={0x7, 0x19}, 0x0, 0x0, 0xfffffffc, 0x7, 0xfffffffffffffffc, 0x0, 0x1}, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = fcntl$getown(0xffffffffffffffff, 0x9) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140), 0x101402, 0x0) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3ff, 0x80000001}, 0x0, 0x0, 0x7, 0x8, 0x0, 0x6, 0x8, 0x0, 0x8}, r1, 0xffffffffffffffff, r2, 0x9) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) 01:18:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x19}, 0x0, 0x0, 0xfffffffc, 0x7, 0xfffffffffffffffc, 0x0, 0x1}, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = fcntl$getown(0xffffffffffffffff, 0x9) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140), 0x101402, 0x0) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3ff, 0x80000001}, 0x0, 0x0, 0x7, 0x8, 0x0, 0x6, 0x8, 0x0, 0x8}, r1, 0xffffffffffffffff, r2, 0x9) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) 01:18:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a0900", 0x10, 0x6800}], 0x0, &(0x7f0000013c00)) 01:18:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x19}, 0x0, 0x0, 0xfffffffc, 0x7, 0xfffffffffffffffc, 0x0, 0x1}, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = fcntl$getown(0xffffffffffffffff, 0x9) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140), 0x101402, 0x0) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3ff, 0x80000001}, 0x0, 0x0, 0x7, 0x8, 0x0, 0x6, 0x8, 0x0, 0x8}, r1, 0xffffffffffffffff, r2, 0x9) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000200)={0x2, 0x80, 0x1f, 0x9, 0x3, 0x3, 0x0, 0x0, 0x4008, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x19, 0x4}, 0x0, 0x8, 0x0, 0x0, 0x8, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4}) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x1, 0xa, 0x0, 0x0, 0x7, 0x40000, 0xe, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x9, 0x2, @perf_config_ext={0x6, 0x3}, 0x2b00, 0x4, 0x7f, 0x5, 0xffffffffffffffd9, 0x8, 0x6, 0x0, 0x4, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r2, 0xa) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) r3 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000002980)=ANY=[@ANYRES32, @ANYRESOCT, @ANYRESOCT=r3, @ANYRES32, @ANYBLOB="5053b84c392fca05d5b53dafc4afda4c1bd51e4959cb29ebe53110bed55ccb3557a008a5d98e6ee1178ef1a7d6c3d6b1cf2acbebb77e643e4d849ae005c4dca4939809775598978e46809e8be4f1e8cd4e231175bb162a5b005dede1a9494115a5a2c0465f565b3cc9239f5b0f85cb855cc060f5c75169", @ANYRES32, @ANYBLOB="e6b58188db7d2232a33a6c0004b0437886ae3c7572f5004fec12ae12e9879b4a1b0621566bbdb18b6ba98ee81d7631bbf0a44ee4b801439b005c56c4b25be8c7d909000000000000000a3861d114a56d4526548e484ab60f456404fda279727ab33a4ec6783ad52f1e469f60c68a8d67d93b3a43419c83c241e5310ca4c943bd89648805329d2c7c24c4afc2cc02bce1a2012179591bfb51a1992445478d79b65578e1cf07d76ed44f963202806899f1536f5ef6715e52ce34f9cf95209647b1c90ea6fb9f763316accb76489595a91b423775441faffcc1000000000000000000f1716c0d1dd7923f0f7c0857704a2d3e8c1fec34b7236ba68dd24fa8507b604abebe6fb94ed59209cf5e551b1320acb3a5f2e90713a0c4a273e89687c2de04c310e4dd101108f4bf7c403495d46f0c6da6adb500ceb4bff7bb08747afb1636de154ddb15fbbd46b481a8f3e0558d19222ff365593c71a9a855f24b53ec7fb1640949f056b378c84f9ddd4658f53e4f02ad28cd6bf85e428bcc314a1e64d5eeeb9dd5950f1f666e97f9e9f36c50c8ea2e29f2fac2", @ANYBLOB="cb28fdbc32a16c5278f2ef61febeb70e9778ad9edd2388f79914d99175645eb694cbe83ee060810f7c93bf584b2226a0b3b0efeb74979cf7e2a51f925986555e5669410399c5347099f452804bd9bf755ca23a09aa999976d5cf2b1b15e0f7db49536771b74af2c61781600d40efccfddf43a18bc9006cbebe06ad600a2e053b47339f0a4e31fcd385725e99071252256fcdf0da4e5572777ff5429dc96d19f9ec72d18ee9ed97a94661842a1def3dd48632ad5695ba6ca1033d1c274ef208431048437073d86459986bfb6e197dae089afd4bffdb0a1db064b968", @ANYRES64], 0x290) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000640)=0x7) sendto$inet(r3, &(0x7f0000000180)="6d629d3b8bd1e9c3808810ddd9f1fc7ce5f13ee06019afb3a46e544755bd6b0b72d222f7582acf4ddbd95132c94b31fa4ddd20a21882c184e402cc232ce8fcb3c06a81eb210832278f55eb8786238d500fb197c33fe44752", 0x58, 0x20002851, 0x0, 0x0) write$vga_arbiter(r2, &(0x7f0000000400)=@unlock_all, 0xb) shutdown(r0, 0x1) recvmsg(r0, &(0x7f0000001440)={0x0, 0x9, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) [ 589.839731][ T7572] EXT4-fs warning (device loop3): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 589.895746][ T7572] EXT4-fs (loop3): mount failed [ 589.957271][ T7586] loop5: detected capacity change from 0 to 512 [ 589.989677][ T7590] loop4: detected capacity change from 0 to 512 [ 590.004884][ T7586] EXT4-fs (loop5): 1 orphan inode deleted [ 590.010781][ T7586] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 590.035611][ T7586] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1368/file0 supports timestamps until 2038 (0x7fffffff) [ 590.063369][ T7590] EXT4-fs error (device loop4): ext4_fill_super:4822: inode #2: comm syz-executor.4: iget: root inode unallocated [ 590.075647][ T7590] EXT4-fs (loop4): get root inode failed [ 590.081342][ T7590] EXT4-fs (loop4): mount failed 01:18:45 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x0) (fail_nth: 1) 01:18:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {0x0, 0x0, 0x11100}], 0x0, &(0x7f0000013c00)) 01:18:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x19}, 0x0, 0x0, 0xfffffffc, 0x7, 0xfffffffffffffffc, 0x0, 0x1}, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = fcntl$getown(0xffffffffffffffff, 0x9) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140), 0x101402, 0x0) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3ff, 0x80000001}, 0x0, 0x0, 0x7, 0x8, 0x0, 0x6, 0x8, 0x0, 0x8}, r1, 0xffffffffffffffff, r2, 0x9) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) 01:18:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000800000003f000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:18:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a0900", 0x10, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f0000", 0x16, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:18:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a0900", 0x10, 0x6800}], 0x0, &(0x7f0000013c00)) 01:18:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x19}, 0x0, 0x0, 0xfffffffc, 0x7, 0xfffffffffffffffc, 0x0, 0x1}, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = fcntl$getown(0xffffffffffffffff, 0x9) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140), 0x101402, 0x0) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3ff, 0x80000001}, 0x0, 0x0, 0x7, 0x8, 0x0, 0x6, 0x8, 0x0, 0x8}, r1, 0xffffffffffffffff, r2, 0x9) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) 01:18:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) (fail_nth: 1) [ 590.190951][ T7602] loop3: detected capacity change from 0 to 512 [ 590.192933][ T7605] loop4: detected capacity change from 0 to 512 [ 590.207210][ T7607] loop5: detected capacity change from 0 to 512 [ 590.236568][ T7611] FAULT_INJECTION: forcing a failure. [ 590.236568][ T7611] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 590.249849][ T7611] CPU: 0 PID: 7611 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 590.258531][ T7611] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 590.268617][ T7611] Call Trace: [ 590.271882][ T7611] [ 590.274796][ T7611] dump_stack_lvl+0xd6/0x122 [ 590.279392][ T7611] dump_stack+0x11/0x1b [ 590.283571][ T7611] should_fail+0x23c/0x250 [ 590.287971][ T7611] __alloc_pages+0x102/0x330 [ 590.292550][ T7611] alloc_pages+0x382/0x3d0 [ 590.296957][ T7611] skb_page_frag_refill+0x9a/0x1b0 [ 590.302130][ T7611] tun_build_skb+0xda/0x7d0 [ 590.306624][ T7611] tun_get_user+0x58b/0x1e20 [ 590.311197][ T7611] ? kstrtouint_from_user+0x13c/0x170 [ 590.316692][ T7611] ? __rcu_read_unlock+0x5c/0x290 [ 590.321713][ T7611] tun_chr_write_iter+0x161/0x200 [ 590.326743][ T7611] vfs_write+0x7f5/0x950 [ 590.331020][ T7611] ksys_write+0xd9/0x190 [ 590.335252][ T7611] __x64_sys_write+0x3e/0x50 [ 590.339832][ T7611] do_syscall_64+0x44/0xd0 [ 590.344240][ T7611] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 590.350253][ T7611] RIP: 0033:0x7faadb9369af [ 590.354843][ T7611] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 590.375054][ T7611] RSP: 002b:00007faadaafa130 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 590.383459][ T7611] RAX: ffffffffffffffda RBX: 00007faadba96f60 RCX: 00007faadb9369af [ 590.391419][ T7611] RDX: 000000000000009e RSI: 0000000020003a40 RDI: 00000000000000c8 [ 590.399381][ T7611] RBP: 00007faadaafa1d0 R08: 0000000000000000 R09: 0000000000000000 [ 590.407377][ T7611] R10: 000000000000009e R11: 0000000000000293 R12: 0000000000000001 [ 590.415334][ T7611] R13: 00007ffc1242bb7f R14: 00007faadaafa300 R15: 0000000000022000 [ 590.423383][ T7611] 01:18:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x19}, 0x0, 0x0, 0xfffffffc, 0x7, 0xfffffffffffffffc, 0x0, 0x1}, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140), 0x101402, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) [ 590.438105][ T7605] EXT4-fs error (device loop4): ext4_fill_super:4822: inode #2: comm syz-executor.4: iget: root inode unallocated [ 590.440284][ T7613] FAULT_INJECTION: forcing a failure. [ 590.440284][ T7613] name failslab, interval 1, probability 0, space 0, times 0 [ 590.462902][ T7613] CPU: 0 PID: 7613 Comm: syz-executor.1 Not tainted 5.16.0-rc4-syzkaller #0 [ 590.465893][ T7607] EXT4-fs (loop5): 1 orphan inode deleted [ 590.471640][ T7613] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 01:18:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) (fail_nth: 2) [ 590.471654][ T7613] Call Trace: [ 590.471661][ T7613] [ 590.471668][ T7613] dump_stack_lvl+0xd6/0x122 [ 590.471694][ T7613] dump_stack+0x11/0x1b [ 590.477441][ T7607] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 590.487908][ T7613] should_fail+0x23c/0x250 [ 590.487934][ T7613] ? audit_log_start+0x351/0x6b0 [ 590.498925][ T7605] EXT4-fs (loop4): get root inode failed [ 590.502811][ T7613] __should_failslab+0x81/0x90 [ 590.502840][ T7613] should_failslab+0x5/0x20 01:18:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000fe000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) [ 590.513780][ T7605] EXT4-fs (loop4): mount failed [ 590.518155][ T7613] kmem_cache_alloc+0x4f/0x320 [ 590.523546][ T7607] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1369/file0 supports timestamps until 2038 (0x7fffffff) [ 590.528712][ T7613] ? __rcu_read_unlock+0x5c/0x290 [ 590.528737][ T7613] audit_log_start+0x351/0x6b0 [ 590.554203][ T7602] EXT4-fs error (device loop3): ext4_quota_enable:6323: comm syz-executor.3: Bad quota inode # 3 [ 590.561822][ T7613] audit_seccomp+0x47/0x120 [ 590.561854][ T7613] ? __rcu_read_unlock+0x5c/0x290 [ 590.561872][ T7613] __seccomp_filter+0x515/0xe40 [ 590.567263][ T7602] EXT4-fs warning (device loop3): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 590.571666][ T7613] ? proc_fail_nth_write+0x127/0x150 [ 590.571692][ T7613] ? preempt_count_add+0x41/0x90 [ 590.571716][ T7613] ? vfs_write+0x667/0x950 [ 590.571741][ T7613] __secure_computing+0xfb/0x190 [ 590.583198][ T7602] EXT4-fs (loop3): mount failed 01:18:46 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x0) (fail_nth: 2) [ 590.586741][ T7613] syscall_trace_enter+0x120/0x2b0 [ 590.586812][ T7613] ? exit_to_user_mode_prepare+0x6a/0x190 [ 590.593091][ T7626] FAULT_INJECTION: forcing a failure. [ 590.593091][ T7626] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 590.596680][ T7613] syscall_enter_from_user_mode+0x1c/0x20 [ 590.664563][ T7613] do_syscall_64+0x25/0xd0 [ 590.664587][ T7613] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 590.664607][ T7613] RIP: 0033:0x7febc7e7ce99 01:18:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) (fail_nth: 3) 01:18:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {0x0, 0x0, 0x11100}], 0x0, &(0x7f0000013c00)) 01:18:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a0900", 0x10, 0x6800}, {0x0, 0x0, 0x11080}], 0x0, &(0x7f0000013c00)) [ 590.664694][ T7613] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 590.664707][ T7613] RSP: 002b:00007febc6ff3168 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 01:18:46 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x0) (fail_nth: 3) [ 590.664747][ T7613] RAX: ffffffffffffffda RBX: 00007febc7f8ff60 RCX: 00007febc7e7ce99 [ 590.664757][ T7613] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 590.664767][ T7613] RBP: 00007febc6ff31d0 R08: 0000000000000000 R09: 0000000000000000 [ 590.664776][ T7613] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 590.664786][ T7613] R13: 00007fffd5df4edf R14: 00007febc6ff3300 R15: 0000000000022000 [ 590.664798][ T7613] [ 590.664804][ T7626] CPU: 1 PID: 7626 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 590.664833][ T7626] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 590.664843][ T7626] Call Trace: [ 590.664848][ T7626] [ 590.664852][ T7626] dump_stack_lvl+0xd6/0x122 [ 590.664873][ T7626] dump_stack+0x11/0x1b [ 590.664945][ T7626] should_fail+0x23c/0x250 [ 590.664962][ T7626] should_fail_usercopy+0x16/0x20 [ 590.664979][ T7626] copy_page_from_iter+0x1e9/0x510 01:18:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000002000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000002000400000000000800030000000af301000400000000000000000000000100000020000000000000000000000000000000000000000000000000000000000000000000000000000000c6d15a57000000000000000000000000000000000000000000000000ed8100001a040000d8f4655fd8f4655fd8f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000ec07159c000000000000000000000000000000000000000000000000ffa1000026000000d8f4655fd8f4655fd8f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3034363634343935392f66696c65302f66696c65300000000000000000000000000000000000000000000011b29fd4000000000000000000000000000000000000000000000000ed81", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:18:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x19}, 0x0, 0x0, 0xfffffffc, 0x7, 0xfffffffffffffffc, 0x0, 0x1}, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) [ 590.665005][ T7626] tun_build_skb+0x120/0x7d0 [ 590.665027][ T7626] tun_get_user+0x58b/0x1e20 [ 590.665045][ T7626] ? kstrtouint_from_user+0x13c/0x170 [ 590.665063][ T7626] ? __rcu_read_unlock+0x5c/0x290 [ 590.665148][ T7626] tun_chr_write_iter+0x161/0x200 [ 590.665166][ T7626] vfs_write+0x7f5/0x950 [ 590.665221][ T7626] ksys_write+0xd9/0x190 [ 590.665242][ T7626] __x64_sys_write+0x3e/0x50 [ 590.665343][ T7626] do_syscall_64+0x44/0xd0 [ 590.665363][ T7626] entry_SYSCALL_64_after_hwframe+0x44/0xae 01:18:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x19}, 0x0, 0x0, 0xfffffffc, 0x7, 0xfffffffffffffffc, 0x0, 0x1}, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) 01:18:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x19}, 0x0, 0x0, 0xfffffffc, 0x7, 0xfffffffffffffffc, 0x0, 0x1}, 0x0, 0x7, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) 01:18:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x19}, 0x0, 0x0, 0xfffffffc, 0x7, 0xfffffffffffffffc, 0x0, 0x1}, 0x0, 0x7, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) [ 590.665383][ T7626] RIP: 0033:0x7faadb9369af [ 590.665403][ T7626] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 590.665478][ T7626] RSP: 002b:00007faadaafa130 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 590.665495][ T7626] RAX: ffffffffffffffda RBX: 00007faadba96f60 RCX: 00007faadb9369af [ 590.665507][ T7626] RDX: 000000000000009e RSI: 0000000020003a40 RDI: 00000000000000c8 01:18:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x19}, 0x0, 0x0, 0xfffffffc, 0x7, 0xfffffffffffffffc, 0x0, 0x1}, 0x0, 0x7, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) 01:18:46 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) 01:18:46 executing program 2: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) [ 590.665519][ T7626] RBP: 00007faadaafa1d0 R08: 0000000000000000 R09: 0000000000000000 [ 590.665532][ T7626] R10: 000000000000009e R11: 0000000000000293 R12: 0000000000000001 [ 590.665600][ T7626] R13: 00007ffc1242bb7f R14: 00007faadaafa300 R15: 0000000000022000 [ 590.665616][ T7626] [ 590.742654][ T7632] loop5: detected capacity change from 0 to 512 [ 590.754337][ T7634] loop4: detected capacity change from 0 to 512 [ 590.756604][ T7629] FAULT_INJECTION: forcing a failure. [ 590.756604][ T7629] name failslab, interval 1, probability 0, space 0, times 0 [ 590.756648][ T7629] CPU: 1 PID: 7629 Comm: syz-executor.1 Not tainted 5.16.0-rc4-syzkaller #0 [ 590.756673][ T7629] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 590.756685][ T7629] Call Trace: [ 590.756692][ T7629] [ 590.756698][ T7629] dump_stack_lvl+0xd6/0x122 [ 590.756784][ T7629] dump_stack+0x11/0x1b [ 590.756802][ T7629] should_fail+0x23c/0x250 [ 590.756945][ T7629] __should_failslab+0x81/0x90 [ 590.756968][ T7629] should_failslab+0x5/0x20 [ 590.756989][ T7629] kmem_cache_alloc_node+0x61/0x2d0 [ 590.757010][ T7629] ? should_fail+0xd6/0x250 [ 590.757025][ T7629] ? __alloc_skb+0xf0/0x450 [ 590.757128][ T7629] __alloc_skb+0xf0/0x450 [ 590.757154][ T7629] audit_log_start+0x36d/0x6b0 [ 590.757173][ T7629] audit_seccomp+0x47/0x120 [ 590.757199][ T7629] ? __rcu_read_unlock+0x5c/0x290 [ 590.757218][ T7629] __seccomp_filter+0x515/0xe40 [ 590.757242][ T7629] ? proc_fail_nth_write+0x127/0x150 [ 590.757309][ T7629] ? preempt_count_add+0x41/0x90 [ 590.757384][ T7629] ? vfs_write+0x667/0x950 [ 590.757407][ T7629] __secure_computing+0xfb/0x190 [ 590.757430][ T7629] syscall_trace_enter+0x120/0x2b0 [ 590.757461][ T7629] ? exit_to_user_mode_prepare+0x6a/0x190 [ 590.757487][ T7629] syscall_enter_from_user_mode+0x1c/0x20 [ 590.757512][ T7629] do_syscall_64+0x25/0xd0 [ 590.757623][ T7629] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 590.757646][ T7629] RIP: 0033:0x7febc7e7ce99 [ 590.757661][ T7629] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 590.757757][ T7629] RSP: 002b:00007febc6ff3168 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 590.757778][ T7629] RAX: ffffffffffffffda RBX: 00007febc7f8ff60 RCX: 00007febc7e7ce99 [ 590.757792][ T7629] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 590.757804][ T7629] RBP: 00007febc6ff31d0 R08: 0000000000000000 R09: 0000000000000000 [ 590.757816][ T7629] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 590.757828][ T7629] R13: 00007fffd5df4edf R14: 00007febc6ff3300 R15: 0000000000022000 [ 590.757848][ T7629] [ 590.758204][ T7636] loop3: detected capacity change from 0 to 512 [ 590.776959][ T7634] EXT4-fs error (device loop4): ext4_fill_super:4822: inode #2: comm syz-executor.4: iget: root inode unallocated [ 590.795227][ T7631] FAULT_INJECTION: forcing a failure. [ 590.795227][ T7631] name failslab, interval 1, probability 0, space 0, times 0 [ 590.808907][ T7632] EXT4-fs (loop5): 1 orphan inode deleted [ 590.811777][ T7631] CPU: 0 PID: 7631 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 590.811799][ T7631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 590.811810][ T7631] Call Trace: [ 590.811816][ T7631] [ 590.811822][ T7631] dump_stack_lvl+0xd6/0x122 [ 590.820543][ T7632] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 590.830566][ T7631] dump_stack+0x11/0x1b [ 590.830593][ T7631] should_fail+0x23c/0x250 [ 590.834689][ T7636] EXT4-fs error (device loop3): ext4_quota_enable:6323: comm syz-executor.3: Bad quota inode # 3 [ 590.836782][ T7631] ? build_skb+0x33/0x280 [ 590.841497][ T7636] EXT4-fs warning (device loop3): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 590.845536][ T7631] __should_failslab+0x81/0x90 [ 590.850195][ T7636] EXT4-fs (loop3): mount failed [ 590.855024][ T7631] should_failslab+0x5/0x20 [ 590.860391][ T7632] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1370/file0 supports timestamps until 2038 (0x7fffffff) [ 590.864765][ T7631] kmem_cache_alloc+0x4f/0x320 [ 590.864791][ T7631] ? build_skb+0x22/0x280 [ 590.869772][ T7634] EXT4-fs (loop4): get root inode failed [ 590.874728][ T7631] build_skb+0x33/0x280 [ 590.874757][ T7631] tun_build_skb+0x34c/0x7d0 [ 590.879777][ T7634] EXT4-fs (loop4): mount failed [ 590.884784][ T7631] tun_get_user+0x58b/0x1e20 [ 591.391422][ T7631] ? kstrtouint_from_user+0x13c/0x170 [ 591.396852][ T7631] ? __rcu_read_unlock+0x5c/0x290 [ 591.402014][ T7631] tun_chr_write_iter+0x161/0x200 [ 591.407017][ T7631] vfs_write+0x7f5/0x950 [ 591.411269][ T7631] ksys_write+0xd9/0x190 [ 591.415581][ T7631] __x64_sys_write+0x3e/0x50 [ 591.420163][ T7631] do_syscall_64+0x44/0xd0 [ 591.424567][ T7631] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 591.430461][ T7631] RIP: 0033:0x7faadb9369af [ 591.434941][ T7631] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 591.454549][ T7631] RSP: 002b:00007faadaafa130 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 01:18:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) (fail_nth: 4) [ 591.463193][ T7631] RAX: ffffffffffffffda RBX: 00007faadba96f60 RCX: 00007faadb9369af [ 591.471218][ T7631] RDX: 000000000000009e RSI: 0000000020003a40 RDI: 00000000000000c8 [ 591.479226][ T7631] RBP: 00007faadaafa1d0 R08: 0000000000000000 R09: 0000000000000000 [ 591.487181][ T7631] R10: 000000000000009e R11: 0000000000000293 R12: 0000000000000001 [ 591.495195][ T7631] R13: 00007ffc1242bb7f R14: 00007faadaafa300 R15: 0000000000022000 [ 591.503325][ T7631] [ 591.525268][ T7660] FAULT_INJECTION: forcing a failure. [ 591.525268][ T7660] name failslab, interval 1, probability 0, space 0, times 0 [ 591.531657][ T7662] FAULT_INJECTION: forcing a failure. [ 591.531657][ T7662] name failslab, interval 1, probability 0, space 0, times 0 [ 591.537999][ T7660] CPU: 1 PID: 7660 Comm: syz-executor.1 Not tainted 5.16.0-rc4-syzkaller #0 [ 591.559278][ T7660] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 591.569339][ T7660] Call Trace: [ 591.572603][ T7660] [ 591.575516][ T7660] dump_stack_lvl+0xd6/0x122 [ 591.580157][ T7660] dump_stack+0x11/0x1b [ 591.584298][ T7660] should_fail+0x23c/0x250 [ 591.588698][ T7660] __should_failslab+0x81/0x90 [ 591.593522][ T7660] should_failslab+0x5/0x20 [ 591.598068][ T7660] kmem_cache_alloc_node_trace+0x61/0x310 [ 591.603778][ T7660] ? __kmalloc_node_track_caller+0x30/0x40 [ 591.609573][ T7660] __kmalloc_node_track_caller+0x30/0x40 [ 591.615192][ T7660] ? audit_log_start+0x36d/0x6b0 [ 591.620143][ T7660] __alloc_skb+0x19d/0x450 [ 591.624626][ T7660] audit_log_start+0x36d/0x6b0 [ 591.629408][ T7660] audit_seccomp+0x47/0x120 [ 591.634111][ T7660] ? __rcu_read_unlock+0x5c/0x290 [ 591.639162][ T7660] __seccomp_filter+0x515/0xe40 [ 591.644004][ T7660] ? proc_fail_nth_write+0x127/0x150 [ 591.649307][ T7660] ? preempt_count_add+0x41/0x90 [ 591.654414][ T7660] ? vfs_write+0x667/0x950 [ 591.658997][ T7660] __secure_computing+0xfb/0x190 [ 591.663924][ T7660] syscall_trace_enter+0x120/0x2b0 [ 591.669036][ T7660] ? exit_to_user_mode_prepare+0x6a/0x190 [ 591.674761][ T7660] syscall_enter_from_user_mode+0x1c/0x20 [ 591.680482][ T7660] do_syscall_64+0x25/0xd0 [ 591.685042][ T7660] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 591.691080][ T7660] RIP: 0033:0x7febc7e7ce99 [ 591.695502][ T7660] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 591.715152][ T7660] RSP: 002b:00007febc6ff3168 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 591.723553][ T7660] RAX: ffffffffffffffda RBX: 00007febc7f8ff60 RCX: 00007febc7e7ce99 [ 591.731509][ T7660] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 591.739482][ T7660] RBP: 00007febc6ff31d0 R08: 0000000000000000 R09: 0000000000000000 [ 591.747439][ T7660] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 591.755395][ T7660] R13: 00007fffd5df4edf R14: 00007febc6ff3300 R15: 0000000000022000 [ 591.763370][ T7660] [ 591.766375][ T7662] CPU: 0 PID: 7662 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 591.775191][ T7662] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 591.785324][ T7662] Call Trace: [ 591.788591][ T7662] [ 591.791509][ T7662] dump_stack_lvl+0xd6/0x122 [ 591.796117][ T7662] dump_stack+0x11/0x1b [ 591.800259][ T7662] should_fail+0x23c/0x250 [ 591.804661][ T7662] ? __nf_conntrack_alloc+0xd0/0x280 [ 591.809939][ T7662] __should_failslab+0x81/0x90 [ 591.814731][ T7662] should_failslab+0x5/0x20 [ 591.819226][ T7662] kmem_cache_alloc+0x4f/0x320 [ 591.823978][ T7662] ? __rcu_read_unlock+0x45/0x290 [ 591.829021][ T7662] __nf_conntrack_alloc+0xd0/0x280 [ 591.834147][ T7662] init_conntrack+0x1da/0xb30 [ 591.838869][ T7662] resolve_normal_ct+0x502/0x610 [ 591.843798][ T7662] nf_conntrack_in+0x1c5/0x88f [ 591.848574][ T7662] ? ipv4_confirm+0x1c0/0x1c0 [ 591.853240][ T7662] ipv6_conntrack_in+0x19/0x20 [ 591.857992][ T7662] nf_hook_slow+0x72/0x170 [ 591.862394][ T7662] ipv6_rcv+0x11c/0x140 [ 591.866608][ T7662] ? tsan.module_ctor+0x10/0x10 [ 591.871452][ T7662] ? ip6_rcv_finish+0x260/0x260 [ 591.876295][ T7662] __netif_receive_skb+0x8b/0x1b0 [ 591.881390][ T7662] netif_receive_skb_internal+0x37/0x150 [ 591.887010][ T7662] netif_receive_skb+0x16/0x170 [ 591.891851][ T7662] tun_get_user+0x1cc6/0x1e20 [ 591.896598][ T7662] ? __rcu_read_unlock+0x5c/0x290 [ 591.901702][ T7662] tun_chr_write_iter+0x161/0x200 [ 591.906786][ T7662] vfs_write+0x7f5/0x950 [ 591.911064][ T7662] ksys_write+0xd9/0x190 [ 591.915371][ T7662] __x64_sys_write+0x3e/0x50 [ 591.919974][ T7662] do_syscall_64+0x44/0xd0 [ 591.924376][ T7662] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 591.930258][ T7662] RIP: 0033:0x7faadb9369af [ 591.934659][ T7662] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 591.954254][ T7662] RSP: 002b:00007faadaafa130 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 591.962766][ T7662] RAX: ffffffffffffffda RBX: 00007faadba96f60 RCX: 00007faadb9369af 01:18:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00), 0x0, 0x11100}], 0x0, &(0x7f0000013c00)) [ 591.970724][ T7662] RDX: 000000000000009e RSI: 0000000020003a40 RDI: 00000000000000c8 [ 591.978682][ T7662] RBP: 00007faadaafa1d0 R08: 0000000000000000 R09: 0000000000000000 [ 591.986702][ T7662] R10: 000000000000009e R11: 0000000000000293 R12: 0000000000000001 [ 591.994688][ T7662] R13: 00007ffc1242bb7f R14: 00007faadaafa300 R15: 0000000000022000 [ 592.002679][ T7662] 01:18:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a0900", 0x10, 0x6800}, {0x0, 0x0, 0x11080}], 0x0, &(0x7f0000013c00)) 01:18:47 executing program 2: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) [ 592.035559][ T7664] loop3: detected capacity change from 0 to 512 [ 592.060606][ T7670] loop4: detected capacity change from 0 to 512 [ 592.060632][ T7671] loop5: detected capacity change from 0 to 512 [ 592.084091][ T7670] EXT4-fs error (device loop4): ext4_fill_super:4822: inode #2: comm syz-executor.4: iget: root inode unallocated [ 592.096587][ T7670] EXT4-fs (loop4): get root inode failed [ 592.102722][ T7670] EXT4-fs (loop4): mount failed [ 592.113960][ T7664] EXT4-fs error (device loop3): ext4_quota_enable:6323: comm syz-executor.3: Bad quota inode # 3 [ 592.114949][ T7671] EXT4-fs (loop5): 1 orphan inode deleted 01:18:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000003000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:18:47 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x0) (fail_nth: 4) 01:18:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) (fail_nth: 5) 01:18:47 executing program 2: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) 01:18:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a0900", 0x10, 0x6800}, {0x0, 0x0, 0x11080}], 0x0, &(0x7f0000013c00)) [ 592.125942][ T7664] EXT4-fs warning (device loop3): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 592.130246][ T7671] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 592.146034][ T7664] EXT4-fs (loop3): mount failed [ 592.156672][ T7671] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1371/file0 supports timestamps until 2038 (0x7fffffff) [ 592.198436][ T7683] FAULT_INJECTION: forcing a failure. [ 592.198436][ T7683] name failslab, interval 1, probability 0, space 0, times 0 [ 592.211091][ T7683] CPU: 1 PID: 7683 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 592.219988][ T7683] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 592.220982][ T7685] FAULT_INJECTION: forcing a failure. [ 592.220982][ T7685] name failslab, interval 1, probability 0, space 0, times 0 [ 592.230044][ T7683] Call Trace: [ 592.230054][ T7683] [ 592.230062][ T7683] dump_stack_lvl+0xd6/0x122 [ 592.253446][ T7683] dump_stack+0x11/0x1b [ 592.257594][ T7683] should_fail+0x23c/0x250 [ 592.261997][ T7683] ? nf_ct_ext_add+0x145/0x1f0 [ 592.266760][ T7683] __should_failslab+0x81/0x90 [ 592.271546][ T7683] should_failslab+0x5/0x20 [ 592.276060][ T7683] __kmalloc_track_caller+0x6d/0x370 [ 592.281398][ T7683] krealloc+0x3f/0xa0 [ 592.285376][ T7683] nf_ct_ext_add+0x145/0x1f0 [ 592.289956][ T7683] init_conntrack+0x56f/0xb30 [ 592.294625][ T7683] resolve_normal_ct+0x502/0x610 [ 592.299571][ T7683] nf_conntrack_in+0x1c5/0x88f [ 592.304324][ T7683] ? ipv4_confirm+0x1c0/0x1c0 [ 592.308984][ T7683] ipv6_conntrack_in+0x19/0x20 [ 592.313732][ T7683] nf_hook_slow+0x72/0x170 [ 592.318137][ T7683] ipv6_rcv+0x11c/0x140 [ 592.322280][ T7683] ? tsan.module_ctor+0x10/0x10 [ 592.327119][ T7683] ? ip6_rcv_finish+0x260/0x260 [ 592.331969][ T7683] __netif_receive_skb+0x8b/0x1b0 [ 592.337006][ T7683] netif_receive_skb_internal+0x37/0x150 [ 592.342641][ T7683] netif_receive_skb+0x16/0x170 [ 592.347492][ T7683] tun_get_user+0x1cc6/0x1e20 [ 592.352224][ T7683] ? __rcu_read_unlock+0x5c/0x290 [ 592.357260][ T7683] tun_chr_write_iter+0x161/0x200 [ 592.362287][ T7683] vfs_write+0x7f5/0x950 [ 592.366595][ T7683] ksys_write+0xd9/0x190 [ 592.370888][ T7683] __x64_sys_write+0x3e/0x50 [ 592.375533][ T7683] do_syscall_64+0x44/0xd0 [ 592.379994][ T7683] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 592.385883][ T7683] RIP: 0033:0x7faadb9369af [ 592.390290][ T7683] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 592.409888][ T7683] RSP: 002b:00007faadaafa130 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 592.418292][ T7683] RAX: ffffffffffffffda RBX: 00007faadba96f60 RCX: 00007faadb9369af [ 592.426398][ T7683] RDX: 000000000000009e RSI: 0000000020003a40 RDI: 00000000000000c8 [ 592.434410][ T7683] RBP: 00007faadaafa1d0 R08: 0000000000000000 R09: 0000000000000000 [ 592.442364][ T7683] R10: 000000000000009e R11: 0000000000000293 R12: 0000000000000001 [ 592.450436][ T7683] R13: 00007ffc1242bb7f R14: 00007faadaafa300 R15: 0000000000022000 [ 592.458605][ T7683] [ 592.461612][ T7685] CPU: 0 PID: 7685 Comm: syz-executor.1 Not tainted 5.16.0-rc4-syzkaller #0 [ 592.467650][ T7687] loop4: detected capacity change from 0 to 512 [ 592.470377][ T7685] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 592.470390][ T7685] Call Trace: [ 592.470397][ T7685] [ 592.492892][ T7685] dump_stack_lvl+0xd6/0x122 01:18:48 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) 01:18:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00), 0x0, 0x11100}], 0x0, &(0x7f0000013c00)) 01:18:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) (fail_nth: 6) [ 592.497487][ T7685] dump_stack+0x11/0x1b [ 592.501647][ T7685] should_fail+0x23c/0x250 [ 592.506224][ T7685] ? sidtab_sid2str_get+0xb0/0x140 [ 592.511356][ T7685] __should_failslab+0x81/0x90 [ 592.516147][ T7685] should_failslab+0x5/0x20 [ 592.520656][ T7685] __kmalloc_track_caller+0x6d/0x370 [ 592.525985][ T7685] ? vsnprintf+0xe8f/0xed0 [ 592.530397][ T7685] kmemdup+0x21/0x50 [ 592.534290][ T7685] sidtab_sid2str_get+0xb0/0x140 [ 592.539233][ T7685] security_sid_to_context_core+0x1d0/0x2d0 01:18:48 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) 01:18:48 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) 01:18:48 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) [ 592.545234][ T7685] security_sid_to_context+0x2c/0x40 [ 592.550597][ T7685] selinux_secid_to_secctx+0x25/0x30 [ 592.556006][ T7685] security_secid_to_secctx+0x45/0xa0 [ 592.561414][ T7685] audit_log_task_context+0x91/0x1c0 [ 592.566705][ T7685] audit_log_task+0xfd/0x180 [ 592.571304][ T7685] audit_seccomp+0x64/0x120 [ 592.575821][ T7685] __seccomp_filter+0x515/0xe40 [ 592.580750][ T7685] ? proc_fail_nth_write+0x127/0x150 [ 592.586074][ T7685] ? preempt_count_add+0x41/0x90 [ 592.591092][ T7685] ? vfs_write+0x667/0x950 [ 592.595517][ T7685] __secure_computing+0xfb/0x190 01:18:48 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) [ 592.600481][ T7685] syscall_trace_enter+0x120/0x2b0 [ 592.600788][ T7696] loop3: detected capacity change from 0 to 512 [ 592.605669][ T7685] ? exit_to_user_mode_prepare+0x6a/0x190 [ 592.617609][ T7685] syscall_enter_from_user_mode+0x1c/0x20 [ 592.623347][ T7685] do_syscall_64+0x25/0xd0 [ 592.627688][ T7699] FAULT_INJECTION: forcing a failure. [ 592.627688][ T7699] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 592.627777][ T7685] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 592.646645][ T7685] RIP: 0033:0x7febc7e7ce99 [ 592.651066][ T7685] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 592.670743][ T7685] RSP: 002b:00007febc6ff3168 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 592.679204][ T7685] RAX: ffffffffffffffda RBX: 00007febc7f8ff60 RCX: 00007febc7e7ce99 [ 592.687273][ T7685] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 592.695254][ T7685] RBP: 00007febc6ff31d0 R08: 0000000000000000 R09: 0000000000000000 [ 592.703216][ T7685] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 592.711174][ T7685] R13: 00007fffd5df4edf R14: 00007febc6ff3300 R15: 0000000000022000 [ 592.719327][ T7685] [ 592.722332][ T7699] CPU: 1 PID: 7699 Comm: syz-executor.0 Not tainted 5.16.0-rc4-syzkaller #0 [ 592.731256][ T7699] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 592.741308][ T7699] Call Trace: [ 592.744587][ T7699] [ 592.747619][ T7699] dump_stack_lvl+0xd6/0x122 [ 592.752220][ T7699] dump_stack+0x11/0x1b [ 592.756360][ T7699] should_fail+0x23c/0x250 [ 592.760775][ T7699] should_fail_usercopy+0x16/0x20 [ 592.765828][ T7699] _copy_to_user+0x1c/0x90 [ 592.770277][ T7699] simple_read_from_buffer+0xab/0x120 [ 592.775663][ T7699] proc_fail_nth_read+0x10d/0x150 [ 592.780773][ T7699] ? proc_fault_inject_write+0x230/0x230 [ 592.786419][ T7699] vfs_read+0x1e6/0x750 [ 592.790564][ T7699] ? __fget_files+0x20d/0x220 [ 592.795239][ T7699] ksys_read+0xd9/0x190 [ 592.799393][ T7699] __x64_sys_read+0x3e/0x50 [ 592.803886][ T7699] do_syscall_64+0x44/0xd0 [ 592.808751][ T7699] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 592.814633][ T7699] RIP: 0033:0x7faadb936a4c [ 592.819148][ T7699] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 592.838927][ T7699] RSP: 002b:00007faadaafa160 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 592.847417][ T7699] RAX: ffffffffffffffda RBX: 00007faadba96f60 RCX: 00007faadb936a4c [ 592.855371][ T7699] RDX: 000000000000000f RSI: 00007faadaafa1e0 RDI: 0000000000000004 [ 592.863334][ T7699] RBP: 00007faadaafa1d0 R08: 0000000000000000 R09: 0000000000000000 [ 592.871287][ T7699] R10: 000000000000009e R11: 0000000000000246 R12: 0000000000000001 [ 592.879242][ T7699] R13: 00007ffc1242bb7f R14: 00007faadaafa300 R15: 0000000000022000 [ 592.887207][ T7699] [ 592.896681][ T7687] EXT4-fs error (device loop4): ext4_fill_super:4822: inode #2: comm syz-executor.4: iget: root inode unallocated [ 592.904444][ T7696] EXT4-fs error (device loop3): ext4_quota_enable:6323: comm syz-executor.3: Bad quota inode # 3 [ 592.913906][ T7687] EXT4-fs (loop4): get root inode failed [ 592.923741][ T7696] EXT4-fs warning (device loop3): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 592.925028][ T7687] EXT4-fs (loop4): mount failed [ 592.944807][ T7696] EXT4-fs (loop3): mount failed [ 592.957179][ T7709] loop5: detected capacity change from 0 to 512 [ 592.982032][ T7709] EXT4-fs (loop5): 1 orphan inode deleted [ 592.987794][ T7709] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 01:18:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000004000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:18:48 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) 01:18:48 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x0) (fail_nth: 5) 01:18:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a0900", 0x10, 0x6800}, {&(0x7f0000012e00), 0x0, 0x11080}], 0x0, &(0x7f0000013c00)) 01:18:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00), 0x0, 0x11100}], 0x0, &(0x7f0000013c00)) [ 592.998930][ T7709] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1372/file0 supports timestamps until 2038 (0x7fffffff) [ 593.046647][ T7719] loop4: detected capacity change from 0 to 512 01:18:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0xe, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:48 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) 01:18:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0xde, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 593.047402][ T7720] loop3: detected capacity change from 0 to 512 [ 593.067935][ T7721] FAULT_INJECTION: forcing a failure. [ 593.067935][ T7721] name failslab, interval 1, probability 0, space 0, times 0 [ 593.080611][ T7721] CPU: 0 PID: 7721 Comm: syz-executor.1 Not tainted 5.16.0-rc4-syzkaller #0 [ 593.089289][ T7721] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 593.099342][ T7721] Call Trace: [ 593.102615][ T7721] [ 593.105541][ T7721] dump_stack_lvl+0xd6/0x122 [ 593.110202][ T7721] dump_stack+0x11/0x1b [ 593.114355][ T7721] should_fail+0x23c/0x250 [ 593.118776][ T7721] ? audit_log_d_path+0x97/0x200 [ 593.123700][ T7721] __should_failslab+0x81/0x90 [ 593.128521][ T7721] should_failslab+0x5/0x20 [ 593.133054][ T7721] kmem_cache_alloc_trace+0x52/0x350 [ 593.138480][ T7721] audit_log_d_path+0x97/0x200 [ 593.143403][ T7721] audit_log_d_path_exe+0x3e/0x70 [ 593.148490][ T7721] audit_log_task+0x159/0x180 [ 593.153229][ T7721] audit_seccomp+0x64/0x120 [ 593.157718][ T7721] __seccomp_filter+0x515/0xe40 [ 593.162697][ T7721] ? proc_fail_nth_write+0x127/0x150 [ 593.167973][ T7721] ? preempt_count_add+0x41/0x90 [ 593.172909][ T7721] ? vfs_write+0x667/0x950 [ 593.177321][ T7721] __secure_computing+0xfb/0x190 [ 593.182332][ T7721] syscall_trace_enter+0x120/0x2b0 [ 593.187466][ T7721] ? exit_to_user_mode_prepare+0x6a/0x190 [ 593.193236][ T7721] syscall_enter_from_user_mode+0x1c/0x20 [ 593.198962][ T7721] do_syscall_64+0x25/0xd0 [ 593.203453][ T7721] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 593.209607][ T7721] RIP: 0033:0x7febc7e7ce99 [ 593.214009][ T7721] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 593.233943][ T7721] RSP: 002b:00007febc6ff3168 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 593.242711][ T7721] RAX: ffffffffffffffda RBX: 00007febc7f8ff60 RCX: 00007febc7e7ce99 [ 593.250702][ T7721] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 01:18:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:48 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) [ 593.258668][ T7721] RBP: 00007febc6ff31d0 R08: 0000000000000000 R09: 0000000000000000 [ 593.266720][ T7721] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 593.274723][ T7721] R13: 00007fffd5df4edf R14: 00007febc6ff3300 R15: 0000000000022000 [ 593.282681][ T7721] 01:18:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x20003ade, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 593.310539][ T7720] EXT4-fs error (device loop3): ext4_quota_enable:6323: comm syz-executor.3: Bad quota inode # 3 [ 593.327363][ T7720] EXT4-fs warning (device loop3): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 593.344086][ T7720] EXT4-fs (loop3): mount failed [ 593.351116][ T7737] loop5: detected capacity change from 0 to 512 [ 593.361824][ T7719] EXT4-fs error (device loop4): ext4_fill_super:4822: inode #2: comm syz-executor.4: iget: root inode unallocated [ 593.374229][ T7719] EXT4-fs (loop4): get root inode failed [ 593.379861][ T7719] EXT4-fs (loop4): mount failed [ 593.382542][ T7737] EXT4-fs (loop5): 1 orphan inode deleted [ 593.390503][ T7737] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 01:18:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000005000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:18:48 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) 01:18:48 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x0) (fail_nth: 6) 01:18:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x7ffff000, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c0000", 0x1f, 0x11100}], 0x0, &(0x7f0000013c00)) 01:18:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a0900", 0x10, 0x6800}, {&(0x7f0000012e00), 0x0, 0x11080}], 0x0, &(0x7f0000013c00)) [ 593.401807][ T7737] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1373/file0 supports timestamps until 2038 (0x7fffffff) 01:18:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0xfffffdef, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:49 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300), 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) [ 593.453618][ T7750] loop3: detected capacity change from 0 to 512 [ 593.465067][ T7752] loop4: detected capacity change from 0 to 512 [ 593.474504][ T7749] FAULT_INJECTION: forcing a failure. [ 593.474504][ T7749] name failslab, interval 1, probability 0, space 0, times 0 [ 593.487207][ T7749] CPU: 0 PID: 7749 Comm: syz-executor.1 Not tainted 5.16.0-rc4-syzkaller #0 [ 593.495917][ T7749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 593.506516][ T7749] Call Trace: [ 593.509794][ T7749] [ 593.512708][ T7749] dump_stack_lvl+0xd6/0x122 [ 593.517407][ T7749] dump_stack+0x11/0x1b [ 593.521547][ T7749] should_fail+0x23c/0x250 [ 593.525968][ T7749] ? audit_log_start+0x351/0x6b0 [ 593.530978][ T7749] __should_failslab+0x81/0x90 [ 593.535732][ T7749] should_failslab+0x5/0x20 [ 593.540313][ T7749] kmem_cache_alloc+0x4f/0x320 [ 593.545243][ T7749] ? __rcu_read_unlock+0x5c/0x290 [ 593.550344][ T7749] audit_log_start+0x351/0x6b0 [ 593.555094][ T7749] audit_seccomp+0x47/0x120 [ 593.559617][ T7749] ? __down_read_common+0x161/0x4b0 [ 593.564808][ T7749] __seccomp_filter+0x515/0xe40 [ 593.569715][ T7749] ? atime_needs_update+0x239/0x390 [ 593.574907][ T7749] ? touch_atime+0x11f/0x2e0 [ 593.579486][ T7749] __secure_computing+0xfb/0x190 [ 593.584474][ T7749] syscall_trace_enter+0x120/0x2b0 [ 593.589582][ T7749] ? exit_to_user_mode_prepare+0x6a/0x190 [ 593.595371][ T7749] syscall_enter_from_user_mode+0x1c/0x20 [ 593.601137][ T7749] do_syscall_64+0x25/0xd0 [ 593.605545][ T7749] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 593.611433][ T7749] RIP: 0033:0x7febc7e2fa4c [ 593.615896][ T7749] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 593.635484][ T7749] RSP: 002b:00007febc6ff3160 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 593.643913][ T7749] RAX: ffffffffffffffda RBX: 00007febc7f8ff60 RCX: 00007febc7e2fa4c 01:18:49 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300), 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) [ 593.651975][ T7749] RDX: 000000000000000f RSI: 00007febc6ff31e0 RDI: 0000000000000004 [ 593.659945][ T7749] RBP: 00007febc6ff31d0 R08: 0000000000000000 R09: 0000000000000000 [ 593.667935][ T7749] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 593.675901][ T7749] R13: 00007fffd5df4edf R14: 00007febc6ff3300 R15: 0000000000022000 [ 593.683995][ T7749] [ 593.689608][ T7750] EXT4-fs warning (device loop3): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. 