x5/0xa 11:23:12 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1020, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) 11:23:12 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) (fail_nth: 8) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1399.940979][ T8986] ? shmem_getpage_gfp+0x1454/0x22d0 [ 1399.946309][ T8986] copy_page_from_iter_atomic+0x4c4/0x17c0 [ 1399.952161][ T8986] ? shmem_is_huge+0x2f0/0x2f0 [ 1399.956970][ T8986] ? csum_and_copy_to_iter+0x19b0/0x19b0 [ 1399.962641][ T8986] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 1399.968406][ T8986] ? fault_in_readable+0x11c/0x190 [ 1399.973559][ T8986] ? fault_in_writeable+0x120/0x120 [ 1399.978824][ T8986] ? shmem_write_begin+0xff/0x1e0 [ 1399.983901][ T8986] ? shmem_write_begin+0x109/0x1e0 [ 1399.989058][ T8986] generic_perform_write+0x27a/0x510 [ 1399.994396][ T8986] ? generic_file_readonly_mmap+0x1b0/0x1b0 [ 1399.999937][ T5513] Buffer I/O error on dev loop1, logical block 496, async page read [ 1400.000332][ T8986] ? iunique+0x330/0x330 [ 1400.000369][ T8986] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 1400.018330][ T8986] ? generic_write_checks+0x2a9/0x380 [ 1400.023999][ T8986] __generic_file_write_iter+0x1c7/0x510 [ 1400.029672][ T8986] generic_file_write_iter+0xd7/0x220 [ 1400.035088][ T8986] ? iov_iter_init+0x45/0x1b0 [ 1400.039802][ T8986] new_sync_write+0x431/0x660 [ 1400.044518][ T8986] ? new_sync_read+0x6e0/0x6e0 [ 1400.049317][ T8986] ? mptcpv6_handle_mapped+0x50/0x1f0 [ 1400.054823][ T8986] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1400.061023][ T8986] vfs_write+0x7cd/0xae0 [ 1400.065297][ T8986] __x64_sys_pwrite64+0x1fd/0x250 [ 1400.066098][ T8993] FAULT_INJECTION: forcing a failure. [ 1400.066098][ T8993] name failslab, interval 1, probability 0, space 0, times 0 [ 1400.070347][ T8986] ? ksys_pwrite64+0x1a0/0x1a0 [ 1400.070379][ T8986] ? syscall_enter_from_user_mode+0x2b/0x70 [ 1400.070414][ T8986] do_syscall_64+0x35/0xb0 [ 1400.070448][ T8986] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1400.070481][ T8986] RIP: 0033:0x7fe5f5111fb7 [ 1400.070503][ T8986] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1400.070530][ T8986] RSP: 002b:00007fe5f3ad3f00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1400.070558][ T8986] RAX: ffffffffffffffda RBX: 00007fe5f51a89c8 RCX: 00007fe5f5111fb7 [ 1400.070578][ T8986] RDX: 000000000000001f RSI: 0000000020010100 RDI: 0000000000000005 [ 1400.070596][ T8986] RBP: 0000000000000007 R08: 0000000000000000 R09: 00007fe5f3ad41d0 [ 1400.070615][ T8986] R10: 00000000000004e0 R11: 0000000000000293 R12: 0000000000000005 [ 1400.070632][ T8986] R13: 0000000000000005 R14: 0000000020000218 R15: 0000000000000001 [ 1400.070652][ T8986] [ 1400.120006][ T8986] loop4: detected capacity change from 0 to 4096 [ 1400.122911][ T8993] CPU: 0 PID: 8993 Comm: syz-executor.2 Not tainted 5.16.0-syzkaller #0 [ 1400.122943][ T8993] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1400.122961][ T8993] Call Trace: [ 1400.122970][ T8993] [ 1400.122980][ T8993] dump_stack_lvl+0xcd/0x134 [ 1400.123012][ T8993] should_fail.cold+0x5/0xa [ 1400.123045][ T8993] should_failslab+0x5/0x10 [ 1400.123075][ T8993] __kmalloc+0x7b/0x4d0 [ 1400.123102][ T8993] ? tomoyo_realpath_from_path+0xc3/0x620 [ 1400.123132][ T8993] ? rcu_read_lock_sched_held+0x3a/0x70 [ 1400.123163][ T8993] tomoyo_realpath_from_path+0xc3/0x620 [ 1400.123193][ T8993] ? tomoyo_path_perm+0x1c6/0x400 [ 1400.123219][ T8993] tomoyo_path_perm+0x21b/0x400 [ 1400.123246][ T8993] ? tomoyo_path_perm+0x1c1/0x400 [ 1400.123272][ T8993] ? tomoyo_check_open_permission+0x380/0x380 [ 1400.123301][ T8993] ? mark_held_locks+0x9f/0xe0 [ 1400.123334][ T8993] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1400.123369][ T8993] ? do_sys_ftruncate+0x2cb/0x740 [ 1400.123401][ T8993] security_path_truncate+0xcf/0x140 [ 1400.123435][ T8993] do_sys_ftruncate+0x390/0x740 [ 1400.123472][ T8993] do_syscall_64+0x35/0xb0 [ 1400.123507][ T8993] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1400.123541][ T8993] RIP: 0033:0x7f8eac07bfa7 [ 1400.331548][ T8993] Code: 48 89 e7 e8 cb e5 ff ff 48 8b 4c 24 18 64 48 2b 0c 25 28 00 00 00 75 05 48 83 c4 28 c3 e8 21 1a 00 00 90 b8 4d 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 [ 1400.351177][ T8993] RSP: 002b:00007f8eaa9f0f28 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 1400.359611][ T8993] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f8eac07bfa7 [ 1400.367590][ T8993] RDX: 0000000000060000 RSI: 0000000000200000 RDI: 0000000000000005 [ 1400.375566][ T8993] RBP: 0000000000000007 R08: 0000000000030000 R09: 00007f8eaa9f11d0 [ 1400.383539][ T8993] R10: 0000000000000007 R11: 0000000000000217 R12: 0000000000000005 [ 1400.391514][ T8993] R13: 0000000000000005 R14: 0000000000200000 R15: 00000000200000c0 [ 1400.399494][ T8993] [ 1400.402629][ T8993] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1400.443558][ T8993] loop2: detected capacity change from 0 to 4096 11:23:13 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:23:13 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a090000000000", 0x14, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1400.617523][ T8996] loop3: detected capacity change from 0 to 4096 11:23:13 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x441d, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1400.744130][ T5215] Buffer I/O error on dev loop0, logical block 0, async page read 11:23:13 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1400.849220][ T8993] EXT4-fs: error -4 creating inode table initialization thread [ 1400.857084][ T8986] EXT4-fs: error -4 creating inode table initialization thread [ 1400.857212][ T8993] EXT4-fs (loop2): mount failed [ 1400.864931][ T8986] EXT4-fs (loop4): mount failed [ 1400.939615][ T9009] loop5: detected capacity change from 0 to 4096 [ 1400.997557][ T8996] EXT4-fs: error -4 creating inode table initialization thread [ 1401.005525][ T8996] EXT4-fs (loop3): mount failed 11:23:13 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) [ 1401.133234][ T9009] Quota error (device loop5): v2_read_file_info: Free block number too big (0 >= 0). [ 1401.145886][ T9009] EXT4-fs warning (device loop5): ext4_enable_quotas:6842: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 1401.151411][ T9015] loop0: detected capacity change from 0 to 768 [ 1401.167567][ T9009] EXT4-fs (loop5): mount failed 11:23:14 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200005, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) 11:23:14 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:23:14 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a090000000000", 0x14, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1401.264598][ T5127] Buffer I/O error on dev loop2, logical block 496, async page read [ 1401.290067][ T9015] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (96 blocks) [ 1401.444274][ T9022] loop1: detected capacity change from 0 to 4096 11:23:14 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x483d, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1401.521442][ T9024] loop5: detected capacity change from 0 to 4096 11:23:14 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x466, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1401.679470][ T9027] loop3: detected capacity change from 0 to 4096 11:23:14 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x466, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) [ 1401.864652][ T9030] loop0: detected capacity change from 0 to 768 [ 1401.898689][ T9030] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (96 blocks) [ 1401.986547][ T9036] loop2: detected capacity change from 0 to 768 [ 1402.112521][ T9022] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: writeback. [ 1402.123479][ T9036] EXT4-fs (loop2): bad geometry: block count 512 exceeds size of device (96 blocks) [ 1402.143650][ T9024] Quota error (device loop5): v2_read_file_info: Free block number too big (0 >= 0). 11:23:15 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x30015, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1402.144140][ T9027] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 1402.156090][ T9024] EXT4-fs warning (device loop5): ext4_enable_quotas:6842: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 1402.182658][ T9024] EXT4-fs (loop5): mount failed [ 1402.238448][ T9039] loop4: detected capacity change from 0 to 768 [ 1402.317138][ T5127] blk_print_req_error: 7 callbacks suppressed [ 1402.317157][ T5127] I/O error, dev loop2, sector 24 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 11:23:15 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1402.378073][ T9039] EXT4-fs (loop4): bad geometry: block count 512 exceeds size of device (96 blocks) 11:23:15 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200006, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) 11:23:15 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4ff, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) [ 1402.476642][ T9042] loop0: detected capacity change from 0 to 768 [ 1402.513703][ T9042] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (96 blocks) [ 1402.574708][ T5150] I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1402.587093][ T5338] I/O error, dev loop5, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1402.615312][ T5215] I/O error, dev loop0, sector 24 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 11:23:15 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4ff, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) 11:23:15 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a090000000000", 0x14, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:23:15 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200002, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1402.790875][ T9047] loop5: detected capacity change from 0 to 4096 [ 1402.938201][ T5150] I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1402.951928][ T5150] Buffer I/O error on dev loop4, logical block 0, async page read 11:23:15 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1403.006985][ T9047] Quota error (device loop5): v2_read_file_info: Free block number too big (0 >= 0). [ 1403.025925][ T9047] EXT4-fs warning (device loop5): ext4_enable_quotas:6842: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 1403.045426][ T9047] EXT4-fs (loop5): mount failed [ 1403.097609][ T9053] loop2: detected capacity change from 0 to 768 [ 1403.210828][ T9054] loop0: detected capacity change from 0 to 4096 11:23:16 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1020, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) [ 1403.314504][ T9053] EXT4-fs (loop2): bad geometry: block count 512 exceeds size of device (96 blocks) 11:23:16 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200007, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) 11:23:16 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1403.390511][ T9059] loop1: detected capacity change from 0 to 4096 [ 1403.399781][ T5127] I/O error, dev loop2, sector 24 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 11:23:16 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1403.454391][ T9059] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: writeback. [ 1403.476426][ T9054] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback. [ 1403.538229][ T9066] loop4: detected capacity change from 0 to 768 11:23:16 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200003, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1403.720370][ T9069] loop3: detected capacity change from 0 to 4096 [ 1403.721661][ T9071] loop5: detected capacity change from 0 to 4096 11:23:16 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x641, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1403.933289][ T9066] EXT4-fs (loop4): bad geometry: block count 512 exceeds size of device (96 blocks) [ 1403.997074][ T9071] EXT4-fs warning (device loop5): ext4_enable_quotas:6842: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 1404.022672][ T9071] EXT4-fs (loop5): mount failed 11:23:17 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x441d, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) [ 1404.159864][ T9069] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 1404.168149][ T9080] loop2: detected capacity change from 0 to 768 [ 1404.244759][ T9080] EXT4-fs (loop2): bad geometry: block count 512 exceeds size of device (96 blocks) 11:23:17 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1404.413342][ T9083] loop4: detected capacity change from 0 to 768 11:23:17 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200008, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) 11:23:17 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1404.483382][ T5215] I/O error, dev loop0, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1404.496698][ T9083] EXT4-fs (loop4): bad geometry: block count 512 exceeds size of device (96 blocks) [ 1404.548322][ T5513] I/O error, dev loop1, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1404.619985][ T5127] I/O error, dev loop2, sector 24 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1404.747839][ T9086] loop1: detected capacity change from 0 to 4096 [ 1404.780676][ T9086] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: writeback. 11:23:17 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:23:17 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200004, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) 11:23:17 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1020, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) 11:23:17 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x483d, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) [ 1404.957313][ T9096] loop5: detected capacity change from 0 to 4096 [ 1404.958925][ T9093] loop0: detected capacity change from 0 to 4096 [ 1405.152301][ T9089] loop3: detected capacity change from 0 to 4096 [ 1405.228783][ T9095] loop4: detected capacity change from 0 to 768 [ 1405.264778][ T9097] loop2: detected capacity change from 0 to 768 [ 1405.358674][ T9095] EXT4-fs (loop4): bad geometry: block count 512 exceeds size of device (96 blocks) [ 1405.377129][ T9097] EXT4-fs (loop2): bad geometry: block count 512 exceeds size of device (96 blocks) [ 1405.565179][ T9089] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 1405.646245][ T9096] EXT4-fs warning (device loop5): ext4_enable_quotas:6842: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 1405.683286][ T9096] EXT4-fs (loop5): mount failed [ 1405.723114][ T9093] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback. 11:23:18 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x441d, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) 11:23:18 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x30015, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) [ 1405.764482][ T5150] I/O error, dev loop4, sector 24 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 11:23:18 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200009, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) 11:23:18 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200005, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) 11:23:18 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1405.960098][ T9113] loop1: detected capacity change from 0 to 4096 [ 1405.987541][ T9115] loop4: detected capacity change from 0 to 768 [ 1405.999064][ T9116] loop5: detected capacity change from 0 to 4096 [ 1406.009982][ T9117] loop2: detected capacity change from 0 to 768 [ 1406.044996][ T9115] EXT4-fs (loop4): bad geometry: block count 512 exceeds size of device (96 blocks) [ 1406.101912][ T9117] EXT4-fs (loop2): bad geometry: block count 512 exceeds size of device (96 blocks) [ 1406.224573][ T9116] EXT4-fs warning (device loop5): ext4_enable_quotas:6842: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 1406.279873][ T9116] EXT4-fs (loop5): mount failed [ 1406.312955][ T9122] loop3: detected capacity change from 0 to 4096 11:23:19 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200006, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) 11:23:19 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200002, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) [ 1406.455343][ T9113] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: writeback. 