01:18:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0xfffffffffffffdef, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:49 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300), 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) 01:18:49 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x0) (fail_nth: 7) [ 593.714510][ T7750] EXT4-fs (loop3): mount failed [ 593.741251][ T7766] FAULT_INJECTION: forcing a failure. [ 593.741251][ T7766] name failslab, interval 1, probability 0, space 0, times 0 [ 593.753984][ T7766] CPU: 0 PID: 7766 Comm: syz-executor.1 Not tainted 5.16.0-rc4-syzkaller #0 [ 593.762696][ T7766] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 593.767134][ T7767] loop5: detected capacity change from 0 to 512 [ 593.772814][ T7766] Call Trace: [ 593.772824][ T7766] [ 593.772831][ T7766] dump_stack_lvl+0xd6/0x122 [ 593.772857][ T7766] dump_stack+0x11/0x1b [ 593.794042][ T7766] should_fail+0x23c/0x250 [ 593.798469][ T7766] __should_failslab+0x81/0x90 [ 593.803369][ T7766] should_failslab+0x5/0x20 [ 593.807944][ T7766] kmem_cache_alloc_node+0x61/0x2d0 [ 593.813150][ T7766] ? should_fail+0xd6/0x250 [ 593.814319][ T7752] EXT4-fs error (device loop4): ext4_fill_super:4822: inode #2: comm syz-executor.4: iget: root inode unallocated [ 593.817702][ T7766] ? __alloc_skb+0xf0/0x450 [ 593.830192][ T7752] EXT4-fs (loop4): get root inode failed [ 593.834320][ T7766] __alloc_skb+0xf0/0x450 [ 593.834349][ T7766] audit_log_start+0x36d/0x6b0 [ 593.839962][ T7752] EXT4-fs (loop4): mount failed [ 593.844267][ T7766] audit_seccomp+0x47/0x120 [ 593.844290][ T7766] ? __down_read_common+0x161/0x4b0 [ 593.863537][ T7766] __seccomp_filter+0x515/0xe40 [ 593.868384][ T7766] ? atime_needs_update+0x2ba/0x390 [ 593.873576][ T7766] ? touch_atime+0x11f/0x2e0 [ 593.878178][ T7766] __secure_computing+0xfb/0x190 [ 593.883172][ T7766] syscall_trace_enter+0x120/0x2b0 [ 593.888267][ T7766] ? exit_to_user_mode_prepare+0x6a/0x190 [ 593.894072][ T7766] syscall_enter_from_user_mode+0x1c/0x20 [ 593.899897][ T7766] do_syscall_64+0x25/0xd0 [ 593.904289][ T7766] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 593.910165][ T7766] RIP: 0033:0x7febc7e2fa4c [ 593.914596][ T7766] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 593.934257][ T7766] RSP: 002b:00007febc6ff3160 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 593.942787][ T7766] RAX: ffffffffffffffda RBX: 00007febc7f8ff60 RCX: 00007febc7e2fa4c [ 593.950929][ T7766] RDX: 000000000000000f RSI: 00007febc6ff31e0 RDI: 0000000000000004 [ 593.958916][ T7766] RBP: 00007febc6ff31d0 R08: 0000000000000000 R09: 0000000000000000 [ 593.966879][ T7766] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 593.974896][ T7766] R13: 00007fffd5df4edf R14: 00007febc6ff3300 R15: 0000000000022000 [ 593.982855][ T7766] 01:18:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000007000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000002000400000000000800030000000af301000400000000000000000000000100000020000000000000000000000000000000000000000000000000000000000000000000000000000000c6d15a57000000000000000000000000000000000000000000000000ed8100001a040000d8f4655fd8f4655fd8f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000ec07159c000000000000000000000000000000000000000000000000ffa1000026000000d8f4655fd8f4655fd8f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3034363634343935392f66696c65302f66696c65300000000000000000000000000000000000000000000011b29fd4000000000000000000000000000000000000000000000000ed81", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:18:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0xffffffffffffffff, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:49 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) 01:18:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c0000", 0x1f, 0x11100}], 0x0, &(0x7f0000013c00)) 01:18:49 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x0) (fail_nth: 8) 01:18:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a0900", 0x10, 0x6800}, {&(0x7f0000012e00), 0x0, 0x11080}], 0x0, &(0x7f0000013c00)) [ 593.996557][ T7767] EXT4-fs (loop5): 1 orphan inode deleted [ 594.002338][ T7767] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 594.014445][ T7767] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1374/file0 supports timestamps until 2038 (0x7fffffff) 01:18:49 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) 01:18:49 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) 01:18:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe0b", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:49 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, 0x0, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) [ 594.050653][ T7780] loop3: detected capacity change from 0 to 512 [ 594.066342][ T7784] loop4: detected capacity change from 0 to 512 [ 594.076112][ T7782] FAULT_INJECTION: forcing a failure. [ 594.076112][ T7782] name failslab, interval 1, probability 0, space 0, times 0 [ 594.088785][ T7782] CPU: 0 PID: 7782 Comm: syz-executor.1 Not tainted 5.16.0-rc4-syzkaller #0 01:18:49 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, 0x0, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) 01:18:49 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, 0x0, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) [ 594.097460][ T7782] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 594.107596][ T7782] Call Trace: [ 594.110902][ T7782] [ 594.113831][ T7782] dump_stack_lvl+0xd6/0x122 [ 594.118427][ T7782] dump_stack+0x11/0x1b [ 594.122640][ T7782] should_fail+0x23c/0x250 [ 594.127124][ T7782] __should_failslab+0x81/0x90 [ 594.132039][ T7782] should_failslab+0x5/0x20 [ 594.136576][ T7782] kmem_cache_alloc_node_trace+0x61/0x310 [ 594.137855][ T7780] EXT4-fs warning (device loop3): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 594.142299][ T7782] ? __kmalloc_node_track_caller+0x30/0x40 [ 594.161747][ T7780] EXT4-fs (loop3): mount failed [ 594.161982][ T7782] __kmalloc_node_track_caller+0x30/0x40 [ 594.172429][ T7782] ? audit_log_start+0x36d/0x6b0 [ 594.177368][ T7782] __alloc_skb+0x19d/0x450 [ 594.181827][ T7782] audit_log_start+0x36d/0x6b0 [ 594.186668][ T7782] audit_seccomp+0x47/0x120 [ 594.191177][ T7782] ? __down_read_common+0x161/0x4b0 [ 594.196354][ T7782] __seccomp_filter+0x515/0xe40 [ 594.201325][ T7782] ? atime_needs_update+0x239/0x390 [ 594.206521][ T7782] ? touch_atime+0x11f/0x2e0 [ 594.211116][ T7782] __secure_computing+0xfb/0x190 [ 594.216087][ T7782] syscall_trace_enter+0x120/0x2b0 [ 594.221181][ T7782] ? exit_to_user_mode_prepare+0x6a/0x190 [ 594.226883][ T7782] syscall_enter_from_user_mode+0x1c/0x20 [ 594.232583][ T7782] do_syscall_64+0x25/0xd0 [ 594.237153][ T7782] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 594.243026][ T7782] RIP: 0033:0x7febc7e2fa4c [ 594.247417][ T7782] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 594.267119][ T7782] RSP: 002b:00007febc6ff3160 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 594.275513][ T7782] RAX: ffffffffffffffda RBX: 00007febc7f8ff60 RCX: 00007febc7e2fa4c [ 594.283469][ T7782] RDX: 000000000000000f RSI: 00007febc6ff31e0 RDI: 0000000000000004 [ 594.291440][ T7782] RBP: 00007febc6ff31d0 R08: 0000000000000000 R09: 0000000000000000 [ 594.299394][ T7782] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 594.307344][ T7782] R13: 00007fffd5df4edf R14: 00007febc6ff3300 R15: 0000000000022000 [ 594.315299][ T7782] [ 594.318437][ T7782] audit_log_lost: 252 callbacks suppressed [ 594.318448][ T7782] audit: audit_lost=11 audit_rate_limit=0 audit_backlog_limit=64 [ 594.323868][ T7784] EXT4-fs error (device loop4): ext4_fill_super:4822: inode #2: comm syz-executor.4: iget: root inode unallocated [ 594.324344][ T7782] audit: out of memory in audit_log_start [ 594.332689][ T7784] EXT4-fs (loop4): get root inode failed [ 594.348641][ T24] audit: type=1326 audit(1639358329.889:10543): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7774 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7febc7e2f9af code=0x7ffc0000 [ 594.349789][ T7784] EXT4-fs (loop4): mount failed [ 594.384280][ T24] audit: type=1326 audit(1639358329.889:10544): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7774 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7febc7e2fadb code=0x7ffc0000 [ 594.408506][ T24] audit: type=1326 audit(1639358329.889:10545): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7774 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7febc7e7ce99 code=0x7ffc0000 [ 594.432564][ T24] audit: type=1326 audit(1639358329.889:10546): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7774 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7febc7e7ce99 code=0x7ffc0000 [ 594.467798][ T7800] loop5: detected capacity change from 0 to 512 [ 594.494495][ T7800] Quota error (device loop5): find_tree_dqentry: Getting block too big (262144 >= 6) [ 594.504020][ T7800] Quota error (device loop5): qtree_read_dquot: Can't read quota structure for id 0 [ 594.513624][ T7800] Quota error (device loop5): find_tree_dqentry: Getting block too big (262144 >= 6) [ 594.523147][ T7800] Quota error (device loop5): qtree_read_dquot: Can't read quota structure for id 0 [ 594.532918][ T7800] EXT4-fs (loop5): 1 orphan inode deleted 01:18:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000008000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000002000400000000000800030000000af301000400000000000000000000000100000020000000000000000000000000000000000000000000000000000000000000000000000000000000c6d15a57000000000000000000000000000000000000000000000000ed8100001a040000d8f4655fd8f4655fd8f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000ec07159c000000000000000000000000000000000000000000000000ffa1000026000000d8f4655fd8f4655fd8f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3034363634343935392f66696c65302f66696c65300000000000000000000000000000000000000000000011b29fd4000000000000000000000000000000000000000000000000ed81", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:18:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:50 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) 01:18:50 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x0) (fail_nth: 9) 01:18:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c0000", 0x1f, 0x11100}], 0x0, &(0x7f0000013c00)) 01:18:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a0900", 0x10, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4", 0xe, 0x11080}], 0x0, &(0x7f0000013c00)) [ 594.538642][ T7800] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 594.549904][ T7800] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1375/file0 supports timestamps until 2038 (0x7fffffff) 01:18:50 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) 01:18:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x2, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 594.584934][ T7812] loop4: detected capacity change from 0 to 512 [ 594.594272][ T7811] loop3: detected capacity change from 0 to 512 [ 594.594560][ T7809] FAULT_INJECTION: forcing a failure. [ 594.594560][ T7809] name failslab, interval 1, probability 0, space 0, times 0 [ 594.613533][ T7809] CPU: 1 PID: 7809 Comm: syz-executor.1 Not tainted 5.16.0-rc4-syzkaller #0 [ 594.622250][ T7809] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 594.632380][ T7809] Call Trace: [ 594.635654][ T7809] [ 594.638584][ T7809] dump_stack_lvl+0xd6/0x122 [ 594.643276][ T7809] dump_stack+0x11/0x1b [ 594.647430][ T7809] should_fail+0x23c/0x250 [ 594.651841][ T7809] ? sidtab_sid2str_get+0xb0/0x140 [ 594.656947][ T7809] __should_failslab+0x81/0x90 [ 594.661742][ T7809] should_failslab+0x5/0x20 [ 594.666304][ T7809] __kmalloc_track_caller+0x6d/0x370 [ 594.671585][ T7809] ? vsnprintf+0xe8f/0xed0 [ 594.675997][ T7809] kmemdup+0x21/0x50 [ 594.679888][ T7809] sidtab_sid2str_get+0xb0/0x140 [ 594.684819][ T7809] security_sid_to_context_core+0x1d0/0x2d0 [ 594.690707][ T7809] security_sid_to_context+0x2c/0x40 [ 594.696051][ T7809] selinux_secid_to_secctx+0x25/0x30 [ 594.701337][ T7809] security_secid_to_secctx+0x45/0xa0 [ 594.706737][ T7809] audit_log_task_context+0x91/0x1c0 [ 594.712017][ T7809] audit_log_task+0xfd/0x180 [ 594.716597][ T7809] audit_seccomp+0x64/0x120 [ 594.721143][ T7809] __seccomp_filter+0x515/0xe40 [ 594.725999][ T7809] ? atime_needs_update+0x239/0x390 [ 594.731270][ T7809] ? touch_atime+0x11f/0x2e0 [ 594.735852][ T7809] __secure_computing+0xfb/0x190 [ 594.740778][ T7809] syscall_trace_enter+0x120/0x2b0 [ 594.745927][ T7809] ? exit_to_user_mode_prepare+0x6a/0x190 [ 594.751795][ T7809] syscall_enter_from_user_mode+0x1c/0x20 [ 594.757519][ T7809] do_syscall_64+0x25/0xd0 [ 594.761961][ T7809] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 594.767948][ T7809] RIP: 0033:0x7febc7e2fa4c [ 594.772347][ T7809] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 594.791939][ T7809] RSP: 002b:00007febc6ff3160 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 594.800421][ T7809] RAX: ffffffffffffffda RBX: 00007febc7f8ff60 RCX: 00007febc7e2fa4c [ 594.808642][ T7809] RDX: 000000000000000f RSI: 00007febc6ff31e0 RDI: 0000000000000004 [ 594.816615][ T7809] RBP: 00007febc6ff31d0 R08: 0000000000000000 R09: 0000000000000000 [ 594.824666][ T7809] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 01:18:50 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) 01:18:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x3, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:50 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x0) (fail_nth: 10) [ 594.832661][ T7809] R13: 00007fffd5df4edf R14: 00007febc6ff3300 R15: 0000000000022000 [ 594.840680][ T7809] [ 594.879768][ T7818] FAULT_INJECTION: forcing a failure. [ 594.879768][ T7818] name failslab, interval 1, probability 0, space 0, times 0 [ 594.892421][ T7818] CPU: 1 PID: 7818 Comm: syz-executor.1 Not tainted 5.16.0-rc4-syzkaller #0 [ 594.901251][ T7818] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 594.902169][ T7824] loop5: detected capacity change from 0 to 512 [ 594.911304][ T7818] Call Trace: [ 594.911314][ T7818] [ 594.911321][ T7818] dump_stack_lvl+0xd6/0x122 [ 594.911347][ T7818] dump_stack+0x11/0x1b [ 594.932524][ T7818] should_fail+0x23c/0x250 [ 594.936946][ T7818] ? audit_log_d_path+0x97/0x200 [ 594.941895][ T7818] __should_failslab+0x81/0x90 [ 594.946843][ T7818] should_failslab+0x5/0x20 [ 594.951362][ T7818] kmem_cache_alloc_trace+0x52/0x350 [ 594.956815][ T7818] audit_log_d_path+0x97/0x200 [ 594.961661][ T7818] audit_log_d_path_exe+0x3e/0x70 [ 594.966674][ T7818] audit_log_task+0x159/0x180 [ 594.971344][ T7818] audit_seccomp+0x64/0x120 [ 594.975838][ T7818] __seccomp_filter+0x515/0xe40 [ 594.980730][ T7818] ? atime_needs_update+0x239/0x390 [ 594.985917][ T7818] ? touch_atime+0x11f/0x2e0 [ 594.990521][ T7818] __secure_computing+0xfb/0x190 [ 594.995538][ T7818] syscall_trace_enter+0x120/0x2b0 [ 595.000643][ T7818] ? exit_to_user_mode_prepare+0x6a/0x190 [ 595.006353][ T7818] syscall_enter_from_user_mode+0x1c/0x20 [ 595.012076][ T7818] do_syscall_64+0x25/0xd0 [ 595.016543][ T7818] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 595.022656][ T7818] RIP: 0033:0x7febc7e2fa4c [ 595.027055][ T7818] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 595.046694][ T7818] RSP: 002b:00007febc6ff3160 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 595.055105][ T7818] RAX: ffffffffffffffda RBX: 00007febc7f8ff60 RCX: 00007febc7e2fa4c [ 595.063096][ T7818] RDX: 000000000000000f RSI: 00007febc6ff31e0 RDI: 0000000000000004 [ 595.071089][ T7818] RBP: 00007febc6ff31d0 R08: 0000000000000000 R09: 0000000000000000 01:18:50 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) [ 595.079051][ T7818] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 595.087122][ T7818] R13: 00007fffd5df4edf R14: 00007febc6ff3300 R15: 0000000000022000 [ 595.095083][ T7818] [ 595.107624][ T7812] EXT4-fs error (device loop4): ext4_fill_super:4822: inode #2: comm syz-executor.4: iget: root inode unallocated [ 595.121365][ T7811] EXT4-fs warning (device loop3): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 595.132419][ T7812] EXT4-fs (loop4): get root inode failed [ 595.136628][ T7811] EXT4-fs (loop3): mount failed [ 595.141576][ T7812] EXT4-fs (loop4): mount failed [ 595.147733][ T7824] EXT4-fs (loop5): 1 orphan inode deleted [ 595.157013][ T7824] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 01:18:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000009000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000002000400000000000800030000000af301000400000000000000000000000100000020000000000000000000000000000000000000000000000000000000000000000000000000000000c6d15a57000000000000000000000000000000000000000000000000ed8100001a040000d8f4655fd8f4655fd8f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000ec07159c000000000000000000000000000000000000000000000000ffa1000026000000d8f4655fd8f4655fd8f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3034363634343935392f66696c65302f66696c65300000000000000000000000000000000000000000000011b29fd4000000000000000000000000000000000000000000000000ed81", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:18:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x4, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:50 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x0) (fail_nth: 11) 01:18:50 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) 01:18:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af301000400", 0x2e, 0x11100}], 0x0, &(0x7f0000013c00)) 01:18:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a0900", 0x10, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4", 0xe, 0x11080}], 0x0, &(0x7f0000013c00)) [ 595.168216][ T7824] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1376/file0 supports timestamps until 2038 (0x7fffffff) 01:18:50 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) [ 595.222080][ T7837] loop3: detected capacity change from 0 to 512 [ 595.227624][ T7840] loop4: detected capacity change from 0 to 512 [ 595.238221][ T7842] FAULT_INJECTION: forcing a failure. [ 595.238221][ T7842] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 595.251320][ T7842] CPU: 0 PID: 7842 Comm: syz-executor.1 Not tainted 5.16.0-rc4-syzkaller #0 [ 595.260000][ T7842] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 595.270054][ T7842] Call Trace: [ 595.273384][ T7842] [ 595.276304][ T7842] dump_stack_lvl+0xd6/0x122 [ 595.281057][ T7842] dump_stack+0x11/0x1b [ 595.285294][ T7842] should_fail+0x23c/0x250 [ 595.289708][ T7842] should_fail_usercopy+0x16/0x20 [ 595.294843][ T7842] _copy_to_user+0x1c/0x90 [ 595.299294][ T7842] simple_read_from_buffer+0xab/0x120 [ 595.304730][ T7842] proc_fail_nth_read+0x10d/0x150 [ 595.309817][ T7842] ? proc_fault_inject_write+0x230/0x230 [ 595.315523][ T7842] vfs_read+0x1e6/0x750 [ 595.319776][ T7842] ? __cond_resched+0x3f/0x90 [ 595.324493][ T7842] ksys_read+0xd9/0x190 [ 595.328760][ T7842] __x64_sys_read+0x3e/0x50 [ 595.333268][ T7842] do_syscall_64+0x44/0xd0 [ 595.337868][ T7842] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 595.344046][ T7842] RIP: 0033:0x7febc7e2fa4c [ 595.348458][ T7842] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 01:18:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x5, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:50 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x0) [ 595.368150][ T7842] RSP: 002b:00007febc6ff3160 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 595.376681][ T7842] RAX: ffffffffffffffda RBX: 00007febc7f8ff60 RCX: 00007febc7e2fa4c [ 595.384646][ T7842] RDX: 000000000000000f RSI: 00007febc6ff31e0 RDI: 0000000000000004 [ 595.392694][ T7842] RBP: 00007febc6ff31d0 R08: 0000000000000000 R09: 0000000000000000 [ 595.400707][ T7842] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 595.408760][ T7842] R13: 00007fffd5df4edf R14: 00007febc6ff3300 R15: 0000000000022000 [ 595.416758][ T7842] 01:18:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x6, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 595.431854][ T7837] EXT4-fs error (device loop3): ext4_ext_check_inode:497: inode #3: comm syz-executor.3: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 595.460757][ T7840] EXT4-fs error (device loop4): ext4_fill_super:4822: inode #2: comm syz-executor.4: iget: root inode unallocated 01:18:51 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) 01:18:51 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x2) [ 595.477146][ T7837] EXT4-fs error (device loop3): ext4_quota_enable:6323: comm syz-executor.3: Bad quota inode # 3 [ 595.493398][ T7855] loop5: detected capacity change from 0 to 512 [ 595.501516][ T7840] EXT4-fs (loop4): get root inode failed [ 595.507247][ T7840] EXT4-fs (loop4): mount failed [ 595.513347][ T7837] EXT4-fs warning (device loop3): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. 