11:23:19 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:23:19 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x483d, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1406.654662][ T9122] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. 11:23:19 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:23:19 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) [ 1406.810812][ T9127] loop0: detected capacity change from 0 to 4096 11:23:19 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200003, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) [ 1407.119186][ T9132] loop5: detected capacity change from 0 to 4096 [ 1407.120841][ T9133] loop2: detected capacity change from 0 to 768 [ 1407.231311][ T9140] loop4: detected capacity change from 0 to 4096 [ 1407.302402][ T9133] EXT4-fs (loop2): bad geometry: block count 512 exceeds size of device (96 blocks) [ 1407.374741][ T9142] loop3: detected capacity change from 0 to 4096 [ 1407.375487][ T9145] loop1: detected capacity change from 0 to 4096 11:23:20 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200007, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1407.530841][ T9127] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback. [ 1407.576632][ T9132] EXT4-fs error (device loop5): ext4_quota_enable:6805: comm syz-executor.5: Bad quota inode # 3 [ 1407.592964][ T9132] EXT4-fs warning (device loop5): ext4_enable_quotas:6842: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1407.644962][ T9132] EXT4-fs (loop5): mount failed [ 1407.686687][ T9145] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: writeback. [ 1407.686907][ T9142] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 1407.738745][ T9140] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. 11:23:20 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:23:20 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x30015, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) 11:23:20 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200004, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) 11:23:20 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20000b, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) [ 1407.806758][ T5127] blk_print_req_error: 2 callbacks suppressed [ 1407.806779][ T5127] I/O error, dev loop2, sector 24 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 11:23:20 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1407.948472][ T9155] loop2: detected capacity change from 0 to 768 11:23:20 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1408.043822][ T9155] EXT4-fs (loop2): bad geometry: block count 512 exceeds size of device (96 blocks) [ 1408.203058][ T5513] I/O error, dev loop1, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 11:23:21 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200002, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1408.271248][ T9160] loop5: detected capacity change from 0 to 4096 [ 1408.365253][ T9162] loop0: detected capacity change from 0 to 4096 11:23:21 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20000c, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) 11:23:21 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200005, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) [ 1408.678568][ T5150] I/O error, dev loop4, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1408.692660][ T9162] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback. [ 1408.722337][ T9160] EXT4-fs error (device loop5): ext4_quota_enable:6805: comm syz-executor.5: Bad quota inode # 3 [ 1408.738469][ T9175] loop2: detected capacity change from 0 to 4096 [ 1408.827568][ T9160] EXT4-fs warning (device loop5): ext4_enable_quotas:6842: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1408.829602][ T9177] loop3: detected capacity change from 0 to 4096 [ 1408.852228][ T9160] EXT4-fs (loop5): mount failed 11:23:21 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:23:21 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200006, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) [ 1408.977642][ T5513] I/O error, dev loop1, sector 3968 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1409.131918][ T9177] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 1409.172084][ T9175] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. 11:23:22 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200008, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1409.222603][ T5513] Buffer I/O error on dev loop1, logical block 496, async page read 11:23:22 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:23:22 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200003, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1409.282047][ T9183] loop1: detected capacity change from 0 to 4096 11:23:22 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20000d, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) [ 1409.434458][ T5215] I/O error, dev loop0, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1409.437512][ T9187] loop4: detected capacity change from 0 to 4096 [ 1409.565210][ T9189] loop5: detected capacity change from 0 to 4096 [ 1409.578601][ T9183] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: writeback. [ 1409.790573][ T5514] I/O error, dev loop3, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 11:23:22 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1409.842219][ T9187] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. [ 1409.865556][ T9189] EXT4-fs error (device loop5): ext4_quota_enable:6805: comm syz-executor.5: Bad quota inode # 3 [ 1409.885574][ T9189] EXT4-fs warning (device loop5): ext4_enable_quotas:6842: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1409.936624][ T9189] EXT4-fs (loop5): mount failed [ 1409.969733][ T5215] I/O error, dev loop0, sector 3968 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1409.992620][ T5338] I/O error, dev loop5, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 11:23:22 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200004, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) 11:23:23 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:23:23 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20000f, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) 11:23:23 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200007, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) [ 1410.102603][ T5215] Buffer I/O error on dev loop0, logical block 496, async page read 11:23:23 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20000b, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1410.152373][ T5127] I/O error, dev loop2, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1410.189337][ T5514] I/O error, dev loop3, sector 3968 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1410.203448][ T5514] Buffer I/O error on dev loop3, logical block 496, async page read [ 1410.273877][ T5338] Buffer I/O error on dev loop5, logical block 496, async page read [ 1410.394253][ T9202] loop2: detected capacity change from 0 to 4096 [ 1410.447412][ T9207] loop0: detected capacity change from 0 to 4096 [ 1410.573763][ T9210] loop3: detected capacity change from 0 to 4096 11:23:23 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:23:23 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1410.883837][ T9207] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback. [ 1410.889169][ T9210] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 1411.026573][ T9223] loop1: detected capacity change from 0 to 4096 11:23:23 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200018, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1411.090862][ T9222] loop4: detected capacity change from 0 to 4096 11:23:24 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200010, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) 11:23:24 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200005, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1411.228263][ T9224] loop5: detected capacity change from 0 to 4096 [ 1411.261795][ T9202] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. 11:23:24 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1411.385498][ T9224] EXT4-fs error (device loop5): ext4_quota_enable:6805: comm syz-executor.5: Bad quota inode # 3 [ 1411.401126][ T9224] EXT4-fs warning (device loop5): ext4_enable_quotas:6842: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1411.433827][ T9224] EXT4-fs (loop5): mount failed [ 1411.526969][ T9222] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. 11:23:24 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200008, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) [ 1411.702472][ T9231] loop1: detected capacity change from 0 to 4096 [ 1411.737565][ T5514] Buffer I/O error on dev loop3, logical block 496, async page read 11:23:24 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:23:24 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200011, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) 11:23:24 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800), 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:23:24 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1412.070454][ T9242] loop5: detected capacity change from 0 to 4096 11:23:25 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200030, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) 11:23:25 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200026, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) 11:23:25 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20000b, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) [ 1412.306078][ T9242] EXT4-fs error (device loop5): ext4_quota_enable:6805: comm syz-executor.5: Bad quota inode # 3 [ 1412.319909][ T9242] EXT4-fs warning (device loop5): ext4_enable_quotas:6842: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1412.331854][ T9246] loop1: detected capacity change from 0 to 4096 [ 1412.342779][ T9242] EXT4-fs (loop5): mount failed [ 1412.452693][ T9250] loop0: detected capacity change from 0 to 4096 [ 1412.558311][ T9251] loop2: detected capacity change from 0 to 4096 [ 1412.694931][ T9255] loop3: detected capacity change from 0 to 4096 [ 1412.807142][ T9256] loop4: detected capacity change from 0 to 4096 11:23:25 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:23:25 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800), 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1413.027547][ T9251] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 1413.047814][ T9250] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback. [ 1413.104749][ T9266] loop1: detected capacity change from 0 to 4096 [ 1413.174559][ T9256] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. 11:23:26 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200006, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) 11:23:26 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200083, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) 11:23:26 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20002f, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) [ 1413.251273][ T9255] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. 11:23:26 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200018, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) 11:23:26 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1413.352414][ T9269] loop5: detected capacity change from 0 to 4096 [ 1413.480272][ T5514] blk_print_req_error: 10 callbacks suppressed [ 1413.480291][ T5514] I/O error, dev loop3, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1413.575554][ T9269] EXT4-fs error (device loop5): ext4_quota_enable:6805: comm syz-executor.5: Bad quota inode # 3 [ 1413.611691][ T9269] EXT4-fs warning (device loop5): ext4_enable_quotas:6842: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1413.658113][ T9269] EXT4-fs (loop5): mount failed 11:23:26 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200007, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1413.725329][ T5127] I/O error, dev loop2, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 11:23:26 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200046, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) [ 1413.855535][ T9277] loop1: detected capacity change from 0 to 4096 [ 1413.935540][ T5338] I/O error, dev loop5, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1413.950283][ T5514] I/O error, dev loop3, sector 3968 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 11:23:26 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800), 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1413.977770][ T5514] Buffer I/O error on dev loop3, logical block 496, async page read [ 1414.018727][ T9279] loop2: detected capacity change from 0 to 4096 11:23:27 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1414.188091][ T9286] loop4: detected capacity change from 0 to 4096 [ 1414.191092][ T9285] loop3: detected capacity change from 0 to 4096 [ 1414.480124][ T9279] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. 11:23:27 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200008, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1414.540714][ T5513] I/O error, dev loop1, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1414.673679][ T9285] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 1414.675223][ T9295] loop5: detected capacity change from 0 to 4096 [ 1414.780947][ T9286] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. 