01:18:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000010000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:18:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x7, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:51 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) 01:18:51 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x3) 01:18:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af301000400", 0x2e, 0x11100}], 0x0, &(0x7f0000013c00)) [ 595.528295][ T7837] EXT4-fs (loop3): mount failed [ 595.545827][ T7855] EXT4-fs (loop5): 1 orphan inode deleted [ 595.552186][ T7855] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 595.563342][ T7855] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1377/file0 supports timestamps until 2038 (0x7fffffff) 01:18:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a0900", 0x10, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4", 0xe, 0x11080}], 0x0, &(0x7f0000013c00)) 01:18:51 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) 01:18:51 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) 01:18:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x4, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:51 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x4) 01:18:51 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) [ 595.618339][ T7870] loop3: detected capacity change from 0 to 512 [ 595.637216][ T7874] loop5: detected capacity change from 0 to 512 [ 595.647578][ T7876] loop4: detected capacity change from 0 to 512 01:18:51 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x5) [ 595.689846][ T7876] EXT4-fs error (device loop4): ext4_fill_super:4822: inode #2: comm syz-executor.4: iget: root inode unallocated [ 595.718649][ T7876] EXT4-fs (loop4): get root inode failed [ 595.724350][ T7876] EXT4-fs (loop4): mount failed [ 595.725905][ T7870] EXT4-fs error (device loop3): ext4_ext_check_inode:497: inode #3: comm syz-executor.3: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 595.737208][ T7874] EXT4-fs (loop5): 1 orphan inode deleted [ 595.753096][ T7874] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 595.765662][ T7874] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1378/file0 supports timestamps until 2038 (0x7fffffff) 01:18:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000011000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:18:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0xb, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:51 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) 01:18:51 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x6) [ 595.766980][ T7870] EXT4-fs error (device loop3): ext4_quota_enable:6323: comm syz-executor.3: Bad quota inode # 3 [ 595.800656][ T7870] EXT4-fs warning (device loop3): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 595.818022][ T7870] EXT4-fs (loop3): mount failed 01:18:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af301000400", 0x2e, 0x11100}], 0x0, &(0x7f0000013c00)) 01:18:51 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) 01:18:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "02005b", 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:51 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x7) 01:18:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a0900", 0x10, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00", 0x15, 0x11080}], 0x0, &(0x7f0000013c00)) 01:18:51 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) 01:18:51 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x8) 01:18:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "03005b", 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 595.859135][ T7900] loop5: detected capacity change from 0 to 512 [ 595.883848][ T7908] loop4: detected capacity change from 0 to 512 [ 595.902084][ T7911] loop3: detected capacity change from 0 to 512 [ 595.926905][ T7911] EXT4-fs error (device loop3): ext4_ext_check_inode:497: inode #3: comm syz-executor.3: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 595.946804][ T7911] EXT4-fs error (device loop3): ext4_quota_enable:6323: comm syz-executor.3: Bad quota inode # 3 [ 595.948788][ T7900] EXT4-fs (loop5): 1 orphan inode deleted [ 595.963312][ T7900] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 595.970077][ T7911] EXT4-fs warning (device loop3): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 595.992091][ T7911] EXT4-fs (loop3): mount failed [ 595.997586][ T7900] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1379/file0 supports timestamps until 2038 (0x7fffffff) [ 596.002362][ T7908] EXT4-fs error (device loop4): ext4_fill_super:4822: inode #2: comm syz-executor.4: iget: root inode unallocated 01:18:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000fe000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:18:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "04005b", 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:51 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) 01:18:51 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x9) 01:18:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af3010004000000000000000000", 0x36, 0x11100}], 0x0, &(0x7f0000013c00)) 01:18:51 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0xa) 01:18:51 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) 01:18:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "05005b", 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 596.026226][ T7908] EXT4-fs (loop4): get root inode failed [ 596.031963][ T7908] EXT4-fs (loop4): mount failed [ 596.059967][ T7930] loop5: detected capacity change from 0 to 512 [ 596.070833][ T7932] loop3: detected capacity change from 0 to 512 01:18:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a0900", 0x10, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00", 0x15, 0x11080}], 0x0, &(0x7f0000013c00)) 01:18:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "06005b", 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:51 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) 01:18:51 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0xb) [ 596.156460][ T7930] EXT4-fs (loop5): 1 orphan inode deleted [ 596.162295][ T7930] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 596.168555][ T7932] EXT4-fs error (device loop3): ext4_ext_check_inode:497: inode #3: comm syz-executor.3: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 596.174435][ T7950] loop4: detected capacity change from 0 to 512 01:18:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000800000000e010000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:18:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\a\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:51 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0xc) 01:18:51 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) [ 596.198766][ T7930] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1380/file0 supports timestamps until 2038 (0x7fffffff) [ 596.200754][ T7932] EXT4-fs error (device loop3): ext4_quota_enable:6323: comm syz-executor.3: Bad quota inode # 3 [ 596.226085][ T7932] EXT4-fs warning (device loop3): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 596.240751][ T7932] EXT4-fs (loop3): mount failed 01:18:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af3010004000000000000000000", 0x36, 0x11100}], 0x0, &(0x7f0000013c00)) 01:18:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "90005b", 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:51 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0xd) 01:18:51 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) [ 596.268903][ T7950] EXT4-fs error (device loop4): ext4_fill_super:4822: inode #2: comm syz-executor.4: iget: root inode unallocated [ 596.281286][ T7950] EXT4-fs (loop4): get root inode failed [ 596.287193][ T7950] EXT4-fs (loop4): mount failed [ 596.298039][ T7960] loop5: detected capacity change from 0 to 512 01:18:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a0900", 0x10, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00", 0x15, 0x11080}], 0x0, &(0x7f0000013c00)) 01:18:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "00035b", 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:51 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0xe) 01:18:51 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) [ 596.327633][ T7968] loop3: detected capacity change from 0 to 512 [ 596.352398][ T7960] EXT4-fs (loop5): 1 orphan inode deleted [ 596.358160][ T7960] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 596.372113][ T7960] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1381/file0 supports timestamps until 2038 (0x7fffffff) [ 596.380480][ T7968] EXT4-fs error (device loop3): ext4_ext_check_inode:497: inode #3: comm syz-executor.3: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 596.405185][ T7980] loop4: detected capacity change from 0 to 512 01:18:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000000000400600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:18:51 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x10) 01:18:51 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) 01:18:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "00055b", 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 596.429297][ T7968] EXT4-fs error (device loop3): ext4_quota_enable:6323: comm syz-executor.3: Bad quota inode # 3 [ 596.447430][ T7968] EXT4-fs warning (device loop3): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 596.462319][ T7968] EXT4-fs (loop3): mount failed 01:18:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af3010004000000000000000000", 0x36, 0x11100}], 0x0, &(0x7f0000013c00)) 01:18:52 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) 01:18:52 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x11) 01:18:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "00065b", 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 596.473111][ T7980] EXT4-fs error (device loop4): ext4_fill_super:4822: inode #2: comm syz-executor.4: iget: root inode unallocated [ 596.493050][ T7980] EXT4-fs (loop4): get root inode failed [ 596.498907][ T7980] EXT4-fs (loop4): mount failed [ 596.516621][ T7990] loop5: detected capacity change from 0 to 512 01:18:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a0900", 0x10, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f0000000000", 0x19, 0x11080}], 0x0, &(0x7f0000013c00)) 01:18:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\a[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:52 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) 01:18:52 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x12) [ 596.546770][ T7998] loop3: detected capacity change from 0 to 512 [ 596.574375][ T7990] EXT4-fs (loop5): 1 orphan inode deleted [ 596.580125][ T7990] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 596.591749][ T7990] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1382/file0 supports timestamps until 2038 (0x7fffffff) [ 596.607991][ T7998] EXT4-fs error (device loop3): ext4_ext_check_inode:497: inode #3: comm syz-executor.3: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 596.633418][ T7998] EXT4-fs error (device loop3): ext4_quota_enable:6323: comm syz-executor.3: Bad quota inode # 3 01:18:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000010000000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:18:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00@[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:52 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) 01:18:52 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x25) [ 596.645205][ T8010] loop4: detected capacity change from 0 to 512 [ 596.648016][ T7998] EXT4-fs warning (device loop3): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 596.667549][ T7998] EXT4-fs (loop3): mount failed 01:18:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af301000400000000000000000000000300", 0x3a, 0x11100}], 0x0, &(0x7f0000013c00)) 01:18:52 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) 01:18:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "00905b", 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:52 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x48) [ 596.700290][ T8010] EXT4-fs error (device loop4): ext4_fill_super:4822: inode #2: comm syz-executor.4: iget: root inode unallocated [ 596.715280][ T8010] EXT4-fs (loop4): get root inode failed [ 596.720973][ T8010] EXT4-fs (loop4): mount failed 01:18:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a0900", 0x10, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f0000000000", 0x19, 0x11080}], 0x0, &(0x7f0000013c00)) 01:18:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "00025b", 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:52 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x4c) [ 596.757302][ T8025] loop3: detected capacity change from 0 to 512 [ 596.768683][ T8028] loop5: detected capacity change from 0 to 512 01:18:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "00035b", 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 596.813832][ T8036] loop4: detected capacity change from 0 to 512 [ 596.829493][ T8025] EXT4-fs error (device loop3): ext4_ext_check_inode:497: inode #3: comm syz-executor.3: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 596.847821][ T8028] EXT4-fs (loop5): 1 orphan inode deleted [ 596.849637][ T8025] EXT4-fs error (device loop3): ext4_quota_enable:6323: comm syz-executor.3: Bad quota inode # 3 [ 596.853644][ T8028] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 596.864470][ T8025] EXT4-fs warning (device loop3): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 596.879047][ T8036] EXT4-fs error (device loop4): ext4_fill_super:4822: inode #2: comm syz-executor.4: iget: root inode unallocated [ 596.889409][ T8025] EXT4-fs (loop3): mount failed [ 596.902878][ T8036] EXT4-fs (loop4): get root inode failed 01:18:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000010010000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:18:52 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x68) 01:18:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "00045b", 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "00055b", 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 596.905988][ T8028] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1383/file0 supports timestamps until 2038 (0x7fffffff) [ 596.911654][ T8036] EXT4-fs (loop4): mount failed 01:18:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af301000400000000000000000000000300", 0x3a, 0x11100}], 0x0, &(0x7f0000013c00)) [ 596.992954][ T8050] loop3: detected capacity change from 0 to 512 [ 597.027386][ T8050] EXT4-fs error (device loop3): ext4_ext_check_inode:497: inode #3: comm syz-executor.3: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 597.032847][ T8054] loop5: detected capacity change from 0 to 512 [ 597.047241][ T8050] EXT4-fs error (device loop3): ext4_quota_enable:6323: comm syz-executor.3: Bad quota inode # 3 [ 597.062580][ T8050] EXT4-fs warning (device loop3): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 597.072028][ T8054] EXT4-fs (loop5): 1 orphan inode deleted [ 597.078592][ T8050] EXT4-fs (loop3): mount failed [ 597.082362][ T8054] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 597.083603][ T8054] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1384/file0 supports timestamps until 2038 (0x7fffffff) 01:18:53 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) 01:18:53 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x6c) 01:18:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a0900", 0x10, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f0000000000", 0x19, 0x11080}], 0x0, &(0x7f0000013c00)) 01:18:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "00065b", 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006020000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:18:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af301000400000000000000000000000300", 0x3a, 0x11100}], 0x0, &(0x7f0000013c00)) 01:18:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\a[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "00905b", 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 597.609785][ T8064] loop5: detected capacity change from 0 to 512 [ 597.611388][ T8059] loop4: detected capacity change from 0 to 512 [ 597.616884][ T8065] loop3: detected capacity change from 0 to 512 01:18:53 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x74) [ 597.654380][ T8064] EXT4-fs (loop5): 1 orphan inode deleted [ 597.660559][ T8064] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 597.667733][ T8065] EXT4-fs error (device loop3): ext4_ext_check_inode:497: inode #3: comm syz-executor.3: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 597.680874][ T8064] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1385/file0 supports timestamps until 2038 (0x7fffffff) 01:18:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x2, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006030000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000002000400000000000800030000000af301000400000000000000000000000100000020000000000000000000000000000000000000000000000000000000000000000000000000000000c6d15a57000000000000000000000000000000000000000000000000ed8100001a040000d8f4655fd8f4655fd8f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000ec07159c000000000000000000000000000000000000000000000000ffa1000026000000d8f4655fd8f4655fd8f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3034363634343935392f66696c65302f66696c65300000000000000000000000000000000000000000000011b29fd4000000000000000000000000000000000000000000000000ed81", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:18:53 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x7a) [ 597.700383][ T8065] EXT4-fs error (device loop3): ext4_quota_enable:6323: comm syz-executor.3: Bad quota inode # 3 [ 597.717981][ T8065] EXT4-fs warning (device loop3): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 597.739209][ T8065] EXT4-fs (loop3): mount failed [ 597.744590][ T8059] EXT4-fs error (device loop4): ext4_fill_super:4822: inode #2: comm syz-executor.4: iget: root inode unallocated [ 597.757286][ T8059] EXT4-fs (loop4): get root inode failed [ 597.762986][ T8059] EXT4-fs (loop4): mount failed [ 597.817987][ T8086] loop5: detected capacity change from 0 to 512 [ 597.843145][ T8086] EXT4-fs (loop5): 1 orphan inode deleted [ 597.848981][ T8086] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 597.860242][ T8086] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1386/file0 supports timestamps until 2038 (0x7fffffff) 01:18:54 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) 01:18:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x4, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:54 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x300) 01:18:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a0900", 0x10, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) 01:18:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af3010004000000000000000000000003000000", 0x3c, 0x11100}], 0x0, &(0x7f0000013c00)) 01:18:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006040000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000002000400000000000800030000000af301000400000000000000000000000100000020000000000000000000000000000000000000000000000000000000000000000000000000000000c6d15a57000000000000000000000000000000000000000000000000ed8100001a040000d8f4655fd8f4655fd8f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000ec07159c000000000000000000000000000000000000000000000000ffa1000026000000d8f4655fd8f4655fd8f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3034363634343935392f66696c65302f66696c65300000000000000000000000000000000000000000000011b29fd4000000000000000000000000000000000000000000000000ed81", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:18:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x14, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:54 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x500) 01:18:54 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x600) 01:18:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x28, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 598.489288][ T8097] loop3: detected capacity change from 0 to 512 [ 598.495986][ T8096] loop5: detected capacity change from 0 to 512 [ 598.502690][ T8093] loop4: detected capacity change from 0 to 512 01:18:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x4, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 598.552412][ T8097] EXT4-fs error (device loop3): ext4_ext_check_inode:497: inode #3: comm syz-executor.3: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 598.582519][ T8093] EXT4-fs (loop4): corrupt root inode, run e2fsck [ 598.589351][ T8097] EXT4-fs error (device loop3): ext4_quota_enable:6323: comm syz-executor.3: Bad quota inode # 3 01:18:54 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x700) [ 598.593724][ T8096] EXT4-fs (loop5): 1 orphan inode deleted [ 598.600019][ T8093] EXT4-fs (loop4): mount failed [ 598.605642][ T8096] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 598.613035][ T8097] EXT4-fs warning (device loop3): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 598.640968][ T8097] EXT4-fs (loop3): mount failed [ 598.649639][ T8096] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1387/file0 supports timestamps until 2038 (0x7fffffff) 01:18:54 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, 0x0, 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) 01:18:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0xb, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:54 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x900) 01:18:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006050000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000002000400000000000800030000000af301000400000000000000000000000100000020000000000000000000000000000000000000000000000000000000000000000000000000000000c6d15a57000000000000000000000000000000000000000000000000ed8100001a040000d8f4655fd8f4655fd8f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000ec07159c000000000000000000000000000000000000000000000000ffa1000026000000d8f4655fd8f4655fd8f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3034363634343935392f66696c65302f66696c65300000000000000000000000000000000000000000000011b29fd4000000000000000000000000000000000000000000000000ed81", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:18:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af3010004000000000000000000000003000000", 0x3c, 0x11100}], 0x0, &(0x7f0000013c00)) 01:18:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a0900", 0x10, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000", 0x1a, 0x11080}], 0x0, &(0x7f0000013c00)) 01:18:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x11, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 599.341810][ T8121] loop3: detected capacity change from 0 to 512 [ 599.350357][ T8126] loop5: detected capacity change from 0 to 512 [ 599.357165][ T8125] loop4: detected capacity change from 0 to 512 [ 599.367126][ T24] kauditd_printk_skb: 484 callbacks suppressed [ 599.367139][ T24] audit: type=1326 audit(1639358334.899:10956): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8122 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7febc7e7ce99 code=0x7ffc0000 [ 599.410118][ T24] audit: type=1326 audit(1639358334.939:10957): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8122 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7febc7e7ce99 code=0x7ffc0000 [ 599.434347][ T24] audit: type=1326 audit(1639358334.949:10958): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8122 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=83 compat=0 ip=0x7febc7e7ce99 code=0x7ffc0000 [ 599.458458][ T24] audit: type=1326 audit(1639358334.949:10959): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8122 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7febc7e7ce99 code=0x7ffc0000 [ 599.464467][ T8134] dccp_invalid_packet: P.Data Offset(68) too large 01:18:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x21, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:55 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0xa00) 01:18:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x29, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x2b, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x2c, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 599.482479][ T24] audit: type=1326 audit(1639358334.949:10960): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8122 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=165 compat=0 ip=0x7febc7e7ce99 code=0x7ffc0000 [ 599.513014][ T24] audit: type=1326 audit(1639358334.949:10961): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8122 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7febc7e7ce99 code=0x7ffc0000 [ 599.537074][ T24] audit: type=1326 audit(1639358334.949:10962): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8122 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=2 compat=0 ip=0x7febc7e7ce99 code=0x7ffc0000 [ 599.542345][ T8125] EXT4-fs error (device loop4): ext4_fill_super:4822: inode #2: comm syz-executor.4: iget: root inode unallocated [ 599.561156][ T24] audit: type=1326 audit(1639358334.949:10963): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8122 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7febc7e7ce99 code=0x7ffc0000 [ 599.561185][ T24] audit: type=1326 audit(1639358334.949:10964): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8122 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=78 compat=0 ip=0x7febc7e7ce99 code=0x7ffc0000 [ 599.561206][ T24] audit: type=1326 audit(1639358334.949:10965): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8122 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7febc7e7ce99 code=0x7ffc0000 [ 599.578494][ T8125] EXT4-fs (loop4): get root inode failed [ 599.612497][ T8126] EXT4-fs (loop5): 1 orphan inode deleted [ 599.621301][ T8125] EXT4-fs (loop4): mount failed [ 599.645214][ T8126] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 599.645476][ T8126] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1388/file0 supports timestamps until 2038 (0x7fffffff) [ 599.665801][ T8121] EXT4-fs error (device loop3): ext4_ext_check_inode:497: inode #3: comm syz-executor.3: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 599.705720][ T8121] EXT4-fs error (device loop3): ext4_quota_enable:6323: comm syz-executor.3: Bad quota inode # 3 [ 599.716593][ T8121] EXT4-fs warning (device loop3): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 599.735610][ T8121] EXT4-fs (loop3): mount failed 01:18:55 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, 0x0, 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) 01:18:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x2f, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:55 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0xb00) 01:18:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006060000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000002000400000000000800030000000af301000400000000000000000000000100000020000000000000000000000000000000000000000000000000000000000000000000000000000000c6d15a57000000000000000000000000000000000000000000000000ed8100001a040000d8f4655fd8f4655fd8f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000ec07159c000000000000000000000000000000000000000000000000ffa1000026000000d8f4655fd8f4655fd8f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3034363634343935392f66696c65302f66696c65300000000000000000000000000000000000000000000011b29fd4000000000000000000000000000000000000000000000000ed81", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:18:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a0900", 0x10, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000", 0x1a, 0x11080}], 0x0, &(0x7f0000013c00)) 01:18:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af3010004000000000000000000000003000000", 0x3c, 0x11100}], 0x0, &(0x7f0000013c00)) 01:18:55 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0xc00) 01:18:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x33, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 600.246054][ T8155] loop5: detected capacity change from 0 to 512 [ 600.252900][ T8153] loop4: detected capacity change from 0 to 512 [ 600.263356][ T8156] loop3: detected capacity change from 0 to 512 01:18:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006070000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:18:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x3a, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 600.290402][ T8155] EXT4-fs (loop5): 1 orphan inode deleted [ 600.296302][ T8155] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 600.307723][ T8155] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1389/file0 supports timestamps until 2038 (0x7fffffff) 01:18:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x3b, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x3c, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 600.330999][ T8153] EXT4-fs error (device loop4): ext4_fill_super:4822: inode #2: comm syz-executor.4: iget: root inode unallocated [ 600.343381][ T8153] EXT4-fs (loop4): get root inode failed [ 600.347476][ T8156] EXT4-fs error (device loop3): ext4_ext_check_inode:497: inode #3: comm syz-executor.3: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 600.349022][ T8153] EXT4-fs (loop4): mount failed [ 600.375976][ T8156] EXT4-fs error (device loop3): ext4_quota_enable:6323: comm syz-executor.3: Bad quota inode # 3 [ 600.389540][ T8156] EXT4-fs warning (device loop3): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 600.403909][ T8156] EXT4-fs (loop3): mount failed [ 600.438292][ T8178] loop5: detected capacity change from 0 to 512 [ 600.455916][ T8178] EXT4-fs (loop5): 1 orphan inode deleted [ 600.461733][ T8178] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 600.472959][ T8178] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1390/file0 supports timestamps until 2038 (0x7fffffff) 01:18:56 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0xd00) 01:18:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x3d, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:56 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, 0x0, 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) 01:18:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a0900", 0x10, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000", 0x1a, 0x11080}], 0x0, &(0x7f0000013c00)) 01:18:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d}], 0x0, &(0x7f0000013c00)) 01:18:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006080000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:18:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x8f, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:56 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0xe00) [ 601.119683][ T8189] loop4: detected capacity change from 0 to 512 [ 601.119883][ T8190] loop5: detected capacity change from 0 to 512 [ 601.132574][ T8187] loop3: detected capacity change from 0 to 512 [ 601.169902][ T8190] EXT4-fs (loop5): 1 orphan inode deleted [ 601.171427][ T8187] EXT4-fs error (device loop3): ext4_quota_enable:6323: comm syz-executor.3: Bad quota inode # 3 [ 601.175744][ T8190] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 601.189915][ T8187] EXT4-fs warning (device loop3): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 01:18:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x2, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006090000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000002000400000000000800030000000af301000400000000000000000000000100000020000000000000000000000000000000000000000000000000000000000000000000000000000000c6d15a57000000000000000000000000000000000000000000000000ed8100001a040000d8f4655fd8f4655fd8f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000ec07159c000000000000000000000000000000000000000000000000ffa1000026000000d8f4655fd8f4655fd8f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3034363634343935392f66696c65302f66696c65300000000000000000000000000000000000000000000011b29fd4000000000000000000000000000000000000000000000000ed81", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:18:56 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x1100) 01:18:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x3, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x4, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 601.199761][ T8189] EXT4-fs error (device loop4): ext4_fill_super:4822: inode #2: comm syz-executor.4: iget: root inode unallocated [ 601.213793][ T8187] EXT4-fs (loop3): mount failed [ 601.228758][ T8190] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1391/file0 supports timestamps until 2038 (0x7fffffff) [ 601.245249][ T8189] EXT4-fs (loop4): get root inode failed [ 601.250947][ T8189] EXT4-fs (loop4): mount failed [ 601.319794][ T8216] loop5: detected capacity change from 0 to 512 [ 601.343382][ T8216] EXT4-fs (loop5): 1 orphan inode deleted [ 601.349236][ T8216] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 601.360475][ T8216] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1392/file0 supports timestamps until 2038 (0x7fffffff) 01:18:57 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) 01:18:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d}], 0x0, &(0x7f0000013c00)) 01:18:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x5, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a0900", 0x10, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b}], 0x0, &(0x7f0000013c00)) 01:18:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x1200) 01:18:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060a0000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:18:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x2500) 01:18:57 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) [ 601.994149][ T8224] loop4: detected capacity change from 0 to 512 [ 602.001683][ T8228] loop5: detected capacity change from 0 to 512 [ 602.009224][ T8230] loop3: detected capacity change from 0 to 512 01:18:57 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) 01:18:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x4000) 01:18:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x6, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 602.045261][ T8224] EXT4-fs error (device loop4): ext4_fill_super:4822: inode #2: comm syz-executor.4: iget: root inode unallocated [ 602.069265][ T8228] EXT4-fs (loop5): 1 orphan inode deleted [ 602.075067][ T8228] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 01:18:57 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, 0x0, 0x1100) 01:18:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x4800) [ 602.091840][ T8224] EXT4-fs (loop4): get root inode failed [ 602.092790][ T8230] EXT4-fs error (device loop3): ext4_quota_enable:6323: comm syz-executor.3: Bad quota inode # 3 [ 602.097515][ T8224] EXT4-fs (loop4): mount failed [ 602.113388][ T8228] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1393/file0 supports timestamps until 2038 (0x7fffffff) [ 602.143965][ T8230] EXT4-fs warning (device loop3): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 602.165441][ T8230] EXT4-fs (loop3): mount failed 01:18:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d}], 0x0, &(0x7f0000013c00)) 01:18:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x7, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060b0000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:18:57 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, 0x0, 0x1100) 01:18:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x4c00) 01:18:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a0900", 0x10, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b}], 0x0, &(0x7f0000013c00)) 01:18:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x90, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x6800) 01:18:57 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, 0x0, 0x1100) [ 602.228617][ T8261] loop4: detected capacity change from 0 to 512 [ 602.239218][ T8254] loop5: detected capacity change from 0 to 512 01:18:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x6c00) 01:18:57 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7115}, 0x1100) 01:18:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2={0x0}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 602.267940][ T8261] EXT4-fs error (device loop4): ext4_fill_super:4822: inode #2: comm syz-executor.4: iget: root inode unallocated [ 602.290532][ T8266] loop3: detected capacity change from 0 to 512 [ 602.295782][ T8261] EXT4-fs (loop4): get root inode failed [ 602.302565][ T8261] EXT4-fs (loop4): mount failed [ 602.314644][ T8254] EXT4-fs (loop5): 1 orphan inode deleted [ 602.320486][ T8254] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 602.331921][ T8254] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1394/file0 supports timestamps until 2038 (0x7fffffff) [ 602.364528][ T8266] EXT4-fs error (device loop3): ext4_quota_enable:6323: comm syz-executor.3: Bad quota inode # 3 [ 602.385055][ T8266] EXT4-fs warning (device loop3): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 602.399521][ T8266] EXT4-fs (loop3): mount failed 01:18:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:18:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2={0xff, 0x3}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060c0000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:18:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a0900", 0x10, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b}], 0x0, &(0x7f0000013c00)) 01:18:57 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x7400) 01:18:57 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7115}, 0x1100) 01:18:58 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7115}, 0x1100) 01:18:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2={0xff, 0x5}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:58 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x7a00) 01:18:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2={0xff, 0xb}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 602.461875][ T8288] loop4: detected capacity change from 0 to 512 [ 602.463187][ T8290] loop5: detected capacity change from 0 to 512 [ 602.493745][ T8293] loop3: detected capacity change from 0 to 512 01:18:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2={0xff, 0x2, '\x00', 0x0}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:58 