11:23:27 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20008d, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1414.915282][ T9296] loop1: detected capacity change from 0 to 768 11:23:27 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200030, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) [ 1414.972424][ T9295] EXT4-fs error (device loop5): ext4_quota_enable:6805: comm syz-executor.5: Bad quota inode # 3 [ 1415.001238][ T9295] EXT4-fs warning (device loop5): ext4_enable_quotas:6842: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1415.060990][ T9295] EXT4-fs (loop5): mount failed [ 1415.068873][ T9296] EXT4-fs (loop1): bad geometry: block count 512 exceeds size of device (96 blocks) 11:23:28 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200060, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) [ 1415.164148][ T9301] loop0: detected capacity change from 0 to 4096 11:23:28 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f0000000000000100800000", 0x1f, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:23:28 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1415.238335][ T5127] I/O error, dev loop2, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1415.380779][ T9306] loop1: detected capacity change from 0 to 768 [ 1415.503527][ T9306] EXT4-fs (loop1): bad geometry: block count 512 exceeds size of device (96 blocks) [ 1415.511316][ T5513] I/O error, dev loop4, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1415.527083][ T9301] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback. 11:23:28 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2000fe, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) 11:23:28 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20000b, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1415.568099][ T5127] I/O error, dev loop2, sector 3968 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1415.605345][ T5127] Buffer I/O error on dev loop2, logical block 496, async page read 11:23:28 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:23:28 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200083, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) [ 1415.695730][ T9311] loop5: detected capacity change from 0 to 4096 [ 1415.814522][ T9314] loop2: detected capacity change from 0 to 4096 [ 1415.917352][ T9311] EXT4-fs warning (device loop5): ext4_enable_quotas:6842: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 1415.945628][ T9311] EXT4-fs (loop5): mount failed 11:23:29 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20008d, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) 11:23:29 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1416.263318][ T9314] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 1416.281691][ T5513] I/O error, dev loop4, sector 3968 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1416.296154][ T5150] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 11:23:29 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:23:29 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f0000000000000100800000", 0x1f, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1416.395305][ T5513] Buffer I/O error on dev loop4, logical block 496, async page read 11:23:29 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200018, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1416.588146][ T9330] loop0: detected capacity change from 0 to 4096 [ 1416.615245][ T9331] loop4: detected capacity change from 0 to 4096 [ 1416.790120][ T9333] loop3: detected capacity change from 0 to 4096 [ 1416.893332][ T9330] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback. [ 1417.017959][ T9331] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. [ 1417.094140][ T9333] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 1417.117831][ T9334] loop5: detected capacity change from 0 to 4096 [ 1417.217123][ T5127] Buffer I/O error on dev loop2, logical block 496, async page read 11:23:30 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200070, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) 11:23:30 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:23:30 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200300, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1417.423540][ T9334] EXT4-fs warning (device loop5): ext4_enable_quotas:6842: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 1417.433378][ T5127] Buffer I/O error on dev loop2, logical block 496, async page read [ 1417.445280][ T9334] EXT4-fs (loop5): mount failed 11:23:30 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2000fe, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) 11:23:30 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200030, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) 11:23:30 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f0000000000000100800000", 0x1f, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:23:30 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1417.804036][ T9351] loop5: detected capacity change from 0 to 4096 [ 1417.881182][ T9359] loop2: detected capacity change from 0 to 4096 [ 1418.189156][ T9362] loop1: detected capacity change from 0 to 4096 [ 1418.236958][ T9355] loop3: detected capacity change from 0 to 4096 11:23:31 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200300, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) 11:23:31 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200500, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1418.526372][ T9359] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 1418.599210][ T9370] loop4: detected capacity change from 0 to 4097 [ 1418.630185][ T9351] EXT4-fs warning (device loop5): ext4_enable_quotas:6842: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 1418.648106][ T9351] EXT4-fs (loop5): mount failed 11:23:31 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:23:31 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400", 0x2e, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:23:31 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200066, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1418.774494][ T9355] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 1418.776727][ T9362] EXT4-fs warning (device loop1): ext4_enable_quotas:6842: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 1418.798383][ T9362] EXT4-fs (loop1): mount failed [ 1418.958344][ T9372] loop0: detected capacity change from 0 to 4098 [ 1419.071512][ T9370] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. 11:23:32 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2000fe, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) [ 1419.188602][ T9372] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback. 11:23:32 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400", 0x2e, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:23:32 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200600, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) 11:23:32 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200500, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) [ 1419.330125][ T5338] blk_print_req_error: 8 callbacks suppressed [ 1419.330142][ T5338] I/O error, dev loop5, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1419.460996][ T9382] loop5: detected capacity change from 0 to 4096 11:23:32 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:23:32 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200083, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1419.789818][ T9389] loop1: detected capacity change from 0 to 4096 [ 1419.796409][ T9382] EXT4-fs error (device loop5): ext4_ext_check_inode:497: inode #3: comm syz-executor.5: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) 11:23:32 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200197, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) [ 1419.856768][ T9382] EXT4-fs error (device loop5): ext4_quota_enable:6805: comm syz-executor.5: Bad quota inode # 3 [ 1419.879064][ T9382] EXT4-fs warning (device loop5): ext4_enable_quotas:6842: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 1419.932319][ T9382] EXT4-fs (loop5): mount failed [ 1419.981915][ T5127] I/O error, dev loop2, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 11:23:32 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400", 0x2e, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:23:33 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20008d, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1420.092952][ T9389] EXT4-fs warning (device loop1): ext4_enable_quotas:6842: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 1420.176842][ T9389] EXT4-fs (loop1): mount failed [ 1420.200295][ T9403] loop2: detected capacity change from 0 to 4096 [ 1420.293810][ T9399] loop3: detected capacity change from 0 to 4096 11:23:33 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200600, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) [ 1420.493371][ T9403] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 1420.537919][ T5150] I/O error, dev loop1, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 11:23:33 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {0x0, 0x0, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1420.721786][ T9399] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. 11:23:33 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000", 0x36, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:23:33 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2000fe, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) 11:23:33 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2002eb, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) [ 1420.765450][ T5513] I/O error, dev loop4, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1420.775322][ T5215] I/O error, dev loop0, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1420.861000][ T9415] loop1: detected capacity change from 0 to 4096 [ 1420.996381][ T9415] EXT4-fs warning (device loop1): ext4_enable_quotas:6842: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 1421.007480][ T9419] loop5: detected capacity change from 0 to 4096 [ 1421.017501][ T9415] EXT4-fs (loop1): mount failed [ 1421.125261][ T9413] loop0: detected capacity change from 0 to 4099 [ 1421.446481][ T9419] EXT4-fs error (device loop5): ext4_ext_check_inode:497: inode #3: comm syz-executor.5: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 1421.471931][ T9413] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback. [ 1421.476772][ T9419] EXT4-fs error (device loop5): ext4_quota_enable:6805: comm syz-executor.5: Bad quota inode # 3 [ 1421.496623][ T9419] EXT4-fs warning (device loop5): ext4_enable_quotas:6842: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. 11:23:34 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200700, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) 11:23:34 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200700, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) 11:23:34 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {0x0, 0x0, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:23:34 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200300, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) [ 1421.630177][ T9419] EXT4-fs (loop5): mount failed [ 1421.647638][ T5514] I/O error, dev loop3, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 11:23:34 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000", 0x36, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1421.718774][ T9429] loop2: detected capacity change from 0 to 4096 [ 1421.838264][ T9431] loop4: detected capacity change from 0 to 4099 [ 1421.944851][ T9432] loop1: detected capacity change from 0 to 4096 11:23:35 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000", 0x36, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:23:35 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200b00, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) 11:23:35 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:23:35 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x201800, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) 11:23:36 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1424.329333][ T1236] ieee802154 phy0 wpan0: encryption failed: -22 [ 1424.333541][ T9432] EXT4-fs warning (device loop1): ext4_enable_quotas:6842: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 1424.335724][ T1236] ieee802154 phy1 wpan1: encryption failed: -22 [ 1424.350231][ T5338] I/O error, dev loop5, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1424.368553][ T9432] EXT4-fs (loop1): mount failed [ 1424.373415][ T9431] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. [ 1424.374963][ T9439] loop3: detected capacity change from 0 to 4097 11:23:37 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:23:37 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x201f00, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) 11:23:37 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200b00, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) 11:23:37 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20035e, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) 11:23:37 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200300, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) 11:23:37 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {0x0, 0x0, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1424.451393][ T9429] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 1424.629624][ T9460] loop5: detected capacity change from 0 to 4096 [ 1424.736252][ T5513] I/O error, dev loop1, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 11:23:37 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200380, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) 11:23:37 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900), 0x0, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:23:37 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x202000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1424.894896][ T9460] EXT4-fs error (device loop5): ext4_ext_check_inode:497: inode #3: comm syz-executor.5: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 1424.997130][ T9460] EXT4-fs error (device loop5): ext4_quota_enable:6805: comm syz-executor.5: Bad quota inode # 3 [ 1425.022650][ T9460] EXT4-fs warning (device loop5): ext4_enable_quotas:6842: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 1425.105668][ T5150] I/O error, dev loop4, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1425.107070][ T9460] EXT4-fs (loop5): mount failed [ 1425.225262][ T9473] loop0: detected capacity change from 0 to 4112 [ 1425.230743][ T9476] loop3: detected capacity change from 0 to 4097 11:23:38 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x201800, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) [ 1425.422641][ T9477] loop1: detected capacity change from 0 to 4096 11:23:38 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000000002000000", 0x3c, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1425.523494][ T9471] loop2: detected capacity change from 0 to 4097 [ 1425.618011][ T9473] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback. [ 1425.627183][ T9476] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 1425.714051][ T9485] loop4: detected capacity change from 0 to 4108 [ 1425.839287][ T9477] EXT4-fs warning (device loop1): ext4_enable_quotas:6842: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 1425.845486][ T9477] EXT4-fs (loop1): mount failed 11:23:38 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20039d, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) 11:23:38 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x203000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) 11:23:38 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900), 0x0, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1426.010043][ T9485] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. [ 1426.036794][ T9471] EXT4-fs: failed to create workqueue [ 1426.042219][ T9471] EXT4-fs (loop2): mount failed [ 1426.079816][ T9489] loop5: detected capacity change from 0 to 4096 11:23:39 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200500, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1426.246342][ T9489] EXT4-fs error (device loop5): ext4_ext_check_inode:497: inode #3: comm syz-executor.5: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 1426.296037][ T9489] EXT4-fs error (device loop5): ext4_quota_enable:6805: comm syz-executor.5: Bad quota inode # 3 [ 1426.304429][ T9494] loop1: detected capacity change from 0 to 4096 11:23:39 