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f00000015c0), 0x0, 0x0, 0x0, 0x7115}, 0x1100) [ 602.528908][ T8290] EXT4-fs (loop5): 1 orphan inode deleted [ 602.534759][ T8290] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 602.552085][ T8288] EXT4-fs error (device loop4): ext4_fill_super:4822: inode #2: comm syz-executor.4: iget: root inode unallocated 01:18:58 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x1000000) 01:18:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2={0xff, 0x2, '\x00', 0x2}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060d0000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:18:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:18:58 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f00000015c0), 0x0, 0x0, 0x0, 0x7115}, 0x1100) 01:18:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) [ 602.568537][ T8290] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1395/file0 supports timestamps until 2038 (0x7fffffff) [ 602.574085][ T8288] EXT4-fs (loop4): get root inode failed [ 602.588654][ T8288] EXT4-fs (loop4): mount failed [ 602.595820][ T8293] EXT4-fs error (device loop3): ext4_fill_super:4822: inode #2: comm syz-executor.3: iget: root inode unallocated [ 602.609976][ T8293] EXT4-fs (loop3): get root inode failed [ 602.615650][ T8293] EXT4-fs (loop3): mount failed 01:18:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2={0xff, 0x2, '\x00', 0x3}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2={0xff, 0x2, '\x00', 0x5}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:58 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f00000015c0), 0x0, 0x0, 0x0, 0x7115}, 0x1100) 01:18:58 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x2000000) [ 602.672836][ T8320] loop4: detected capacity change from 0 to 512 [ 602.683016][ T8321] loop5: detected capacity change from 0 to 512 [ 602.692534][ T8323] loop3: detected capacity change from 0 to 512 01:18:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2={0xff, 0x2, '\x00', 0x8a}, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 602.728638][ T8323] EXT4-fs error (device loop3): ext4_fill_super:4822: inode #2: comm syz-executor.3: iget: root inode unallocated [ 602.743946][ T8323] EXT4-fs (loop3): get root inode failed [ 602.744670][ T8320] EXT4-fs (loop4): corrupt root inode, run e2fsck [ 602.749669][ T8323] EXT4-fs (loop3): mount failed [ 602.749839][ T8321] EXT4-fs (loop5): 1 orphan inode deleted [ 602.766744][ T8321] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 01:18:58 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f00000015c0)=[{0x0}], 0x1, 0x0, 0x0, 0x7115}, 0x1100) 01:18:58 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x3000000) 01:18:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060e0000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) [ 602.779101][ T8321] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1396/file0 supports timestamps until 2038 (0x7fffffff) [ 602.795499][ T8320] EXT4-fs (loop4): mount failed 01:18:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:18:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x2, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:58 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f00000015c0)=[{0x0}], 0x1, 0x0, 0x0, 0x7115}, 0x1100) 01:18:58 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x4000000) 01:18:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) 01:18:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x3, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:58 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f00000015c0)=[{0x0}], 0x1, 0x0, 0x0, 0x7115}, 0x1100) [ 602.867690][ T8347] loop5: detected capacity change from 0 to 512 [ 602.883417][ T8352] loop4: detected capacity change from 0 to 512 01:18:58 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x5000000) 01:18:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x4, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 602.918626][ T8359] loop3: detected capacity change from 0 to 512 [ 602.932704][ T8347] EXT4-fs (loop5): 1 orphan inode deleted [ 602.938472][ T8347] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 01:18:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x5, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:58 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) 01:18:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060f0000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) [ 602.960664][ T8347] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1397/file0 supports timestamps until 2038 (0x7fffffff) [ 603.018399][ T8352] EXT4-fs (loop4): corrupt root inode, run e2fsck [ 603.025151][ T8359] EXT4-fs error (device loop3): ext4_fill_super:4822: inode #2: comm syz-executor.3: iget: root inode unallocated [ 603.025200][ T8352] EXT4-fs (loop4): mount failed [ 603.039618][ T8359] EXT4-fs (loop3): get root inode failed [ 603.047741][ T8359] EXT4-fs (loop3): mount failed 01:18:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {0x0, 0x0, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:18:58 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x6000000) 01:18:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x6, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:58 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x3000000) [ 603.067405][ T8377] loop5: detected capacity change from 0 to 512 01:18:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {0x0, 0x0, 0x11080}], 0x0, &(0x7f0000013c00)) 01:18:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x7, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:58 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x7000000) [ 603.099547][ T8385] loop3: detected capacity change from 0 to 512 [ 603.129866][ T8389] loop4: detected capacity change from 0 to 512 01:18:58 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x1000000) [ 603.139682][ T8385] EXT4-fs error (device loop3): ext4_fill_super:4822: inode #2: comm syz-executor.3: iget: root inode unallocated [ 603.169400][ T8377] EXT4-fs (loop5): 1 orphan inode deleted [ 603.175178][ T8377] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 603.186479][ T8385] EXT4-fs (loop3): get root inode failed 01:18:58 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x1000000) 01:18:58 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x8000000) 01:18:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006100000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:18:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x90, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 603.188071][ T8377] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1398/file0 supports timestamps until 2038 (0x7fffffff) [ 603.192180][ T8385] EXT4-fs (loop3): mount failed [ 603.235479][ T8389] EXT4-fs error (device loop4): ext4_fill_super:4822: inode #2: comm syz-executor.4: iget: root inode unallocated 01:18:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {0x0, 0x0, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:18:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x300, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006070000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:18:58 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x9000000) [ 603.248335][ T8389] EXT4-fs (loop4): get root inode failed [ 603.254008][ T8389] EXT4-fs (loop4): mount failed 01:18:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {0x0, 0x0, 0x11080}], 0x0, &(0x7f0000013c00)) 01:18:58 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0xa000000) 01:18:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006070000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:18:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x500, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006070000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000002000400000000000800030000000af301000400000000000000000000000100000020000000000000000000000000000000000000000000000000000000000000000000000000000000c6d15a57000000000000000000000000000000000000000000000000ed8100001a040000d8f4655fd8f4655fd8f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000ec07159c000000000000000000000000000000000000000000000000ffa1000026000000d8f4655fd8f4655fd8f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3034363634343935392f66696c65302f66696c65300000000000000000000000000000000000000000000011b29fd4000000000000000000000000000000000000000000000000ed81", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) [ 603.314220][ T8412] loop5: detected capacity change from 0 to 512 [ 603.320870][ T8413] loop3: detected capacity change from 0 to 512 [ 603.345995][ T8413] EXT4-fs error (device loop3): ext4_fill_super:4822: inode #2: comm syz-executor.3: iget: root inode unallocated 01:18:58 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0xb000000) [ 603.363600][ T8412] EXT4-fs (loop5): 1 orphan inode deleted [ 603.363884][ T8424] loop4: detected capacity change from 0 to 512 [ 603.369334][ T8412] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 603.396633][ T8412] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1399/file0 supports timestamps until 2038 (0x7fffffff) 01:18:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006110000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:18:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x600, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 603.411166][ T8413] EXT4-fs (loop3): get root inode failed [ 603.416819][ T8413] EXT4-fs (loop3): mount failed [ 603.439972][ T8424] EXT4-fs error (device loop4): ext4_fill_super:4822: inode #2: comm syz-executor.4: iget: root inode unallocated [ 603.454459][ T8424] EXT4-fs (loop4): get root inode failed [ 603.460129][ T8424] EXT4-fs (loop4): mount failed 01:18:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {0x0, 0x0, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:18:59 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0xa) 01:18:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x700, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:59 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0xc000000) 01:18:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {0x0, 0x0, 0x11080}], 0x0, &(0x7f0000013c00)) 01:18:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x4000, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:59 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x3) 01:18:59 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0xd000000) [ 603.497884][ T8443] loop3: detected capacity change from 0 to 512 [ 603.530221][ T8445] loop5: detected capacity change from 0 to 512 01:18:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x9000, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 603.536986][ T8443] EXT4-fs error (device loop3): ext4_fill_super:4822: inode #2: comm syz-executor.3: iget: root inode unallocated [ 603.554693][ T8450] loop4: detected capacity change from 0 to 512 [ 603.574661][ T8443] EXT4-fs (loop3): get root inode failed [ 603.580334][ T8443] EXT4-fs (loop3): mount failed 01:18:59 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0xe000000) [ 603.591752][ T8450] EXT4-fs error (device loop4): ext4_fill_super:4822: inode #2: comm syz-executor.4: iget: root inode unallocated [ 603.592587][ T8445] EXT4-fs (loop5): 1 orphan inode deleted [ 603.609647][ T8445] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 603.624147][ T8450] EXT4-fs (loop4): get root inode failed [ 603.627945][ T8445] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1400/file0 supports timestamps until 2038 (0x7fffffff) [ 603.629838][ T8450] EXT4-fs (loop4): mount failed 01:18:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006120000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:18:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0xfffffdef, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:59 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x10000000) 01:18:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00), 0x0, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:18:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00), 0x0, 0x11080}], 0x0, &(0x7f0000013c00)) 01:18:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x2, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:59 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x11000000) 01:18:59 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) (fail_nth: 1) [ 603.702187][ T8470] loop4: detected capacity change from 0 to 512 [ 603.705493][ T8472] loop3: detected capacity change from 0 to 512 [ 603.749223][ T8470] EXT4-fs error (device loop4): ext4_fill_super:4822: inode #2: comm syz-executor.4: iget: root inode unallocated [ 603.762917][ T8482] FAULT_INJECTION: forcing a failure. [ 603.762917][ T8482] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 603.776241][ T8482] CPU: 1 PID: 8482 Comm: syz-executor.2 Not tainted 5.16.0-rc4-syzkaller #0 [ 603.777833][ T8470] EXT4-fs (loop4): get root inode failed [ 603.784957][ T8482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 603.784973][ T8482] Call Trace: [ 603.784979][ T8482] [ 603.784986][ T8482] dump_stack_lvl+0xd6/0x122 [ 603.790694][ T8470] EXT4-fs (loop4): mount failed [ 603.800787][ T8482] dump_stack+0x11/0x1b [ 603.820573][ T8482] should_fail+0x23c/0x250 [ 603.824996][ T8482] should_fail_usercopy+0x16/0x20 [ 603.830032][ T8482] _copy_from_user+0x1c/0xd0 [ 603.834714][ T8482] __sys_recvmsg+0x171/0x3f0 [ 603.839291][ T8482] ? get_pid_task+0x90/0xc0 [ 603.843826][ T8482] __x64_sys_recvmsg+0x42/0x50 [ 603.848667][ T8482] do_syscall_64+0x44/0xd0 [ 603.853121][ T8482] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 603.859248][ T8482] RIP: 0033:0x7f08236f2e99 [ 603.863710][ T8482] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 603.883325][ T8482] RSP: 002b:00007f0822869168 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 603.891729][ T8482] RAX: ffffffffffffffda RBX: 00007f0823805f60 RCX: 00007f08236f2e99 01:18:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x3, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 603.899684][ T8482] RDX: 0000000000000000 RSI: 0000000020001440 RDI: 0000000000000003 [ 603.907652][ T8482] RBP: 00007f08228691d0 R08: 0000000000000000 R09: 0000000000000000 [ 603.915610][ T8482] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 603.923716][ T8482] R13: 00007ffc6c8bf25f R14: 00007f0822869300 R15: 0000000000022000 [ 603.931823][ T8482] 01:18:59 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x12000000) [ 603.946442][ T8488] loop5: detected capacity change from 0 to 512 [ 603.966165][ T8472] EXT4-fs error (device loop3): ext4_fill_super:4822: inode #2: comm syz-executor.3: iget: root inode unallocated [ 603.978677][ T8472] EXT4-fs (loop3): get root inode failed [ 603.984440][ T8472] EXT4-fs (loop3): mount failed [ 603.992956][ T8488] EXT4-fs (loop5): 1 orphan inode deleted 01:18:59 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) (fail_nth: 2) 01:18:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x4, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006130000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:18:59 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x25000000) [ 603.998738][ T8488] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 604.010205][ T8488] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1401/file0 supports timestamps until 2038 (0x7fffffff) [ 604.056918][ T8497] FAULT_INJECTION: forcing a failure. [ 604.056918][ T8497] name failslab, interval 1, probability 0, space 0, times 0 [ 604.069602][ T8497] CPU: 1 PID: 8497 Comm: syz-executor.2 Not tainted 5.16.0-rc4-syzkaller #0 [ 604.078281][ T8497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 604.088363][ T8497] Call Trace: [ 604.091625][ T8497] [ 604.094542][ T8497] dump_stack_lvl+0xd6/0x122 [ 604.099158][ T8497] dump_stack+0x11/0x1b [ 604.103300][ T8497] should_fail+0x23c/0x250 [ 604.107700][ T8497] ? iovec_from_user+0x87/0x2e0 [ 604.112580][ T8497] __should_failslab+0x81/0x90 [ 604.117387][ T8497] should_failslab+0x5/0x20 [ 604.121911][ T8497] __kmalloc+0x6f/0x370 [ 604.126075][ T8497] ? debug_smp_processor_id+0x18/0x20 [ 604.131439][ T8497] iovec_from_user+0x87/0x2e0 [ 604.136108][ T8497] __import_iovec+0x57/0x2d0 [ 604.140748][ T8497] import_iovec+0xb8/0xd0 [ 604.145171][ T8497] __sys_recvmsg+0x3be/0x3f0 [ 604.149776][ T8497] __x64_sys_recvmsg+0x42/0x50 [ 604.154567][ T8497] do_syscall_64+0x44/0xd0 [ 604.159037][ T8497] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 604.164980][ T8497] RIP: 0033:0x7f08236f2e99 [ 604.169378][ T8497] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 604.189073][ T8497] RSP: 002b:00007f0822869168 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 604.197471][ T8497] RAX: ffffffffffffffda RBX: 00007f0823805f60 RCX: 00007f08236f2e99 01:18:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00), 0x0, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:18:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00), 0x0, 0x11080}], 0x0, &(0x7f0000013c00)) 01:18:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x5, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:59 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x40000000) 01:18:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 604.205464][ T8497] RDX: 0000000000000000 RSI: 0000000020001440 RDI: 0000000000000003 [ 604.213525][ T8497] RBP: 00007f08228691d0 R08: 0000000000000000 R09: 0000000000000000 [ 604.221481][ T8497] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 604.229437][ T8497] R13: 00007ffc6c8bf25f R14: 00007f0822869300 R15: 0000000000022000 [ 604.238006][ T8497] 01:18:59 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) (fail_nth: 3) [ 604.271833][ T8504] loop4: detected capacity change from 0 to 512 [ 604.281456][ T8506] loop5: detected capacity change from 0 to 512 [ 604.297029][ T8512] loop3: detected capacity change from 0 to 512 01:18:59 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x48000000) 01:18:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x7, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:18:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 604.315379][ T8504] EXT4-fs error (device loop4): ext4_fill_super:4822: inode #2: comm syz-executor.4: iget: root inode unallocated [ 604.331199][ T8506] EXT4-fs (loop5): 1 orphan inode deleted [ 604.337051][ T8506] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 604.354535][ T8504] EXT4-fs (loop4): get root inode failed [ 604.360253][ T8504] EXT4-fs (loop4): mount failed [ 604.360674][ T8519] FAULT_INJECTION: forcing a failure. [ 604.360674][ T8519] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 604.366203][ T8506] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1402/file0 supports timestamps until 2038 (0x7fffffff) [ 604.378319][ T8519] CPU: 1 PID: 8519 Comm: syz-executor.2 Not tainted 5.16.0-rc4-syzkaller #0 [ 604.378344][ T8519] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 604.411245][ T8519] Call Trace: [ 604.414522][ T8519] [ 604.417537][ T8519] dump_stack_lvl+0xd6/0x122 [ 604.422128][ T8519] dump_stack+0x11/0x1b [ 604.426396][ T8519] should_fail+0x23c/0x250 [ 604.430805][ T8519] should_fail_usercopy+0x16/0x20 [ 604.435854][ T8519] _copy_from_user+0x1c/0xd0 [ 604.440448][ T8519] iovec_from_user+0xc4/0x2e0 [ 604.445192][ T8519] __import_iovec+0x57/0x2d0 [ 604.449784][ T8519] import_iovec+0xb8/0xd0 [ 604.454174][ T8519] __sys_recvmsg+0x3be/0x3f0 [ 604.458808][ T8519] __x64_sys_recvmsg+0x42/0x50 [ 604.463569][ T8519] do_syscall_64+0x44/0xd0 [ 604.467975][ T8519] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 604.473975][ T8519] RIP: 0033:0x7f08236f2e99 [ 604.478381][ T8519] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 604.498092][ T8519] RSP: 002b:00007f0822869168 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 604.506510][ T8519] RAX: ffffffffffffffda RBX: 00007f0823805f60 RCX: 00007f08236f2e99 [ 604.514713][ T8519] RDX: 0000000000000000 RSI: 0000000020001440 RDI: 0000000000000003 01:19:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006180000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) [ 604.522670][ T8519] RBP: 00007f08228691d0 R08: 0000000000000000 R09: 0000000000000000 [ 604.530628][ T8519] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 604.538616][ T8519] R13: 00007ffc6c8bf25f R14: 00007f0822869300 R15: 0000000000022000 [ 604.546704][ T8519] [ 604.555775][ T24] kauditd_printk_skb: 611 callbacks suppressed 01:19:00 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) (fail_nth: 4) 01:19:00 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x4c000000) [ 604.555789][ T24] audit: type=1326 audit(1639358340.089:11487): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8524 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7febc7e7ce99 code=0x7ffc0000 [ 604.585971][ T24] audit: type=1326 audit(1639358340.089:11488): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8524 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7febc7e7ce99 code=0x7ffc0000 [ 604.610557][ T24] audit: type=1326 audit(1639358340.099:11489): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8524 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=83 compat=0 ip=0x7febc7e7ce99 code=0x7ffc0000 [ 604.630881][ T8527] FAULT_INJECTION: forcing a failure. [ 604.630881][ T8527] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 604.634726][ T24] audit: type=1326 audit(1639358340.099:11490): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8524 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7febc7e7ce99 code=0x7ffc0000 [ 604.647771][ T8527] CPU: 1 PID: 8527 Comm: syz-executor.2 Not tainted 5.16.0-rc4-syzkaller #0 [ 604.671722][ T24] audit: type=1326 audit(1639358340.099:11491): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8524 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7febc7e7ce99 code=0x7ffc0000 [ 604.680412][ T8527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 604.680427][ T8527] Call Trace: [ 604.680434][ T8527] [ 604.680440][ T8527] dump_stack_lvl+0xd6/0x122 [ 604.680465][ T8527] dump_stack+0x11/0x1b [ 604.704550][ T24] audit: type=1326 audit(1639358340.099:11492): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8524 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=165 compat=0 ip=0x7febc7e7ce99 code=0x7ffc0000 [ 604.714558][ T8527] should_fail+0x23c/0x250 [ 604.717853][ T24] audit: type=1326 audit(1639358340.099:11493): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8524 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7febc7e7ce99 code=0x7ffc0000 [ 604.720769][ T8527] should_fail_usercopy+0x16/0x20 [ 604.725346][ T24] audit: type=1326 audit(1639358340.099:11494): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8524 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7febc7e7ce99 code=0x7ffc0000 [ 604.729474][ T8527] _copy_to_iter+0x131/0xbe0 [ 604.753548][ T24] audit: type=1326 audit(1639358340.099:11495): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8524 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=2 compat=0 ip=0x7febc7e7ce99 code=0x7ffc0000 [ 604.757921][ T8527] ? check_stack_object+0x61/0x70 [ 604.781886][ T24] audit: type=1326 audit(1639358340.099:11496): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8524 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7febc7e7ce99 code=0x7ffc0000 [ 604.786873][ T8527] ? __virt_addr_valid+0x15a/0x1a0 [ 604.812913][ T8512] EXT4-fs error (device loop3): ext4_fill_super:4822: inode #2: comm syz-executor.3: iget: root inode unallocated [ 604.815367][ T8527] ? __check_object_size+0x253/0x310 [ 604.842763][ T8512] EXT4-fs (loop3): get root inode failed [ 604.844258][ T8527] simple_copy_to_iter+0x4c/0x60 [ 604.868429][ T8512] EXT4-fs (loop3): mount failed [ 604.873475][ T8527] __skb_datagram_iter+0x23c/0x520 [ 604.873502][ T8527] ? skb_copy_datagram_iter+0xf0/0xf0 [ 604.916651][ T8527] skb_copy_datagram_iter+0x36/0xf0 [ 604.921866][ T8527] tcp_recvmsg_locked+0xab9/0x1600 [ 604.927016][ T8527] tcp_recvmsg+0x16c/0x460 [ 604.931417][ T8527] inet_recvmsg+0xa3/0x210 [ 604.935895][ T8527] ? inet_sendpage+0xc0/0xc0 [ 604.940531][ T8527] ____sys_recvmsg+0x16c/0x320 [ 604.945289][ T8527] __sys_recvmsg+0x209/0x3f0 [ 604.949859][ T8527] __x64_sys_recvmsg+0x42/0x50 [ 604.954640][ T8527] do_syscall_64+0x44/0xd0 [ 604.959102][ T8527] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 604.964991][ T8527] RIP: 0033:0x7f08236f2e99 [ 604.969398][ T8527] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 604.989105][ T8527] RSP: 002b:00007f0822869168 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 604.997557][ T8527] RAX: ffffffffffffffda RBX: 00007f0823805f60 RCX: 00007f08236f2e99 [ 605.005559][ T8527] RDX: 0000000000000000 RSI: 0000000020001440 RDI: 0000000000000003 [ 605.013561][ T8527] RBP: 00007f08228691d0 R08: 0000000000000000 R09: 0000000000000000 01:19:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00), 0x0, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:19:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00), 0x0, 0x11080}], 0x0, &(0x7f0000013c00)) 01:19:00 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) (fail_nth: 5) 01:19:00 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x68000000) [ 605.021521][ T8527] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 605.029499][ T8527] R13: 00007ffc6c8bf25f R14: 00007f0822869300 R15: 0000000000022000 [ 605.037456][ T8527] 01:19:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 605.091548][ T8533] loop3: detected capacity change from 0 to 512 [ 605.101744][ T8536] loop4: detected capacity change from 0 to 512 [ 605.117331][ T8538] loop5: detected capacity change from 0 to 512 [ 605.122177][ T8540] FAULT_INJECTION: forcing a failure. [ 605.122177][ T8540] name failslab, interval 1, probability 0, space 0, times 0 [ 605.136333][ T8540] CPU: 0 PID: 8540 Comm: syz-executor.2 Not tainted 5.16.0-rc4-syzkaller #0 [ 605.145008][ T8540] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 605.155070][ T8540] Call Trace: [ 605.158373][ T8540] [ 605.161297][ T8540] dump_stack_lvl+0xd6/0x122 [ 605.165964][ T8540] dump_stack+0x11/0x1b [ 605.170129][ T8540] should_fail+0x23c/0x250 [ 605.174533][ T8540] __should_failslab+0x81/0x90 [ 605.179286][ T8540] should_failslab+0x5/0x20 [ 605.183775][ T8540] kmem_cache_alloc_node+0x61/0x2d0 [ 605.189018][ T8540] ? __check_object_size+0x253/0x310 [ 605.194299][ T8540] ? __alloc_skb+0xf0/0x450 [ 605.198805][ T8540] __alloc_skb+0xf0/0x450 [ 605.203205][ T8540] __tcp_send_ack+0x73/0x300 [ 605.207877][ T8540] tcp_send_ack+0x23/0x30 [ 605.212314][ T8540] tcp_cleanup_rbuf+0x1c4/0x310 [ 605.217165][ T8540] tcp_recvmsg_locked+0x109f/0x1600 [ 605.222412][ T8540] tcp_recvmsg+0x16c/0x460 [ 605.226821][ T8540] inet_recvmsg+0xa3/0x210 [ 605.231249][ T8540] ? inet_sendpage+0xc0/0xc0 [ 605.235830][ T8540] ____sys_recvmsg+0x16c/0x320 [ 605.240659][ T8540] __sys_recvmsg+0x209/0x3f0 [ 605.245235][ T8540] __x64_sys_recvmsg+0x42/0x50 [ 605.249981][ T8540] do_syscall_64+0x44/0xd0 [ 605.254385][ T8540] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 605.260272][ T8540] RIP: 0033:0x7f08236f2e99 [ 605.264668][ T8540] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 605.284259][ T8540] RSP: 002b:00007f0822869168 EFLAGS: 00000246 ORIG_RAX: 000000000000002f 01:19:00 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x6c000000) [ 605.292655][ T8540] RAX: ffffffffffffffda RBX: 00007f0823805f60 RCX: 00007f08236f2e99 [ 605.300664][ T8540] RDX: 0000000000000000 RSI: 0000000020001440 RDI: 0000000000000003 [ 605.308640][ T8540] RBP: 00007f08228691d0 R08: 0000000000000000 R09: 0000000000000000 [ 605.316593][ T8540] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 605.324545][ T8540] R13: 00007ffc6c8bf25f R14: 00007f0822869300 R15: 0000000000022000 [ 605.332508][ T8540] 01:19:00 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) (fail_nth: 6) 01:19:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 605.358797][ T8533] EXT4-fs error (device loop3): ext4_fill_super:4822: inode #2: comm syz-executor.3: iget: root inode unallocated [ 605.375542][ T8554] FAULT_INJECTION: forcing a failure. [ 605.375542][ T8554] name failslab, interval 1, probability 0, space 0, times 0 [ 605.388255][ T8554] CPU: 0 PID: 8554 Comm: syz-executor.2 Not tainted 5.16.0-rc4-syzkaller #0 [ 605.395399][ T8538] EXT4-fs (loop5): 1 orphan inode deleted [ 605.396994][ T8554] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 605.402721][ T8538] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 605.412735][ T8554] Call Trace: [ 605.412744][ T8554] [ 605.412750][ T8554] dump_stack_lvl+0xd6/0x122 [ 605.423947][ T8536] EXT4-fs error (device loop4): ext4_fill_super:4822: inode #2: comm syz-executor.4: iget: root inode unallocated [ 605.426917][ T8554] dump_stack+0x11/0x1b [ 605.431825][ T8536] EXT4-fs (loop4): get root inode failed [ 605.434512][ T8554] should_fail+0x23c/0x250 [ 605.434536][ T8554] __should_failslab+0x81/0x90 [ 605.446609][ T8536] EXT4-fs (loop4): mount failed [ 605.450728][ T8554] should_failslab+0x5/0x20 [ 605.475024][ T8554] kmem_cache_alloc_node_trace+0x61/0x310 [ 605.480737][ T8554] ? __kmalloc_node_track_caller+0x30/0x40 [ 605.486597][ T8554] __kmalloc_node_track_caller+0x30/0x40 [ 605.492333][ T8554] ? __tcp_send_ack+0x73/0x300 [ 605.497081][ T8554] __alloc_skb+0x19d/0x450 [ 605.501486][ T8554] __tcp_send_ack+0x73/0x300 [ 605.506071][ T8554] tcp_send_ack+0x23/0x30 [ 605.510394][ T8554] tcp_cleanup_rbuf+0x1c4/0x310 [ 605.515322][ T8554] tcp_recvmsg_locked+0x109f/0x1600 [ 605.520616][ T8554] tcp_recvmsg+0x16c/0x460 [ 605.525035][ T8554] inet_recvmsg+0xa3/0x210 [ 605.529448][ T8554] ? inet_sendpage+0xc0/0xc0 [ 605.534027][ T8554] ____sys_recvmsg+0x16c/0x320 [ 605.538788][ T8554] __sys_recvmsg+0x209/0x3f0 [ 605.543411][ T8554] __x64_sys_recvmsg+0x42/0x50 [ 605.548223][ T8554] do_syscall_64+0x44/0xd0 [ 605.552703][ T8554] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 605.558594][ T8554] RIP: 0033:0x7f08236f2e99 [ 605.562999][ T8554] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 605.582591][ T8554] RSP: 002b:00007f0822869168 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 605.591007][ T8554] RAX: ffffffffffffffda RBX: 00007f0823805f60 RCX: 00007f08236f2e99 [ 605.598964][ T8554] RDX: 0000000000000000 RSI: 0000000020001440 RDI: 0000000000000003 01:19:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000061b0000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000002000400000000000800030000000af301000400000000000000000000000100000020000000000000000000000000000000000000000000000000000000000000000000000000000000c6d15a57000000000000000000000000000000000000000000000000ed8100001a040000d8f4655fd8f4655fd8f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000ec07159c000000000000000000000000000000000000000000000000ffa1000026000000d8f4655fd8f4655fd8f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3034363634343935392f66696c65302f66696c65300000000000000000000000000000000000000000000011b29fd4000000000000000000000000000000000000000000000000ed81", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:19:01 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) (fail_nth: 7) 01:19:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 605.606918][ T8554] RBP: 00007f08228691d0 R08: 0000000000000000 R09: 0000000000000000 [ 605.614888][ T8554] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 605.622855][ T8554] R13: 00007ffc6c8bf25f R14: 00007f0822869300 R15: 0000000000022000 [ 605.630821][ T8554] [ 605.634714][ T8533] EXT4-fs (loop3): get root inode failed [ 605.640146][ T8538] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1403/file0 supports timestamps until 2038 (0x7fffffff) [ 605.640367][ T8533] EXT4-fs (loop3): mount failed [ 605.691712][ T8562] FAULT_INJECTION: forcing a failure. [ 605.691712][ T8562] name failslab, interval 1, probability 0, space 0, times 0 [ 605.704386][ T8562] CPU: 0 PID: 8562 Comm: syz-executor.2 Not tainted 5.16.0-rc4-syzkaller #0 [ 605.713054][ T8562] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 605.723211][ T8562] Call Trace: [ 605.726478][ T8562] [ 605.729396][ T8562] dump_stack_lvl+0xd6/0x122 [ 605.734048][ T8562] dump_stack+0x11/0x1b [ 605.738188][ T8562] should_fail+0x23c/0x250 [ 605.742586][ T8562] __should_failslab+0x81/0x90 [ 605.747336][ T8562] should_failslab+0x5/0x20 [ 605.752041][ T8562] kmem_cache_alloc_node+0x61/0x2d0 [ 605.757229][ T8562] ? __this_cpu_preempt_check+0x18/0x20 [ 605.762815][ T8562] ? do_softirq+0xbe/0xf0 [ 605.767140][ T8562] ? __alloc_skb+0xf0/0x450 [ 605.771634][ T8562] __alloc_skb+0xf0/0x450 [ 605.775950][ T8562] tcp_stream_alloc_skb+0x65/0x4e0 [ 605.781047][ T8562] tcp_write_xmit+0xb15/0x4460 [ 605.785798][ T8562] ? tcp_current_mss+0xe5/0x120 [ 605.790702][ T8562] __tcp_push_pending_frames+0x68/0x1c0 [ 605.796323][ T8562] tcp_data_snd_check+0x62/0x2e0 [ 605.801317][ T8562] tcp_rcv_established+0x880/0x10e0 [ 605.806558][ T8562] tcp_v4_do_rcv+0x2a8/0x590 [ 605.811182][ T8562] __release_sock+0xf2/0x270 [ 605.815827][ T8562] release_sock+0x40/0x110 [ 605.820251][ T8562] tcp_recvmsg+0x17b/0x460 [ 605.824654][ T8562] inet_recvmsg+0xa3/0x210 [ 605.829208][ T8562] ? inet_sendpage+0xc0/0xc0 [ 605.833850][ T8562] ____sys_recvmsg+0x16c/0x320 [ 605.838690][ T8562] __sys_recvmsg+0x209/0x3f0 [ 605.843269][ T8562] __x64_sys_recvmsg+0x42/0x50 [ 605.848038][ T8562] do_syscall_64+0x44/0xd0 [ 605.852469][ T8562] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 605.858393][ T8562] RIP: 0033:0x7f08236f2e99 [ 605.862791][ T8562] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 605.882461][ T8562] RSP: 002b:00007f0822869168 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 605.890860][ T8562] RAX: ffffffffffffffda RBX: 00007f0823805f60 RCX: 00007f08236f2e99 [ 605.898814][ T8562] RDX: 0000000000000000 RSI: 0000000020001440 RDI: 0000000000000003 [ 605.906768][ T8562] RBP: 00007f08228691d0 R08: 0000000000000000 R09: 0000000000000000 [ 605.914721][ T8562] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 605.922690][ T8562] R13: 00007ffc6c8bf25f R14: 00007f0822869300 R15: 0000000000022000 [ 605.930658][ T8562] 01:19:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f465", 0xf, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:19:01 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x74000000) 01:19:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x2, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4", 0xe, 0x11080}], 0x0, &(0x7f0000013c00)) 01:19:01 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) (fail_nth: 8) [ 605.947879][ T8564] loop5: detected capacity change from 0 to 512 [ 605.982479][ T8571] loop4: detected capacity change from 0 to 512 [ 605.992473][ T8576] loop3: detected capacity change from 0 to 512 [ 605.995413][ T8575] FAULT_INJECTION: forcing a failure. [ 605.995413][ T8575] name failslab, interval 1, probability 0, space 0, times 0 [ 606.011382][ T8575] CPU: 1 PID: 8575 Comm: syz-executor.2 Not tainted 5.16.0-rc4-syzkaller #0 [ 606.020367][ T8575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 606.030424][ T8575] Call Trace: [ 606.033802][ T8575] [ 606.036737][ T8575] dump_stack_lvl+0xd6/0x122 [ 606.041325][ T8575] dump_stack+0x11/0x1b [ 606.045476][ T8575] should_fail+0x23c/0x250 [ 606.049922][ T8575] __should_failslab+0x81/0x90 [ 606.054685][ T8575] should_failslab+0x5/0x20 [ 606.059267][ T8575] kmem_cache_alloc_node_trace+0x61/0x310 [ 606.065064][ T8575] ? __kmalloc_node_track_caller+0x30/0x40 [ 606.070858][ T8575] __kmalloc_node_track_caller+0x30/0x40 [ 606.076477][ T8575] ? tcp_stream_alloc_skb+0x65/0x4e0 [ 606.081778][ T8575] __alloc_skb+0x19d/0x450 [ 606.086183][ T8575] tcp_stream_alloc_skb+0x65/0x4e0 [ 606.091347][ T8575] tcp_write_xmit+0xb15/0x4460 [ 606.096137][ T8575] ? tcp_current_mss+0xe5/0x120 [ 606.101041][ T8575] __tcp_push_pending_frames+0x68/0x1c0 [ 606.106574][ T8575] tcp_data_snd_check+0x62/0x2e0 [ 606.111503][ T8575] tcp_rcv_established+0x880/0x10e0 [ 606.116692][ T8575] tcp_v4_do_rcv+0x2a8/0x590 [ 606.121271][ T8575] __release_sock+0xf2/0x270 [ 606.125849][ T8575] release_sock+0x40/0x110 [ 606.130346][ T8575] tcp_recvmsg+0x17b/0x460 [ 606.134775][ T8575] inet_recvmsg+0xa3/0x210 [ 606.139185][ T8575] ? inet_sendpage+0xc0/0xc0 [ 606.143783][ T8575] ____sys_recvmsg+0x16c/0x320 [ 606.148538][ T8575] __sys_recvmsg+0x209/0x3f0 [ 606.153156][ T8575] __x64_sys_recvmsg+0x42/0x50 [ 606.157936][ T8575] do_syscall_64+0x44/0xd0 [ 606.162390][ T8575] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 606.168279][ T8575] RIP: 0033:0x7f08236f2e99 [ 606.172677][ T8575] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 01:19:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x3, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:01 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x7a000000) [ 606.192270][ T8575] RSP: 002b:00007f0822869168 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 606.200664][ T8575] RAX: ffffffffffffffda RBX: 00007f0823805f60 RCX: 00007f08236f2e99 [ 606.208791][ T8575] RDX: 0000000000000000 RSI: 0000000020001440 RDI: 0000000000000003 [ 606.216919][ T8575] RBP: 00007f08228691d0 R08: 0000000000000000 R09: 0000000000000000 [ 606.224944][ T8575] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 606.233000][ T8575] R13: 00007ffc6c8bf25f R14: 00007f0822869300 R15: 0000000000022000 [ 606.241006][ T8575] 01:19:01 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) (fail_nth: 9) 01:19:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x4, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 606.263272][ T8564] EXT4-fs (loop5): 1 orphan inode deleted [ 606.269036][ T8564] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 606.283018][ T8576] EXT4-fs error (device loop3): ext4_fill_super:4822: inode #2: comm syz-executor.3: iget: root inode unallocated [ 606.296105][ T8571] EXT4-fs error (device loop4): ext4_fill_super:4822: inode #2: comm syz-executor.4: iget: root inode unallocated [ 606.304311][ T8564] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1404/file0 supports timestamps until 2038 (0x7fffffff) [ 606.314795][ T8587] FAULT_INJECTION: forcing a failure. [ 606.314795][ T8587] name failslab, interval 1, probability 0, space 0, times 0 [ 606.333964][ T8571] EXT4-fs (loop4): get root inode failed [ 606.335140][ T8587] CPU: 0 PID: 8587 Comm: syz-executor.2 Not tainted 5.16.0-rc4-syzkaller #0 [ 606.340728][ T8571] EXT4-fs (loop4): mount failed 01:19:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006220000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:19:01 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0xa1ffffff) 01:19:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x5, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 606.349347][ T8587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 606.356218][ T8576] EXT4-fs (loop3): get root inode failed [ 606.364208][ T8587] Call Trace: [ 606.364218][ T8587] [ 606.364225][ T8587] dump_stack_lvl+0xd6/0x122 [ 606.364294][ T8587] dump_stack+0x11/0x1b [ 606.369868][ T8576] EXT4-fs (loop3): mount failed [ 606.373129][ T8587] should_fail+0x23c/0x250 [ 606.373149][ T8587] __should_failslab+0x81/0x90 [ 606.398705][ T8587] should_failslab+0x5/0x20 [ 606.403286][ T8587] kmem_cache_alloc_node+0x61/0x2d0 [ 606.408489][ T8587] ? __mod_timer+0xa5d/0xc30 [ 606.413079][ T8587] ? __alloc_skb+0xf0/0x450 [ 606.417586][ T8587] __alloc_skb+0xf0/0x450 [ 606.422090][ T8587] tcp_stream_alloc_skb+0x65/0x4e0 [ 606.427238][ T8587] tcp_write_xmit+0xb15/0x4460 [ 606.432031][ T8587] ? tcp_current_mss+0xe5/0x120 [ 606.436912][ T8587] __tcp_push_pending_frames+0x68/0x1c0 [ 606.442443][ T8587] tcp_data_snd_check+0x62/0x2e0 [ 606.447379][ T8587] tcp_rcv_established+0x880/0x10e0 [ 606.452618][ T8587] tcp_v4_do_rcv+0x2a8/0x590 [ 606.457192][ T8587] __release_sock+0xf2/0x270 [ 606.461769][ T8587] release_sock+0x40/0x110 [ 606.466167][ T8587] tcp_recvmsg+0x17b/0x460 [ 606.470659][ T8587] inet_recvmsg+0xa3/0x210 [ 606.475106][ T8587] ? inet_sendpage+0xc0/0xc0 [ 606.479712][ T8587] ____sys_recvmsg+0x16c/0x320 [ 606.484507][ T8587] __sys_recvmsg+0x209/0x3f0 [ 606.489084][ T8587] __x64_sys_recvmsg+0x42/0x50 [ 606.493852][ T8587] do_syscall_64+0x44/0xd0 [ 606.498254][ T8587] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 606.504135][ T8587] RIP: 0033:0x7f08236f2e99 [ 606.508533][ T8587] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 606.528145][ T8587] RSP: 002b:00007f0822869168 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 606.536542][ T8587] RAX: ffffffffffffffda RBX: 00007f0823805f60 RCX: 00007f08236f2e99 [ 606.544547][ T8587] RDX: 0000000000000000 RSI: 0000000020001440 RDI: 0000000000000003 [ 606.552570][ T8587] RBP: 00007f08228691d0 R08: 0000000000000000 R09: 0000000000000000 01:19:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f465", 0xf, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:19:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x6, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:02 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0xeaffffff) 01:19:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4", 0xe, 0x11080}], 0x0, &(0x7f0000013c00)) 