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x201f00, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) [ 1426.336627][ T9489] EXT4-fs warning (device loop5): ext4_enable_quotas:6842: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 1426.399077][ T9489] EXT4-fs (loop5): mount failed 11:23:39 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000000002000000", 0x3c, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:23:39 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2003c0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) 11:23:39 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200600, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1426.644474][ T5514] I/O error, dev loop3, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1426.665262][ T5215] I/O error, dev loop0, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1426.676492][ T9494] EXT4-fs warning (device loop1): ext4_enable_quotas:6842: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 1426.751120][ T9494] EXT4-fs (loop1): mount failed 11:23:39 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x203f00, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1426.890118][ T9507] loop3: detected capacity change from 0 to 4097 [ 1426.981844][ T9509] loop2: detected capacity change from 0 to 4099 [ 1427.086031][ T5150] I/O error, dev loop4, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 11:23:40 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900), 0x0, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1427.276901][ T9515] loop0: detected capacity change from 0 to 4127 [ 1427.283813][ T9507] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 1427.463560][ T9509] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 1427.467660][ T9521] loop1: detected capacity change from 0 to 4096 11:23:40 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x202000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) [ 1427.578755][ T9517] loop5: detected capacity change from 0 to 4096 11:23:40 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200500, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) [ 1427.747604][ T9517] EXT4-fs error (device loop5): ext4_ext_check_inode:497: inode #3: comm syz-executor.5: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 1427.766933][ T9515] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback. [ 1427.798964][ T9517] EXT4-fs error (device loop5): ext4_quota_enable:6805: comm syz-executor.5: Bad quota inode # 3 [ 1427.808307][ T9527] loop4: detected capacity change from 0 to 4112 [ 1427.810786][ T9517] EXT4-fs warning (device loop5): ext4_enable_quotas:6842: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 1427.895158][ T9517] EXT4-fs (loop5): mount failed [ 1428.003721][ T9521] EXT4-fs warning (device loop1): ext4_enable_quotas:6842: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 1428.052763][ T9521] EXT4-fs (loop1): mount failed 11:23:41 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200700, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) 11:23:41 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x208300, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) 11:23:41 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000000002000000", 0x3c, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:23:41 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200600, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) [ 1428.252310][ T9527] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. 11:23:41 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x203000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) [ 1428.336371][ T5338] I/O error, dev loop5, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 11:23:41 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a09", 0xb, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1428.396864][ T5338] I/O error, dev loop5, sector 3968 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1428.431058][ T5338] Buffer I/O error on dev loop5, logical block 496, async page read [ 1428.444787][ T5514] I/O error, dev loop3, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 11:23:41 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200700, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) [ 1428.491032][ T5215] I/O error, dev loop0, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1428.535267][ T9535] loop5: detected capacity change from 0 to 4096 [ 1428.551925][ T9537] loop1: detected capacity change from 0 to 4096 [ 1428.632517][ T5127] Buffer I/O error on dev loop2, logical block 3968, async page read [ 1428.823804][ T9535] EXT4-fs error (device loop5): ext4_ext_check_inode:497: inode #3: comm syz-executor.5: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 1428.871428][ T9537] Quota error (device loop1): v2_read_file_info: Free block number too big (0 >= 0). [ 1428.882845][ T9537] EXT4-fs warning (device loop1): ext4_enable_quotas:6842: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 1428.923785][ T9537] EXT4-fs (loop1): mount failed [ 1428.960206][ T9535] EXT4-fs error (device loop5): ext4_quota_enable:6805: comm syz-executor.5: Bad quota inode # 3 11:23:42 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x203f00, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) 11:23:42 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200b00, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1429.057872][ T9535] EXT4-fs warning (device loop5): ext4_enable_quotas:6842: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 1429.097735][ T9535] EXT4-fs (loop5): mount failed 11:23:42 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x208d00, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) 11:23:42 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1429.175221][ T9549] loop3: detected capacity change from 0 to 4099 [ 1429.360567][ T5127] blk_print_req_error: 2 callbacks suppressed [ 1429.360588][ T5127] I/O error, dev loop2, sector 3969 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1429.380289][ T5215] I/O error, dev loop0, sector 3968 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1429.569941][ T5127] Buffer I/O error on dev loop2, logical block 3969, async page read [ 1429.589514][ T5127] I/O error, dev loop2, sector 3970 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1429.593588][ T9557] loop4: detected capacity change from 0 to 4127 11:23:42 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a09", 0xb, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:23:42 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1429.626256][ T5127] Buffer I/O error on dev loop2, logical block 3970, async page read [ 1429.645340][ T5215] Buffer I/O error on dev loop0, logical block 3968, async page read [ 1429.655964][ T9549] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. 11:23:42 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20feff, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) 11:23:42 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x201800, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) 11:23:42 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200900, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) [ 1429.746097][ T5215] I/O error, dev loop0, sector 3969 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1429.803854][ T9557] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. [ 1429.824600][ T5215] Buffer I/O error on dev loop0, logical block 3969, async page read [ 1429.833107][ T5215] I/O error, dev loop0, sector 3970 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1429.842607][ T5215] Buffer I/O error on dev loop0, logical block 3970, async page read [ 1429.851019][ T5215] I/O error, dev loop0, sector 3971 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1429.853284][ T5127] I/O error, dev loop2, sector 3971 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1429.860626][ T5215] Buffer I/O error on dev loop0, logical block 3971, async page read [ 1429.860698][ T5215] I/O error, dev loop0, sector 3972 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1429.860729][ T5215] Buffer I/O error on dev loop0, logical block 3972, async page read [ 1429.897177][ T5215] I/O error, dev loop0, sector 3973 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1429.906679][ T5215] Buffer I/O error on dev loop0, logical block 3973, async page read [ 1429.914824][ T5215] I/O error, dev loop0, sector 3974 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1429.960786][ T9568] loop5: detected capacity change from 0 to 4096 [ 1430.010145][ T9569] loop0: detected capacity change from 0 to 4223 11:23:43 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x208300, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) [ 1430.156446][ T9573] loop2: detected capacity change from 0 to 4108 [ 1430.251840][ T9570] loop1: detected capacity change from 0 to 4096 [ 1430.406351][ T9568] EXT4-fs error (device loop5): ext4_quota_enable:6805: comm syz-executor.5: Bad quota inode # 3 [ 1430.424226][ T9568] EXT4-fs warning (device loop5): ext4_enable_quotas:6842: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1430.454140][ T9568] EXT4-fs (loop5): mount failed [ 1430.548648][ T9573] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. 11:23:43 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1430.637240][ T9569] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback. 11:23:43 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20ff00, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) 11:23:43 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x201f00, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1430.804304][ T9570] EXT4-fs: failed to create workqueue 11:23:43 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x208d00, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) [ 1430.852801][ T9570] EXT4-fs (loop1): mount failed 11:23:43 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a09", 0xb, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:23:43 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1430.934600][ T9585] loop3: detected capacity change from 0 to 4100 [ 1431.045255][ T9587] loop4: detected capacity change from 0 to 4166 [ 1431.337120][ T9592] loop5: detected capacity change from 0 to 4096 11:23:44 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20fffe, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1431.550284][ T9587] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. [ 1431.565973][ T9585] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 1431.611268][ T9600] loop1: detected capacity change from 0 to 4096 [ 1431.666663][ T9592] EXT4-fs error (device loop5): __ext4_fill_super:5281: inode #2: comm syz-executor.5: iget: root inode unallocated [ 1431.688559][ T9592] EXT4-fs (loop5): get root inode failed [ 1431.697559][ T9592] EXT4-fs (loop5): mount failed 11:23:44 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20feff, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) [ 1431.795027][ T9600] Quota error (device loop1): v2_read_file_info: Free block number too big (0 >= 0). [ 1431.808164][ T9600] EXT4-fs warning (device loop1): ext4_enable_quotas:6842: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 1431.844146][ T9600] EXT4-fs (loop1): mount failed 11:23:44 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900", 0x10, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:23:44 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200a00, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) 11:23:44 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1431.958767][ T9606] loop0: detected capacity change from 0 to 4223 [ 1432.114630][ T9611] loop5: detected capacity change from 0 to 4096 11:23:45 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x202000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1432.236568][ T9611] EXT4-fs error (device loop5): __ext4_fill_super:5281: inode #2: comm syz-executor.5: iget: root inode unallocated [ 1432.281453][ T9611] EXT4-fs (loop5): get root inode failed [ 1432.282938][ T9617] loop2: detected capacity change from 0 to 4112 [ 1432.287630][ T9611] EXT4-fs (loop5): mount failed [ 1432.419639][ T9606] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback. 11:23:45 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x600000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1432.552571][ T9612] loop1: detected capacity change from 0 to 4096 [ 1432.591968][ T9617] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 1432.662776][ T9622] loop4: detected capacity change from 0 to 4223 [ 1432.760589][ T9624] loop3: detected capacity change from 0 to 4101 11:23:45 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x203000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) 11:23:45 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1433.136861][ T9622] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. [ 1433.147164][ T9624] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 1433.244278][ T9630] loop5: detected capacity change from 0 to 4096 11:23:46 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20ff00, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) 11:23:46 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200b00, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) [ 1433.290771][ T9612] EXT4-fs: failed to create workqueue [ 1433.330226][ T9612] EXT4-fs (loop1): mount failed [ 1433.344295][ T9630] EXT4-fs error (device loop5): __ext4_fill_super:5281: inode #2: comm syz-executor.5: iget: root inode unallocated [ 1433.371188][ T9630] EXT4-fs (loop5): get root inode failed [ 1433.378057][ T9630] EXT4-fs (loop5): mount failed 11:23:46 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900", 0x10, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1433.468904][ T5150] buffer_io_error: 28 callbacks suppressed [ 1433.468920][ T5150] Buffer I/O error on dev loop4, logical block 3968, async page read [ 1433.515546][ T5150] Buffer I/O error on dev loop4, logical block 3969, async page read [ 1433.516306][ T9637] loop0: detected capacity change from 0 to 12288 11:23:46 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:23:46 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20fffe, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) [ 1433.811084][ T9637] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback. [ 1433.815865][ T5127] Buffer I/O error on dev loop2, logical block 496, async page read 11:23:46 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8800000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1433.855035][ T5514] Buffer I/O error on dev loop3, logical block 3968, async page read [ 1433.889729][ T5150] Buffer I/O error on dev loop4, logical block 3970, async page read [ 1433.933661][ T5150] Buffer I/O error on dev loop4, logical block 3971, async page read [ 1433.998095][ T9644] loop4: detected capacity change from 0 to 4223 [ 1434.027882][ T5514] Buffer I/O error on dev loop3, logical block 3969, async page read [ 1434.056455][ T5514] Buffer I/O error on dev loop3, logical block 3970, async page read [ 1434.064914][ T5514] Buffer I/O error on dev loop3, logical block 3971, async page read [ 1434.073815][ T5514] Buffer I/O error on dev loop3, logical block 3972, async page read [ 1434.085238][ T9646] loop1: detected capacity change from 0 to 4096 11:23:47 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200c00, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) [ 1434.182727][ T9650] loop5: detected capacity change from 0 to 4096 [ 1434.353265][ T9648] loop2: detected capacity change from 0 to 4120 [ 1434.445247][ T9644] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. [ 1434.541555][ T9650] EXT4-fs error (device loop5): __ext4_fill_super:5281: inode #2: comm syz-executor.5: iget: root inode unallocated [ 1434.564568][ T9650] EXT4-fs (loop5): get root inode failed [ 1434.571406][ T9650] EXT4-fs (loop5): mount failed [ 1434.576638][ T9658] loop3: detected capacity change from 0 to 4102 [ 1434.618991][ T9646] Quota error (device loop1): v2_read_file_info: Free block number too big (0 >= 0). [ 1434.634378][ T9646] EXT4-fs warning (device loop1): ext4_enable_quotas:6842: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 1434.669458][ T9646] EXT4-fs (loop1): mount failed 11:23:47 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x600000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) [ 1434.776034][ T9648] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 1434.857211][ T9661] loop0: detected capacity change from 0 to 264192 11:23:47 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900", 0x10, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:23:47 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:23:47 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x203f00, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1435.060903][ T9658] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. 11:23:48 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200d00, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) [ 1435.158922][ T9661] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback. 11:23:48 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7fffffffffffffff, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1435.396357][ T9666] loop1: detected capacity change from 0 to 4096 [ 1435.475262][ T9671] loop5: detected capacity change from 0 to 4096 [ 1435.661663][ T9671] EXT4-fs error (device loop5): __ext4_fill_super:5281: inode #2: comm syz-executor.5: iget: root inode unallocated [ 1435.683282][ T9671] EXT4-fs (loop5): get root inode failed [ 1435.689851][ T9671] EXT4-fs (loop5): mount failed 11:23:48 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x206600, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) 11:23:48 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8800000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) [ 1435.807044][ T9678] loop3: detected capacity change from 0 to 4102 [ 1435.903280][ T9666] Quota error (device loop1): v2_read_file_info: Free block number too big (0 >= 0). [ 1435.913512][ T9666] EXT4-fs warning (device loop1): ext4_enable_quotas:6842: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 1435.937580][ T9666] EXT4-fs (loop1): mount failed [ 1436.073909][ T9685] loop4: detected capacity change from 0 to 264192 11:23:49 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900000000", 0x13, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1436.200659][ T9678] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 1436.306397][ T9683] loop2: detected capacity change from 0 to 4147 [ 1436.307211][ T9690] loop0: detected capacity change from 0 to 264192 11:23:49 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:23:49 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200f00, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) [ 1436.510419][ T9694] loop5: detected capacity change from 0 to 4096 11:23:49 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x208300, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1436.670353][ T9683] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 1436.675451][ T9685] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. 11:23:49 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7fffffffffffffff, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) [ 1436.782816][ T9694] EXT4-fs error (device loop5): __ext4_fill_super:5281: inode #2: comm syz-executor.5: iget: root inode unallocated [ 1436.888147][ T9694] EXT4-fs (loop5): get root inode failed [ 1436.894557][ T9694] EXT4-fs (loop5): mount failed [ 1436.958830][ T9690] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback. [ 1436.968055][ T5513] blk_print_req_error: 51 callbacks suppressed [ 1436.968075][ T5513] I/O error, dev loop1, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 11:23:49 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) 11:23:50 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1437.228704][ T9702] loop5: detected capacity change from 0 to 4096 [ 1437.298688][ T9704] loop3: detected capacity change from 0 to 4103 [ 1437.440464][ T9705] loop1: detected capacity change from 0 to 4096 [ 1437.585644][ T9710] loop4: detected capacity change from 0 to 264192 [ 1437.762900][ T9702] EXT4-fs error (device loop5): __ext4_fill_super:5281: inode #2: comm syz-executor.5: iget: root inode unallocated [ 1437.846502][ T9702] EXT4-fs (loop5): get root inode failed [ 1437.853642][ T9702] EXT4-fs (loop5): mount failed [ 1437.885730][ T9704] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 1437.948372][ T9715] loop2: detected capacity change from 0 to 4161 11:23:51 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200ff8, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) 11:23:51 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:23:51 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1438.077836][ T9705] EXT4-fs: failed to create workqueue [ 1438.082922][ T9710] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. [ 1438.083328][ T9705] EXT4-fs (loop1): mount failed 11:23:51 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900000000", 0x13, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:23:51 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) [ 1438.222598][ T9715] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 1438.257016][ T9722] loop5: detected capacity change from 0 to 4096 [ 1438.429057][ T9722] EXT4-fs error (device loop5): __ext4_fill_super:5281: inode #2: comm syz-executor.5: iget: root inode unallocated [ 1438.448860][ T9722] EXT4-fs (loop5): get root inode failed [ 1438.454721][ T9722] EXT4-fs (loop5): mount failed 11:23:51 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:23:51 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) 11:23:51 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x208d00, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1438.536785][ T5513] I/O error, dev loop1, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1438.609731][ T9728] loop3: detected capacity change from 0 to 4103 [ 1438.610184][ T5338] I/O error, dev loop5, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1438.745393][ T9731] loop0: detected capacity change from 0 to 4096 11:23:51 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf465", 0xf, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1438.945284][ T9739] loop1: detected capacity change from 0 to 4096 [ 1438.959514][ T9731] EXT4-fs error (device loop0): __ext4_fill_super:5281: inode #2: comm syz-executor.0: iget: root inode unallocated [ 1438.983496][ T9731] EXT4-fs (loop0): get root inode failed [ 1439.014975][ T9731] EXT4-fs (loop0): mount failed [ 1439.027742][ T9728] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. 11:23:52 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) [ 1439.282406][ T5338] I/O error, dev loop5, sector 3968 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1439.292696][ T5338] buffer_io_error: 3 callbacks suppressed [ 1439.292715][ T5338] Buffer I/O error on dev loop5, logical block 496, async page read [ 1439.308166][ T9739] Quota error (device loop1): v2_read_file_info: Free block number too big (0 >= 0). 11:23:52 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x201020, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) [ 1439.319796][ T9739] EXT4-fs warning (device loop1): ext4_enable_quotas:6842: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 1439.369776][ T9739] EXT4-fs (loop1): mount failed 11:23:52 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900000000", 0x13, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:23:52 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1439.482432][ T9749] loop4: detected capacity change from 0 to 4096 11:23:52 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf465", 0xf, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:23:52 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20feff, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1439.590579][ T9749] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1439.627691][ T9749] EXT4-fs (loop4): group descriptors corrupted! [ 1439.690611][ T5150] I/O error, dev loop1, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1439.723595][ T5127] I/O error, dev loop2, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 11:23:52 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) [ 1439.733769][ T5513] I/O error, dev loop4, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1439.789287][ T9755] loop5: detected capacity change from 0 to 4096 [ 1439.873534][ T9760] loop0: detected capacity change from 0 to 4096 11:23:52 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a090000000000", 0x14, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1440.056880][ T9758] loop2: detected capacity change from 0 to 4223 [ 1440.137165][ T9755] EXT4-fs error (device loop5): __ext4_fill_super:5281: inode #2: comm syz-executor.5: iget: root inode unallocated [ 1440.171086][ T9755] EXT4-fs (loop5): get root inode failed [ 1440.177278][ T9755] EXT4-fs (loop5): mount failed 11:23:53 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf465", 0xf, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1440.298165][ T5150] I/O error, dev loop1, sector 3968 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1440.308563][ T5150] Buffer I/O error on dev loop1, logical block 496, async page read [ 1440.335829][ T9765] loop4: detected capacity change from 0 to 4096 [ 1440.380138][ T9760] EXT4-fs warning (device loop0): ext4_enable_quotas:6842: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 1440.431104][ T9760] EXT4-fs (loop0): mount failed 11:23:53 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20ff00, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) 11:23:53 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000", 0x16, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:23:53 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a090000000000", 0x14, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:23:53 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1440.526549][ T9765] EXT4-fs error (device loop4): __ext4_fill_super:5281: inode #2: comm syz-executor.4: iget: root inode unallocated [ 1440.542999][ T9758] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 1440.545107][ T9765] EXT4-fs (loop4): get root inode failed [ 1440.559104][ T9765] EXT4-fs (loop4): mount failed [ 1440.710716][ T9776] loop3: detected capacity change from 0 to 4104 [ 1440.853080][ T9781] loop1: detected capacity change from 0 to 4096 [ 1440.935441][ T5513] I/O error, dev loop4, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1440.983058][ T9778] loop5: detected capacity change from 0 to 4096 [ 1441.003456][ T9782] loop0: detected capacity change from 0 to 4096 [ 1441.265184][ T9781] Quota error (device loop1): v2_read_file_info: Free block number too big (0 >= 0). [ 1441.275477][ T9781] EXT4-fs warning (device loop1): ext4_enable_quotas:6842: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 1441.306796][ T9778] EXT4-fs error (device loop5): __ext4_fill_super:5281: inode #2: comm syz-executor.5: iget: root inode unallocated [ 1441.322310][ T9778] EXT4-fs (loop5): get root inode failed [ 1441.329631][ T9778] EXT4-fs (loop5): mount failed [ 1441.422427][ T9782] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback. 11:23:54 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) 11:23:54 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000", 0x16, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:23:54 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) 11:23:54 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x201100, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) [ 1441.488077][ T9776] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 1441.640683][ T9781] EXT4-fs (loop1): mount failed [ 1441.642176][ T9796] loop4: detected capacity change from 0 to 4096 11:23:54 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20fffe, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) 11:23:54 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a090000000000", 0x14, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:23:54 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000", 0x16, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1441.814812][ T9796] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. [ 1441.897926][ T5338] I/O error, dev loop2, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1441.969163][ T9806] loop5: detected capacity change from 0 to 4096 [ 1441.997572][ T9801] loop1: detected capacity change from 0 to 4096 11:23:55 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) [ 1442.153409][ T9802] loop2: detected capacity change from 0 to 4223 11:23:55 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1442.296164][ T5215] I/O error, dev loop0, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1442.309206][ T5514] I/O error, dev loop3, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1442.440963][ T9802] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 1442.522605][ T9806] EXT4-fs error (device loop5): __ext4_fill_super:5281: inode #2: comm syz-executor.5: iget: root inode unallocated [ 1442.547700][ T9806] EXT4-fs (loop5): get root inode failed [ 1442.558091][ T9806] EXT4-fs (loop5): mount failed 11:23:55 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000", 0x1a, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1442.651831][ T9801] Quota error (device loop1): v2_read_file_info: Free block number too big (0 >= 0). [ 1442.668039][ T9801] EXT4-fs warning (device loop1): ext4_enable_quotas:6842: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 1442.704774][ T9801] EXT4-fs (loop1): mount failed 11:23:55 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:23:55 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x600000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) 11:23:55 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1442.775634][ T5513] I/O error, dev loop4, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1442.852869][ T9817] loop3: detected capacity change from 0 to 4104 11:23:55 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) [ 1442.904465][ T5513] I/O error, dev loop4, sector 3968 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 11:23:55 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1442.971091][ T5513] Buffer I/O error on dev loop4, logical block 496, async page read [ 1443.015691][ T5338] I/O error, dev loop5, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1443.172269][ T9826] loop0: detected capacity change from 0 to 4096 [ 1443.206899][ T9817] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. 11:23:56 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x201f00, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) 11:23:56 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000", 0x1a, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:23:56 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1443.312992][ T9833] loop4: detected capacity change from 0 to 4096 [ 1443.379625][ T5338] I/O error, dev loop2, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1443.536562][ T9826] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback. [ 1443.561686][ T9833] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. [ 1443.657424][ T9839] loop1: detected capacity change from 0 to 4096 [ 1443.711318][ T9836] loop5: detected capacity change from 0 to 4096 11:23:56 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8800000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) 11:23:56 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x12, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1443.820895][ T5338] I/O error, dev loop2, sector 3968 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1443.936348][ T9836] EXT4-fs error (device loop5): __ext4_fill_super:5281: inode #2: comm syz-executor.5: iget: root inode unallocated [ 1443.941800][ T9839] EXT4-fs warning (device loop1): ext4_enable_quotas:6842: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. 11:23:56 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) [ 1443.983514][ T9836] EXT4-fs (loop5): get root inode failed [ 1443.991252][ T9836] EXT4-fs (loop5): mount failed [ 1444.007388][ T5338] Buffer I/O error on dev loop2, logical block 3968, async page read [ 1444.023459][ T9839] EXT4-fs (loop1): mount failed 11:23:56 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1444.077181][ T5514] I/O error, dev loop3, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 11:23:57 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x202000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) [ 1444.168971][ T9847] loop2: detected capacity change from 0 to 264192 [ 1444.178280][ T5338] I/O error, dev loop2, sector 3969 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 11:23:57 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000", 0x1a, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1444.218699][ T5338] Buffer I/O error on dev loop2, logical block 3969, async page read 11:23:57 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1444.305471][ T5215] I/O error, dev loop0, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1444.513218][ T5514] Buffer I/O error on dev loop3, logical block 496, async page read [ 1444.523939][ T5215] Buffer I/O error on dev loop0, logical block 496, async page read [ 1444.545268][ T9858] loop5: detected capacity change from 0 to 4096 [ 1444.645660][ T9847] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 1444.710205][ T9863] loop1: detected capacity change from 0 to 4096 [ 1444.797966][ T9859] loop3: detected capacity change from 0 to 4112 [ 1444.885859][ T9865] loop4: detected capacity change from 0 to 4096 11:23:57 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x15, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) 11:23:57 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7fffffffffffffff, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1445.070723][ T9858] EXT4-fs error (device loop5): __ext4_fill_super:5281: inode #2: comm syz-executor.5: iget: root inode unallocated [ 1445.084593][ T9859] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 1445.089350][ T9858] EXT4-fs (loop5): get root inode failed [ 1445.100161][ T9858] EXT4-fs (loop5): mount failed [ 1445.185845][ T9863] EXT4-fs error (device loop1): ext4_quota_enable:6805: comm syz-executor.1: Bad quota inode # 3 [ 1445.221332][ T9875] loop0: detected capacity change from 0 to 131072 [ 1445.345223][ T9865] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. [ 1445.362194][ T9863] EXT4-fs warning (device loop1): ext4_enable_quotas:6842: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1445.400124][ T9863] EXT4-fs (loop1): mount failed 11:23:58 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) 11:23:58 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x202010, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) 11:23:58 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1445.564292][ T9875] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback. 11:23:58 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400", 0x1c, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:23:58 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x19, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1445.712647][ T5513] Buffer I/O error on dev loop4, logical block 496, async page read [ 1445.767073][ T9882] loop5: detected capacity change from 0 to 4096 [ 1445.835289][ T9883] loop2: detected capacity change from 0 to 264192 [ 1445.999233][ T9879] loop1: detected capacity change from 0 to 4096 [ 1446.142767][ T9882] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 1446.195728][ T9882] EXT4-fs (loop5): mount failed [ 1446.234330][ T9883] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 1446.422348][ T9879] EXT4-fs error (device loop1): ext4_quota_enable:6805: comm syz-executor.1: Bad quota inode # 3 11:23:59 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x202600, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) 11:23:59 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1446.502247][ T9879] EXT4-fs warning (device loop1): ext4_enable_quotas:6842: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1446.518660][ T9879] EXT4-fs (loop1): mount failed 11:23:59 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x12, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) 11:23:59 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1446.662311][ T5150] Buffer I/O error on dev loop1, logical block 496, async page read 11:23:59 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400", 0x1c, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1446.705190][ T9895] loop0: detected capacity change from 0 to 131072 [ 1446.905283][ T9902] loop4: detected capacity change from 0 to 4096 [ 1446.958832][ T9895] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback. 11:23:59 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:24:00 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x202f00, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) [ 1447.105523][ T9907] loop5: detected capacity change from 0 to 4096 11:24:00 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x1a, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1447.228169][ T9902] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. [ 1447.317577][ T5150] blk_print_req_error: 12 callbacks suppressed [ 1447.317598][ T5150] I/O error, dev loop1, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1447.354695][ T9907] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 1447.362700][ T9907] EXT4-fs (loop5): mount failed 11:24:00 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x15, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) [ 1447.422203][ T9914] loop1: detected capacity change from 0 to 4096 [ 1447.430412][ T9910] loop3: detected capacity change from 0 to 4119 [ 1447.662152][ T9910] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. 11:24:00 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x203f00, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) [ 1447.785617][ T9914] EXT4-fs error (device loop1): ext4_quota_enable:6805: comm syz-executor.1: Bad quota inode # 3 [ 1447.840929][ T9914] EXT4-fs warning (device loop1): ext4_enable_quotas:6842: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 11:24:00 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400", 0x1c, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1447.922134][ T9920] loop2: detected capacity change from 0 to 4096 [ 1447.924769][ T9914] EXT4-fs (loop1): mount failed [ 1447.990953][ T9920] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1448.020096][ T9920] EXT4-fs (loop2): group descriptors corrupted! [ 1448.037044][ T9922] loop0: detected capacity change from 0 to 131072 [ 1448.132642][ T9925] loop5: detected capacity change from 0 to 4096 [ 1448.279683][ T9925] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 1448.291014][ T9925] EXT4-fs (loop5): mount failed [ 1448.298687][ T9922] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback. 11:24:01 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x29, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1448.383040][ T5513] I/O error, dev loop4, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 11:24:01 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1448.485344][ T5127] I/O error, dev loop2, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 11:24:01 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) 11:24:01 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x19, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) 11:24:01 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1448.548710][ T5513] I/O error, dev loop4, sector 3968 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1448.615307][ T5513] Buffer I/O error on dev loop4, logical block 496, async page read [ 1448.695280][ T9934] loop3: detected capacity change from 0 to 4127 [ 1448.705207][ T9936] loop1: detected capacity change from 0 to 4096 [ 1448.899248][ T9938] loop0: detected capacity change from 0 to 131072 [ 1449.035896][ T9934] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 1449.112421][ T9936] EXT4-fs error (device loop1): ext4_quota_enable:6805: comm syz-executor.1: Bad quota inode # 3 [ 1449.156260][ T9936] EXT4-fs warning (device loop1): ext4_enable_quotas:6842: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1449.203370][ T9936] EXT4-fs (loop1): mount failed [ 1449.209886][ T9938] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback. [ 1449.296784][ T9950] loop4: detected capacity change from 0 to 131072 11:24:02 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x204000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) [ 1449.466346][ T9948] loop5: detected capacity change from 0 to 4096 11:24:02 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800), 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1449.623760][ T9952] loop2: detected capacity change from 0 to 4096 [ 1449.628625][ T9950] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. 11:24:02 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2b, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1449.725941][ T9952] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1449.763813][ T9952] EXT4-fs (loop2): group descriptors corrupted! 11:24:02 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x1a, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) 11:24:02 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x204600, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) [ 1449.875793][ T9948] EXT4-fs error (device loop5): __ext4_fill_super:5281: inode #2: comm syz-executor.5: iget: root inode unallocated [ 1449.898227][ T9948] EXT4-fs (loop5): get root inode failed [ 1449.903976][ T9948] EXT4-fs (loop5): mount failed 11:24:02 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) 11:24:02 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1449.937551][ T5338] I/O error, dev loop2, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1449.963145][ T5150] I/O error, dev loop1, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 11:24:02 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800), 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1449.992440][ T5127] I/O error, dev loop5, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1450.086345][ T5514] I/O error, dev loop3, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1450.179134][ T9965] loop1: detected capacity change from 0 to 4096 11:24:03 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x205e03, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) [ 1450.281476][ T9968] loop5: detected capacity change from 0 to 4096 [ 1450.358045][ T9966] loop2: detected capacity change from 0 to 4096 [ 1450.406396][ T9970] loop3: detected capacity change from 0 to 4143 [ 1450.543121][ T9972] loop4: detected capacity change from 0 to 131072 [ 1450.832346][ T9965] EXT4-fs error (device loop1): ext4_quota_enable:6805: comm syz-executor.1: Bad quota inode # 3 [ 1450.905254][ T9972] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. [ 1450.986363][ T9968] EXT4-fs error (device loop5): __ext4_fill_super:5281: inode #2: comm syz-executor.5: iget: root inode unallocated [ 1450.999964][ T9966] EXT4-fs: failed to create workqueue [ 1450.999982][ T9966] EXT4-fs (loop2): mount failed [ 1451.035624][ T9965] EXT4-fs warning (device loop1): ext4_enable_quotas:6842: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1451.050803][ T9965] EXT4-fs (loop1): mount failed [ 1451.058104][ T9968] EXT4-fs (loop5): get root inode failed [ 1451.064053][ T9968] EXT4-fs (loop5): mount failed 11:24:04 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:24:04 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1451.111980][ T9970] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. 11:24:04 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x30, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) 11:24:04 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x29, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) 11:24:04 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x206000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) 11:24:04 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800), 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1451.433899][ T9988] loop1: detected capacity change from 0 to 4096 11:24:04 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1451.647004][ T9990] loop5: detected capacity change from 0 to 4096 [ 1451.652213][ T5215] I/O error, dev loop0, sector 130944 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 11:24:04 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x33, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1451.885971][ T5514] I/O error, dev loop3, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 11:24:04 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2b, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) [ 1451.945834][ T9988] EXT4-fs error (device loop1): ext4_quota_enable:6805: comm syz-executor.1: Bad quota inode # 3 [ 1451.958494][ T9988] EXT4-fs warning (device loop1): ext4_enable_quotas:6842: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1451.988432][T10000] loop2: detected capacity change from 0 to 4096 [ 1452.032534][ T9988] EXT4-fs (loop1): mount failed [ 1452.167194][T10004] loop0: detected capacity change from 0 to 131072 11:24:05 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x207000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) [ 1452.258375][ T9990] EXT4-fs: failed to create workqueue [ 1452.263801][ T9990] EXT4-fs (loop5): mount failed 11:24:05 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1452.322516][T10000] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 1452.411017][T10007] loop4: detected capacity change from 0 to 131072 11:24:05 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f0000000000000100800000", 0x1f, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1452.537596][ T5514] I/O error, dev loop3, sector 3968 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1452.550417][ T5514] Buffer I/O error on dev loop3, logical block 3968, async page read [ 1452.584470][T10004] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback. 11:24:05 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1452.705385][T10007] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. [ 1452.742545][T10017] loop1: detected capacity change from 0 to 4096 [ 1452.763695][T10013] loop3: detected capacity change from 0 to 4152 [ 1452.902907][T10019] loop5: detected capacity change from 0 to 4096 [ 1452.994388][T10017] EXT4-fs warning (device loop1): ext4_enable_quotas:6842: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. 11:24:06 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x38, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1453.059019][T10019] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1453.064683][T10017] EXT4-fs (loop1): mount failed [ 1453.070695][T10019] EXT4-fs (loop5): group descriptors corrupted! 11:24:06 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x30, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) 11:24:06 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f0000000000000100800000", 0x1f, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1453.240226][ T5127] I/O error, dev loop5, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1453.264472][ T5513] I/O error, dev loop1, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 11:24:06 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1453.373649][T10013] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 1453.395769][T10025] loop1: detected capacity change from 0 to 4096 11:24:06 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x208003, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) [ 1453.611563][T10028] loop2: detected capacity change from 0 to 4096 [ 1453.712203][T10032] loop5: detected capacity change from 0 to 4096 [ 1453.855890][T10025] EXT4-fs warning (device loop1): ext4_enable_quotas:6842: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 1453.883352][T10032] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1453.894212][T10032] EXT4-fs (loop5): group descriptors corrupted! [ 1454.007092][T10025] EXT4-fs (loop1): mount failed 11:24:07 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f0000000000000100800000", 0x1f, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:24:07 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:24:07 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x33, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) 11:24:07 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400", 0x2e, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1454.217889][T10028] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 1454.247223][ T5513] I/O error, dev loop1, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1454.290089][ T5127] I/O error, dev loop5, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 11:24:07 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) 11:24:07 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x209701, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) [ 1454.354357][ T5150] I/O error, dev loop4, sector 130944 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1454.357093][ T5513] I/O error, dev loop1, sector 3968 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1454.481555][ T5127] I/O error, dev loop5, sector 3968 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 11:24:07 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {0x0, 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1454.618281][ T5514] I/O error, dev loop3, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1454.625314][ T5513] Buffer I/O error on dev loop1, logical block 496, async page read [ 1454.759434][ T5127] Buffer I/O error on dev loop5, logical block 496, async page read [ 1454.826672][T10051] loop3: detected capacity change from 0 to 4171 11:24:07 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3c, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) 11:24:07 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x38, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) 11:24:07 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400", 0x2e, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1454.954967][ T5513] I/O error, dev loop1, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1454.982113][T10053] loop5: detected capacity change from 0 to 4096 [ 1455.018101][ T5150] Buffer I/O error on dev loop4, logical block 16368, async page read [ 1455.122936][T10053] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1455.133058][T10053] EXT4-fs (loop5): group descriptors corrupted! [ 1455.181510][T10058] loop1: detected capacity change from 0 to 4096 11:24:08 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {0x0, 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1455.307243][T10062] loop0: detected capacity change from 0 to 131072 [ 1455.321250][T10051] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. 11:24:08 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x209d03, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) [ 1455.363521][T10057] loop4: detected capacity change from 0 to 131072 [ 1455.463355][T10062] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback. 11:24:08 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x58, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1455.571612][T10071] loop5: detected capacity change from 0 to 4096 [ 1455.613381][T10058] EXT4-fs error (device loop1): ext4_ext_check_inode:497: inode #3: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 1455.653003][T10058] EXT4-fs error (device loop1): ext4_quota_enable:6805: comm syz-executor.1: Bad quota inode # 3 [ 1455.698142][T10058] EXT4-fs warning (device loop1): ext4_enable_quotas:6842: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 1455.698938][T10071] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1455.699138][T10071] EXT4-fs (loop5): group descriptors corrupted! [ 1455.744708][T10058] EXT4-fs (loop1): mount failed [ 1455.820015][T10072] loop2: detected capacity change from 0 to 4096 [ 1455.844713][T10057] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. 11:24:08 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3c, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) 11:24:08 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400", 0x2e, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:24:09 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {0x0, 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1456.148340][T10072] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 1456.182664][T10079] loop5: detected capacity change from 0 to 4096 11:24:09 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1456.282001][T10079] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1456.316973][T10079] EXT4-fs (loop5): group descriptors corrupted! [ 1456.373004][T10081] loop1: detected capacity change from 0 to 4096 [ 1456.519894][T10085] loop0: detected capacity change from 0 to 131072 11:24:09 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20c003, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) [ 1456.766236][T10081] EXT4-fs error (device loop1): ext4_ext_check_inode:497: inode #3: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 1456.771360][T10085] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback. 11:24:09 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1456.800499][T10081] EXT4-fs error (device loop1): ext4_quota_enable:6805: comm syz-executor.1: Bad quota inode # 3 [ 1456.872641][T10081] EXT4-fs warning (device loop1): ext4_enable_quotas:6842: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. 11:24:09 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5c, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1456.909564][T10081] EXT4-fs (loop1): mount failed [ 1456.968368][T10092] loop3: detected capacity change from 0 to 4192 [ 1457.015296][T10094] loop4: detected capacity change from 0 to 131072 [ 1457.175254][T10096] loop2: detected capacity change from 0 to 4096 11:24:10 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000", 0x36, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1457.358438][T10094] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. [ 1457.409994][T10092] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 1457.474356][T10101] loop5: detected capacity change from 0 to 4096 [ 1457.699908][T10096] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 1457.707561][T10107] loop1: detected capacity change from 0 to 4096 [ 1457.766642][T10101] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1457.782140][T10101] EXT4-fs (loop5): group descriptors corrupted! [ 1457.801375][ T5215] blk_print_req_error: 6 callbacks suppressed [ 1457.801391][ T5215] I/O error, dev loop0, sector 130944 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 11:24:10 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x12, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) 11:24:10 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x58, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) 11:24:10 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20eb02, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) 11:24:10 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1457.889799][ T5215] I/O error, dev loop0, sector 130944 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1457.983933][T10111] loop0: detected capacity change from 0 to 131072 [ 1458.080976][T10107] EXT4-fs error (device loop1): ext4_ext_check_inode:497: inode #3: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 1458.102160][ T5215] Buffer I/O error on dev loop0, logical block 16368, async page read [ 1458.181034][T10113] loop5: detected capacity change from 0 to 4096 [ 1458.189786][T10107] EXT4-fs error (device loop1): ext4_quota_enable:6805: comm syz-executor.1: Bad quota inode # 3 [ 1458.290332][T10113] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1458.301862][T10113] EXT4-fs (loop5): group descriptors corrupted! [ 1458.305717][T10111] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback. 11:24:11 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5d, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1458.349769][T10107] EXT4-fs warning (device loop1): ext4_enable_quotas:6842: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 1458.383204][T10107] EXT4-fs (loop1): mount failed 11:24:11 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:24:11 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000", 0x36, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:24:11 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x15, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) 11:24:11 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5c, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) 11:24:11 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20f80f, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) 11:24:11 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00", 0x10, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:24:11 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000", 0x36, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1458.953829][T10130] loop2: detected capacity change from 0 to 131072 11:24:11 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5d, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) 11:24:11 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x61, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1459.090864][ T5150] I/O error, dev loop4, sector 130944 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1459.111584][ T5513] I/O error, dev loop1, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1459.120245][T10139] loop3: detected capacity change from 0 to 4220 [ 1459.287248][T10137] loop5: detected capacity change from 0 to 4096 [ 1459.385001][T10130] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 1459.421705][T10137] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (61595!=0) 11:24:12 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1459.434346][T10137] EXT4-fs (loop5): group descriptors corrupted! [ 1459.442803][T10146] loop0: detected capacity change from 0 to 131072 [ 1459.643394][T10145] loop4: detected capacity change from 0 to 131072 [ 1459.714362][T10139] EXT4-fs: failed to create workqueue [ 1459.719865][T10139] EXT4-fs (loop3): mount failed [ 1459.791712][T10152] loop1: detected capacity change from 0 to 4096 11:24:12 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x19, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) 11:24:12 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20feff, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) 11:24:12 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00", 0x10, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1459.939524][T10145] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. [ 1460.020521][T10152] EXT4-fs error (device loop1): ext4_ext_check_inode:497: inode #3: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 1460.045612][T10152] EXT4-fs error (device loop1): ext4_quota_enable:6805: comm syz-executor.1: Bad quota inode # 3 [ 1460.065141][T10152] EXT4-fs warning (device loop1): ext4_enable_quotas:6842: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 1460.113018][T10146] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback. [ 1460.116061][T10152] EXT4-fs (loop1): mount failed 11:24:13 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xfe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) 11:24:13 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x61, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) [ 1460.220611][T10161] loop5: detected capacity change from 0 to 4096 11:24:13 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1460.332970][ T5513] I/O error, dev loop1, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1460.357692][T10161] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (61595!=0) [ 1460.367374][T10161] EXT4-fs (loop5): group descriptors corrupted! 11:24:13 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20ff01, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) [ 1460.433714][ T5338] I/O error, dev loop2, sector 130944 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1460.501192][ T5514] I/O error, dev loop3, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 11:24:13 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x1a, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1460.638737][T10166] loop3: detected capacity change from 0 to 4223 [ 1460.887743][T10166] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 1460.921187][T10168] loop1: detected capacity change from 0 to 4096 11:24:13 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x29, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) 11:24:14 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20ff0f, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) 11:24:14 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00", 0x10, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1461.195345][ T5338] I/O error, dev loop2, sector 130944 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1461.204957][ T5338] Buffer I/O error on dev loop2, logical block 16368, async page read 11:24:14 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x1500, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1461.304113][T10168] EXT4-fs error (device loop1): ext4_ext_check_inode:497: inode #3: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 1461.375425][T10168] EXT4-fs error (device loop1): ext4_quota_enable:6805: comm syz-executor.1: Bad quota inode # 3 [ 1461.388247][T10168] EXT4-fs warning (device loop1): ext4_enable_quotas:6842: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 1461.463226][T10168] EXT4-fs (loop1): mount failed 11:24:14 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2b, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) 11:24:14 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xfe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) [ 1461.579937][T10182] loop5: detected capacity change from 0 to 4096 [ 1461.646940][T10182] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (61595!=0) [ 1461.659479][T10182] EXT4-fs (loop5): group descriptors corrupted! [ 1461.847756][T10186] loop2: detected capacity change from 0 to 131072 11:24:14 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:24:15 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x1500, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) [ 1462.475882][ T5150] I/O error, dev loop4, sector 130944 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 11:24:15 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000000002000000", 0x3c, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:24:15 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000", 0x18, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1462.529488][ T5514] I/O error, dev loop3, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1462.678521][T10205] loop1: detected capacity change from 0 to 4096 [ 1462.902258][T10186] EXT4-fs: error -4 creating inode table initialization thread [ 1462.910334][T10186] EXT4-fs (loop2): mount failed 11:24:15 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xfffe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) 11:24:16 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20fffe, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) 11:24:16 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x30, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1463.399001][T10203] loop4: detected capacity change from 0 to 264192 11:24:16 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xfffe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) [ 1463.431726][T10205] EXT4-fs error (device loop1): ext4_ext_check_inode:497: inode #3: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 1463.465109][T10203] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1463.474064][T10205] EXT4-fs error (device loop1): ext4_quota_enable:6805: comm syz-executor.1: Bad quota inode # 3 [ 1463.510280][T10205] EXT4-fs warning (device loop1): ext4_enable_quotas:6842: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 1463.522595][T10214] loop5: detected capacity change from 0 to 4096 [ 1463.525534][T10205] EXT4-fs (loop1): mount failed [ 1463.892340][T10214] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 1463.903868][T10214] EXT4-fs (loop5): group descriptors corrupted! 11:24:16 executing program 1: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af3010004000000000000000000000002000000", 0x3c, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:24:16 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000", 0x18, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) 11:24:16 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x33, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) 11:24:16 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x600000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) [ 1481.053571][T10222] loop0: detected capacity change from 0 to 264192 [ 1481.308678][ T5514] blk_print_req_error: 3 callbacks suppressed [ 1481.308699][ T5514] I/O error, dev loop3, sector 3968 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1481.329267][T10222] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1481.450097][ T5514] Buffer I/O error on dev loop3, logical block 3968, async page read 11:24:34 executing program 3: r0 = getpgid(0x0) sched_setattr(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) 11:24:34 executing program 4: getpgid(0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040), 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xfffffffe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000480)='net/packet\x00') syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) fchown(r1, 0x0, 0x0) [ 1481.498371][ T5514] I/O error, dev loop3, sector 3969 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1481.536020][ T5338] I/O error, dev loop2, sector 130944 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1481.557170][ T5150] I/O error, dev loop4, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1481.567296][ T5127] I/O error, dev loop5, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 11:24:34 executing program 0: r0 = getpgid(0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0x0, 0x7, 0x3, 0x0, 0x0, r0}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='ext4\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xfffffffe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000380), 0x2, 0x0) syz_open_procfs(r0, &(0x7f0000000480)='net/packet\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="fd080000000000000000000000a322002069388c54cd1b"], 0x2c}}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0), 0x802, 0x0) fchown(r2, 0x0, 0x0) [ 1481.619590][ T5514] Buffer I/O error on dev loop3, logical block 3969, async page read [ 1481.665542][T10234] loop2: detected capacity change from 0 to 131072 [ 1481.807740][T10232] loop5: detected capacity change from 0 to 4096 [ 1481.974143][ T5514] I/O error, dev loop3, sector 3970 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1482.063971][T10232] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 1482.076812][T10232] EXT4-fs (loop5): group descriptors corrupted! [ 1482.115307][ T5514] Buffer I/O error on dev loop3, logical block 3970, async page read [ 1482.123542][ T5514] I/O error, dev loop3, sector 3971 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 11:24:35 executing program 5: getpgid(0x0) sched_setattr(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x40040, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x1}, 0x14) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x89}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000", 0x18, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) socket$nl_generic(0x10, 0x3, 0x10) fchown(r0, 0x0, 0x0) [ 1482.277742][ T5514] Buffer I/O error on dev loop3, logical block 3971, async page read [ 1482.355055][ T5514] I/O error, dev loop3, sector 3972 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1587.135232][ C1] rcu: INFO: rcu_preempt self-detected stall on CPU [ 1587.141932][ C1] rcu: 1-...!: (1 GPs behind) idle=925/1/0x4000000000000000 softirq=133884/133900 fqs=12 [ 1587.153512][ C1] (t=10501 jiffies g=183381 q=479) [ 1587.158741][ C1] rcu: rcu_preempt kthread starved for 10478 jiffies! g183381 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0 [ 1587.170065][ C1] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 1587.180050][ C1] rcu: RCU grace-period kthread stack dump: [ 1587.185946][ C1] task:rcu_preempt state:R running task stack:28936 pid: 14 ppid: 2 flags:0x00004000 [ 1587.196744][ C1] Call Trace: [ 1587.200038][ C1] [ 1587.202985][ C1] __schedule+0xab2/0x4f00 [ 1587.207437][ C1] ? lockdep_hardirqs_on+0x79/0x100 [ 1587.212660][ C1] ? io_schedule_timeout+0x180/0x180 [ 1587.217973][ C1] ? debug_object_destroy+0x210/0x210 [ 1587.223450][ C1] schedule+0xd2/0x260 [ 1587.227544][ C1] schedule_timeout+0x14a/0x2a0 [ 1587.232419][ C1] ? usleep_range_state+0x1b0/0x1b0 [ 1587.237636][ C1] ? destroy_timer_on_stack+0x20/0x20 [ 1587.243090][ C1] ? mptcp_sk_clone+0x490/0x700 [ 1587.247972][ C1] ? _raw_spin_unlock_irqrestore+0x3d/0x70 [ 1587.253807][ C1] ? prepare_to_swait_event+0xee/0x470 [ 1587.259348][ C1] rcu_gp_fqs_loop+0x186/0x810 [ 1587.264148][ C1] ? force_qs_rnp+0x6f0/0x6f0 [ 1587.268869][ C1] ? rcu_gp_init+0x8f2/0x1280 [ 1587.273578][ C1] rcu_gp_kthread+0x1de/0x320 [ 1587.278292][ C1] ? rcu_gp_init+0x1280/0x1280 [ 1587.283084][ C1] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 1587.289356][ C1] ? __kthread_parkme+0x15f/0x220 [ 1587.294411][ C1] ? rcu_gp_init+0x1280/0x1280 [ 1587.299204][ C1] kthread+0x405/0x4f0 [ 1587.303297][ C1] ? set_kthread_struct+0x130/0x130 [ 1587.308521][ C1] ret_from_fork+0x1f/0x30 [ 1587.312967][ C1] [ 1587.316002][ C1] rcu: Stack dump where RCU GP kthread last ran: [ 1587.322333][ C1] Sending NMI from CPU 1 to CPUs 0: [ 1587.327557][ C0] NMI backtrace for cpu 0 [ 1587.327569][ C0] CPU: 0 PID: 10246 Comm: syz-executor.0 Not tainted 5.16.0-syzkaller #0 [ 1587.327593][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1587.327606][ C0] RIP: 0010:check_preemption_disabled+0x22/0x170 [ 1587.327637][ C0] Code: e9 23 ff ff ff cc cc cc 41 56 41 55 49 89 f5 41 54 55 48 89 fd 53 0f 1f 44 00 00 65 44 8b 25 bd 06 b8 76 65 8b 1d ae 5c b8 76 <81> e3 ff ff ff 7f 31 ff 89 de 0f 1f 44 00 00 85 db 74 11 0f 1f 44 [ 1587.327658][ C0] RSP: 0018:ffffc900000079e0 EFLAGS: 00000082 [ 1587.327676][ C0] RAX: 0000000000000001 RBX: 0000000080010002 RCX: ffffffff815be5b1 [ 1587.327691][ C0] RDX: fffffbfff1b269b3 RSI: ffffffff8a0520e0 RDI: ffffffff8a052120 [ 1587.327706][ C0] RBP: ffffffff8a052120 R08: 0000000000000000 R09: ffffffff8d934d97 [ 1587.327721][ C0] R10: fffffbfff1b269b2 R11: 0000000000000000 R12: 0000000000000000 [ 1587.327735][ C0] R13: ffffffff8a0520e0 R14: 00000000ffffffe4 R15: ffffc90000007b20 [ 1587.327750][ C0] FS: 00007ff907161700(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 [ 1587.327770][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1587.327785][ C0] CR2: 0000000020800010 CR3: 0000000077410000 CR4: 00000000003506f0 [ 1587.327799][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1587.327812][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1587.327826][ C0] Call Trace: [ 1587.327834][ C0] [ 1587.327841][ C0] rcu_is_watching+0xe/0xb0 [ 1587.327866][ C0] rcu_read_lock_sched_held+0x1c/0x70 [ 1587.327891][ C0] lock_release+0x522/0x720 [ 1587.327913][ C0] ? perf_event_output_forward+0x13f/0x280 [ 1587.328007][ C0] ? lock_downgrade+0x6e0/0x6e0 [ 1587.328029][ C0] ? perf_callchain+0x1c0/0x1c0 [ 1587.328052][ C0] perf_event_output_forward+0x161/0x280 [ 1587.328075][ C0] ? perf_prepare_sample+0x1e30/0x1e30 [ 1587.328099][ C0] ? lock_chain_count+0x20/0x20 [ 1587.328122][ C0] ? mark_lock+0xef/0x17b0 [ 1587.328145][ C0] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 1587.328178][ C0] __perf_event_overflow+0x13c/0x3d0 [ 1587.328224][ C0] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 1587.328252][ C0] perf_swevent_hrtimer+0x37c/0x3f0 [ 1587.328280][ C0] ? __perf_event_overflow+0x3d0/0x3d0 [ 1587.328308][ C0] ? find_held_lock+0x2d/0x110 [ 1587.328330][ C0] ? __hrtimer_run_queues+0x51a/0xe50 [ 1587.328354][ C0] ? lock_downgrade+0x6e0/0x6e0 [ 1587.328378][ C0] ? __perf_event_overflow+0x3d0/0x3d0 [ 1587.328405][ C0] __hrtimer_run_queues+0x1c0/0xe50 [ 1587.328430][ C0] ? hrtimer_sleeper_start_expires+0x80/0x80 [ 1587.328454][ C0] ? ktime_get_update_offsets_now+0x3eb/0x5c0 [ 1587.328481][ C0] hrtimer_interrupt+0x31c/0x790 [ 1587.328505][ C0] __sysvec_apic_timer_interrupt+0x146/0x530 [ 1587.328553][ C0] sysvec_apic_timer_interrupt+0x8e/0xc0 [ 1587.328577][ C0] [ 1587.328583][ C0] [ 1587.328589][ C0] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1587.328619][ C0] RIP: 0010:syscall_enter_from_user_mode+0x2b/0x70 [ 1587.328645][ C0] Code: 54 49 89 f4 55 48 89 fd 48 8b 7c 24 10 e8 ed f5 ff ff eb 27 eb 2b e8 d4 34 33 f8 e8 0f 33 33 f8 fb 65 48 8b 04 25 00 70 02 00 <48> 8b 70 08 40 f6 c6 3f 75 19 4c 89 e0 5d 41 5c c3 eb 1b 0f 0b eb [ 1587.328666][ C0] RSP: 0018:ffffc90010dbff28 EFLAGS: 00000202 [ 1587.328683][ C0] RAX: ffff888023ab8280 RBX: 0000000000000000 RCX: 1ffffffff1b26441 [ 1587.328697][ C0] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1587.328711][ C0] RBP: ffffc90010dbff58 R08: 0000000000000001 R09: 0000000000000001 [ 1587.328725][ C0] R10: ffffffff817d4128 R11: 0000000000000000 R12: 0000000000000012 [ 1587.328739][ C0] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1587.328753][ C0] ? trace_hardirqs_on+0x38/0x1c0 [ 1587.328775][ C0] ? syscall_enter_from_user_mode+0x21/0x70 [ 1587.328800][ C0] do_syscall_64+0x16/0xb0 [ 1587.328826][ C0] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1587.328853][ C0] RIP: 0033:0x7ff90879efb7 [ 1587.328869][ C0] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1587.328890][ C0] RSP: 002b:00007ff907160f00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1587.328909][ C0] RAX: ffffffffffffffda RBX: 00007ff9088359c8 RCX: 00007ff90879efb7 [ 1587.328924][ C0] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 1587.328938][ C0] RBP: 00000000fffffffe R08: 0000000000000000 R09: 0000000000000000 [ 1587.328951][ C0] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 1587.328965][ C0] R13: 0000000000000004 R14: 0000000020931790 R15: 00000000000620e6 [ 1587.328981][ C0] [ 1587.329554][ C1] NMI backtrace for cpu 1 [ 1587.786891][ C1] CPU: 1 PID: 10236 Comm: syz-executor.4 Not tainted 5.16.0-syzkaller #0 [ 1587.795319][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1587.805391][ C1] Call Trace: [ 1587.808683][ C1] [ 1587.811538][ C1] dump_stack_lvl+0xcd/0x134 [ 1587.816154][ C1] nmi_cpu_backtrace.cold+0x47/0x144 [ 1587.821521][ C1] ? lapic_can_unplug_cpu+0x80/0x80 [ 1587.826741][ C1] nmi_trigger_cpumask_backtrace+0x1b3/0x230 [ 1587.832746][ C1] rcu_dump_cpu_stacks+0x25e/0x3f0 [ 1587.837885][ C1] rcu_sched_clock_irq.cold+0x5c/0x759 [ 1587.843394][ C1] ? find_held_lock+0x2d/0x110 [ 1587.848176][ C1] ? rcutree_dead_cpu+0x30/0x30 [ 1587.853050][ C1] ? tick_sched_timer+0x2b/0x2d0 [ 1587.858073][ C1] ? lock_downgrade+0x6e0/0x6e0 [ 1587.862968][ C1] update_process_times+0x16d/0x200 [ 1587.868196][ C1] tick_sched_handle+0x9b/0x180 [ 1587.873074][ C1] tick_sched_timer+0x1b0/0x2d0 [ 1587.877957][ C1] ? get_cpu_iowait_time_us+0x3f0/0x3f0 [ 1587.883538][ C1] __hrtimer_run_queues+0x1c0/0xe50 [ 1587.888763][ C1] ? hrtimer_sleeper_start_expires+0x80/0x80 [ 1587.894768][ C1] ? ktime_get_update_offsets_now+0x3eb/0x5c0 [ 1587.900899][ C1] hrtimer_interrupt+0x31c/0x790 [ 1587.905860][ C1] __sysvec_apic_timer_interrupt+0x146/0x530 [ 1587.911865][ C1] sysvec_apic_timer_interrupt+0x8e/0xc0 [ 1587.917543][ C1] [ 1587.920482][ C1] [ 1587.923683][ C1] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1587.929692][ C1] RIP: 0010:syscall_enter_from_user_mode+0x2b/0x70 [ 1587.936221][ C1] Code: 54 49 89 f4 55 48 89 fd 48 8b 7c 24 10 e8 ed f5 ff ff eb 27 eb 2b e8 d4 34 33 f8 e8 0f 33 33 f8 fb 65 48 8b 04 25 00 70 02 00 <48> 8b 70 08 40 f6 c6 3f 75 19 4c 89 e0 5d 41 5c c3 eb 1b 0f 0b eb [ 1587.955854][ C1] RSP: 0018:ffffc90011037f28 EFLAGS: 00000202 [ 1587.961944][ C1] RAX: ffff888030f7e0c0 RBX: 0000000000000000 RCX: 1ffffffff1b26441 [ 1587.969933][ C1] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1587.977922][ C1] RBP: ffffc90011037f58 R08: 0000000000000001 R09: 0000000000000001 [ 1587.985917][ C1] R10: ffffffff817d4128 R11: 0000000000000000 R12: 0000000000000012 [ 1587.993909][ C1] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1588.001899][ C1] ? trace_hardirqs_on+0x38/0x1c0 [ 1588.006959][ C1] ? syscall_enter_from_user_mode+0x21/0x70 [ 1588.012888][ C1] do_syscall_64+0x16/0xb0 [ 1588.017334][ C1] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1588.023263][ C1] RIP: 0033:0x7fe5f5111fb7 [ 1588.027706][ C1] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 1588.047332][ C1] RSP: 002b:00007fe5f3ad3f00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1588.055773][ C1] RAX: ffffffffffffffda RBX: 00007fe5f51a89c8 RCX: 00007fe5f5111fb7 [ 1588.063767][ C1] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 1588.071752][ C1] RBP: 00000000fffffffe R08: 0000000000000000 R09: 0000000000000000 [ 1588.079750][ C1] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 1588.087757][ C1] R13: 0000000000000004 R14: 00000000208f8dc0 R15: 000000000005fb28 [ 1588.095754][ C1]