01:19:02 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) (fail_nth: 10) [ 606.560526][ T8587] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 606.568479][ T8587] R13: 00007ffc6c8bf25f R14: 00007f0822869300 R15: 0000000000022000 [ 606.576437][ T8587] [ 606.633919][ T8601] loop3: detected capacity change from 0 to 512 [ 606.639503][ T8603] loop4: detected capacity change from 0 to 512 [ 606.647040][ T8600] FAULT_INJECTION: forcing a failure. [ 606.647040][ T8600] name failslab, interval 1, probability 0, space 0, times 0 [ 606.659750][ T8600] CPU: 1 PID: 8600 Comm: syz-executor.2 Not tainted 5.16.0-rc4-syzkaller #0 [ 606.668419][ T8600] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 606.678485][ T8600] Call Trace: [ 606.681759][ T8600] [ 606.684670][ T8600] dump_stack_lvl+0xd6/0x122 [ 606.689250][ T8600] dump_stack+0x11/0x1b [ 606.693390][ T8600] should_fail+0x23c/0x250 [ 606.697818][ T8600] __should_failslab+0x81/0x90 [ 606.702595][ T8600] should_failslab+0x5/0x20 [ 606.707085][ T8600] kmem_cache_alloc_node_trace+0x61/0x310 [ 606.712797][ T8600] ? __kmalloc_node_track_caller+0x30/0x40 [ 606.718589][ T8600] __kmalloc_node_track_caller+0x30/0x40 [ 606.724225][ T8600] ? tcp_stream_alloc_skb+0x65/0x4e0 [ 606.729499][ T8600] __alloc_skb+0x19d/0x450 [ 606.733947][ T8600] tcp_stream_alloc_skb+0x65/0x4e0 [ 606.739048][ T8600] tcp_write_xmit+0xb15/0x4460 [ 606.743848][ T8600] ? tcp_current_mss+0xe5/0x120 [ 606.748774][ T8600] __tcp_push_pending_frames+0x68/0x1c0 [ 606.754332][ T8600] tcp_data_snd_check+0x62/0x2e0 [ 606.759261][ T8600] tcp_rcv_established+0x880/0x10e0 [ 606.764449][ T8600] tcp_v4_do_rcv+0x2a8/0x590 [ 606.769066][ T8600] __release_sock+0xf2/0x270 [ 606.773643][ T8600] release_sock+0x40/0x110 [ 606.778109][ T8600] tcp_recvmsg+0x17b/0x460 [ 606.782511][ T8600] inet_recvmsg+0xa3/0x210 [ 606.786929][ T8600] ? inet_sendpage+0xc0/0xc0 [ 606.791580][ T8600] ____sys_recvmsg+0x16c/0x320 [ 606.796403][ T8600] __sys_recvmsg+0x209/0x3f0 [ 606.801032][ T8600] __x64_sys_recvmsg+0x42/0x50 [ 606.805782][ T8600] do_syscall_64+0x44/0xd0 [ 606.810249][ T8600] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 606.816131][ T8600] RIP: 0033:0x7f08236f2e99 [ 606.820562][ T8600] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 606.840166][ T8600] RSP: 002b:00007f0822869168 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 606.848596][ T8600] RAX: ffffffffffffffda RBX: 00007f0823805f60 RCX: 00007f08236f2e99 [ 606.856552][ T8600] RDX: 0000000000000000 RSI: 0000000020001440 RDI: 0000000000000003 [ 606.864528][ T8600] RBP: 00007f08228691d0 R08: 0000000000000000 R09: 0000000000000000 [ 606.872618][ T8600] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 01:19:02 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0xfeffffff) 01:19:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x7, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:02 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0xffffffa1) 01:19:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x90, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 606.880573][ T8600] R13: 00007ffc6c8bf25f R14: 00007f0822869300 R15: 0000000000022000 [ 606.888532][ T8600] [ 606.892224][ T8605] loop5: detected capacity change from 0 to 512 [ 606.958811][ T8603] EXT4-fs error (device loop4): ext4_fill_super:4822: inode #2: comm syz-executor.4: iget: root inode unallocated [ 606.974953][ T8601] EXT4-fs error (device loop3): ext4_fill_super:4822: inode #2: comm syz-executor.3: iget: root inode unallocated [ 606.983887][ T8605] EXT4-fs (loop5): 1 orphan inode deleted [ 606.991667][ T8603] EXT4-fs (loop4): get root inode failed 01:19:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006230000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000002000400000000000800030000000af301000400000000000000000000000100000020000000000000000000000000000000000000000000000000000000000000000000000000000000c6d15a57000000000000000000000000000000000000000000000000ed8100001a040000d8f4655fd8f4655fd8f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000ec07159c000000000000000000000000000000000000000000000000ffa1000026000000d8f4655fd8f4655fd8f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3034363634343935392f66696c65302f66696c65300000000000000000000000000000000000000000000011b29fd4000000000000000000000000000000000000000000000000ed81", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:19:02 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) (fail_nth: 11) 01:19:02 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0xffffffea) [ 606.992766][ T8605] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 606.998384][ T8603] EXT4-fs (loop4): mount failed [ 607.011755][ T8605] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1405/file0 supports timestamps until 2038 (0x7fffffff) [ 607.016096][ T8601] EXT4-fs (loop3): get root inode failed [ 607.034125][ T8601] EXT4-fs (loop3): mount failed [ 607.053261][ T8622] FAULT_INJECTION: forcing a failure. [ 607.053261][ T8622] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 607.066498][ T8622] CPU: 1 PID: 8622 Comm: syz-executor.2 Not tainted 5.16.0-rc4-syzkaller #0 [ 607.075194][ T8622] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 607.085232][ T8622] Call Trace: [ 607.088492][ T8622] [ 607.091412][ T8622] dump_stack_lvl+0xd6/0x122 [ 607.095992][ T8622] dump_stack+0x11/0x1b [ 607.100133][ T8622] should_fail+0x23c/0x250 [ 607.104540][ T8622] should_fail_usercopy+0x16/0x20 [ 607.109545][ T8622] _copy_to_user+0x1c/0x90 [ 607.113948][ T8622] simple_read_from_buffer+0xab/0x120 [ 607.119337][ T8622] proc_fail_nth_read+0x10d/0x150 [ 607.124386][ T8622] ? proc_fault_inject_write+0x230/0x230 [ 607.129997][ T8622] vfs_read+0x1e6/0x750 [ 607.134134][ T8622] ? __fget_files+0x20d/0x220 [ 607.138896][ T8622] ksys_read+0xd9/0x190 [ 607.143032][ T8622] __x64_sys_read+0x3e/0x50 [ 607.147663][ T8622] do_syscall_64+0x44/0xd0 [ 607.152274][ T8622] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 607.158236][ T8622] RIP: 0033:0x7f08236a5a4c [ 607.162658][ T8622] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 607.182244][ T8622] RSP: 002b:00007f0822869160 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 607.190641][ T8622] RAX: ffffffffffffffda RBX: 00007f0823805f60 RCX: 00007f08236a5a4c [ 607.198608][ T8622] RDX: 000000000000000f RSI: 00007f08228691e0 RDI: 0000000000000004 [ 607.206564][ T8622] RBP: 00007f08228691d0 R08: 0000000000000000 R09: 0000000000000000 [ 607.214699][ T8622] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 607.222662][ T8622] R13: 00007ffc6c8bf25f R14: 00007f0822869300 R15: 0000000000022000 [ 607.230687][ T8622] 01:19:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f465", 0xf, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:19:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:02 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0xfffffffe) 01:19:02 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) 01:19:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4", 0xe, 0x11080}], 0x0, &(0x7f0000013c00)) 01:19:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x2, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:02 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0x2, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) 01:19:02 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x100000000000000) [ 607.258244][ T8625] loop5: detected capacity change from 0 to 512 [ 607.282260][ T8629] loop3: detected capacity change from 0 to 512 [ 607.295298][ T8636] loop4: detected capacity change from 0 to 512 01:19:02 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x200000000000000) [ 607.338277][ T8625] EXT4-fs (loop5): 1 orphan inode deleted [ 607.344084][ T8625] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 607.374441][ T8625] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1406/file0 supports timestamps until 2038 (0x7fffffff) 01:19:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006240000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:19:02 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0x3, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) 01:19:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x3, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 607.374845][ T8636] EXT4-fs error (device loop4): ext4_fill_super:4822: inode #2: comm syz-executor.4: iget: root inode unallocated [ 607.402229][ T8636] EXT4-fs (loop4): get root inode failed [ 607.404640][ T8629] EXT4-fs error (device loop3): ext4_fill_super:4822: inode #2: comm syz-executor.3: iget: root inode unallocated [ 607.407956][ T8636] EXT4-fs (loop4): mount failed [ 607.432666][ T8629] EXT4-fs (loop3): get root inode failed [ 607.438333][ T8629] EXT4-fs (loop3): mount failed 01:19:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f0000", 0x16, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:19:03 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x300000000000000) 01:19:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x4, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:03 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0x10, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) 01:19:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00", 0x15, 0x11080}], 0x0, &(0x7f0000013c00)) 01:19:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x5, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x6, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:03 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x400000000000000) 01:19:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x7, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 607.479299][ T8656] loop5: detected capacity change from 0 to 512 [ 607.495569][ T8661] loop3: detected capacity change from 0 to 512 [ 607.503788][ T8665] loop4: detected capacity change from 0 to 512 [ 607.512761][ T8656] EXT4-fs (loop5): 1 orphan inode deleted [ 607.518510][ T8656] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 01:19:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006250000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:19:03 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0x14, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) 01:19:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x90, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 607.575111][ T8656] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1407/file0 supports timestamps until 2038 (0x7fffffff) [ 607.593201][ T8661] EXT4-fs error (device loop3): ext4_fill_super:4822: inode #2: comm syz-executor.3: iget: root inode unallocated [ 607.606974][ T8665] EXT4-fs error (device loop4): ext4_fill_super:4822: inode #2: comm syz-executor.4: iget: root inode unallocated 01:19:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f0000", 0x16, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:19:03 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x500000000000000) 01:19:03 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xed, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) 01:19:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x300, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 607.626129][ T8665] EXT4-fs (loop4): get root inode failed [ 607.626129][ T8661] EXT4-fs (loop3): get root inode failed [ 607.626146][ T8665] EXT4-fs (loop4): mount failed [ 607.631837][ T8661] EXT4-fs (loop3): mount failed 01:19:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00", 0x15, 0x11080}], 0x0, &(0x7f0000013c00)) 01:19:03 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x600000000000000) 01:19:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x500, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:03 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x20001844}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) [ 607.702415][ T8689] loop3: detected capacity change from 0 to 512 [ 607.713527][ T8694] loop5: detected capacity change from 0 to 512 [ 607.723049][ T8689] EXT4-fs error (device loop3): ext4_fill_super:4822: inode #2: comm syz-executor.3: iget: root inode unallocated [ 607.728481][ T8698] loop4: detected capacity change from 0 to 512 [ 607.735864][ T8689] EXT4-fs (loop3): get root inode failed [ 607.746985][ T8689] EXT4-fs (loop3): mount failed 01:19:03 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x700000000000000) [ 607.766412][ T8694] EXT4-fs (loop5): 1 orphan inode deleted [ 607.772223][ T8694] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 01:19:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000062e0000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:19:03 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x800000000000000) 01:19:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x600, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f0000", 0x16, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:19:03 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x7ffff000}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) [ 607.806536][ T8694] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1408/file0 supports timestamps until 2038 (0x7fffffff) [ 607.814249][ T8698] EXT4-fs error (device loop4): ext4_fill_super:4822: inode #2: comm syz-executor.4: iget: root inode unallocated 01:19:03 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x900000000000000) 01:19:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x700, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 607.864051][ T8698] EXT4-fs (loop4): get root inode failed [ 607.866209][ T8718] loop3: detected capacity change from 0 to 512 [ 607.869730][ T8698] EXT4-fs (loop4): mount failed 01:19:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00", 0x15, 0x11080}], 0x0, &(0x7f0000013c00)) 01:19:03 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x8, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) 01:19:03 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0xa00000000000000) 01:19:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x4000, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x9000, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 607.908039][ T8718] EXT4-fs error (device loop3): ext4_fill_super:4822: inode #2: comm syz-executor.3: iget: root inode unallocated [ 607.932568][ T8718] EXT4-fs (loop3): get root inode failed [ 607.938241][ T8718] EXT4-fs (loop3): mount failed [ 607.971721][ T8732] loop4: detected capacity change from 0 to 512 [ 607.992206][ T8735] loop5: detected capacity change from 0 to 512 01:19:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000063a0000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:19:03 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0xb00000000000000) 01:19:03 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7103}, 0x0) 01:19:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000", 0x1a, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:19:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 608.014240][ T8732] EXT4-fs error (device loop4): ext4_fill_super:4822: inode #2: comm syz-executor.4: iget: root inode unallocated [ 608.029065][ T8732] EXT4-fs (loop4): get root inode failed [ 608.034769][ T8732] EXT4-fs (loop4): mount failed [ 608.037199][ T8735] EXT4-fs (loop5): 1 orphan inode deleted [ 608.045555][ T8735] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 608.056606][ T8735] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1409/file0 supports timestamps until 2038 (0x7fffffff) 01:19:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x2, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:03 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x2) 01:19:03 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0xc00000000000000) 01:19:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000", 0x18, 0x11080}], 0x0, &(0x7f0000013c00)) 01:19:03 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x3) [ 608.092126][ T8748] loop3: detected capacity change from 0 to 512 01:19:03 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x4) 01:19:03 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0xd00000000000000) [ 608.143893][ T8748] EXT4-fs error (device loop3): ext4_fill_super:4822: inode #2: comm syz-executor.3: iget: root inode unallocated [ 608.145431][ T8755] loop5: detected capacity change from 0 to 512 [ 608.156453][ T8760] loop4: detected capacity change from 0 to 512 [ 608.170306][ T8748] EXT4-fs (loop3): get root inode failed [ 608.176029][ T8748] EXT4-fs (loop3): mount failed [ 608.224131][ T8760] EXT4-fs error (device loop4): ext4_fill_super:4822: inode #2: comm syz-executor.4: iget: root inode unallocated [ 608.236992][ T8760] EXT4-fs (loop4): get root inode failed [ 608.242684][ T8760] EXT4-fs (loop4): mount failed [ 608.246151][ T8755] EXT4-fs (loop5): 1 orphan inode deleted [ 608.253375][ T8755] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 01:19:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000063b0000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000002000400000000000800030000000af301000400000000000000000000000100000020000000000000000000000000000000000000000000000000000000000000000000000000000000c6d15a57000000000000000000000000000000000000000000000000ed8100001a040000d8f4655fd8f4655fd8f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000ec07159c000000000000000000000000000000000000000000000000ffa1000026000000d8f4655fd8f4655fd8f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3034363634343935392f66696c65302f66696c65300000000000000000000000000000000000000000000011b29fd4000000000000000000000000000000000000000000000000ed81", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:19:03 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0xe00000000000000) 01:19:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x3, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:03 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x5) 01:19:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000", 0x1a, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:19:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000", 0x18, 0x11080}], 0x0, &(0x7f0000013c00)) [ 608.264561][ T8755] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1410/file0 supports timestamps until 2038 (0x7fffffff) 01:19:03 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x6) 01:19:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x4, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 608.307818][ T8776] loop3: detected capacity change from 0 to 512 [ 608.327263][ T8780] loop4: detected capacity change from 0 to 512 [ 608.339744][ T8776] EXT4-fs error (device loop3): ext4_fill_super:4822: inode #2: comm syz-executor.3: iget: root inode unallocated 01:19:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x5, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:03 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x1000000000000000) 01:19:03 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x7) 01:19:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x6, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 608.358555][ T8776] EXT4-fs (loop3): get root inode failed [ 608.364369][ T8776] EXT4-fs (loop3): mount failed [ 608.380956][ T8790] loop5: detected capacity change from 0 to 512 [ 608.392603][ T8780] EXT4-fs error (device loop4): ext4_fill_super:4822: inode #2: comm syz-executor.4: iget: root inode unallocated [ 608.416328][ T8780] EXT4-fs (loop4): get root inode failed [ 608.422030][ T8780] EXT4-fs (loop4): mount failed [ 608.453826][ T8790] EXT4-fs (loop5): 1 orphan inode deleted 01:19:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006480000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:19:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000", 0x1a, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:19:04 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x8) 01:19:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x7, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:04 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x1100000000000000) 01:19:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000", 0x18, 0x11080}], 0x0, &(0x7f0000013c00)) [ 608.459603][ T8790] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 608.470929][ T8790] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1411/file0 supports timestamps until 2038 (0x7fffffff) 01:19:04 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0xa) 01:19:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x90, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:04 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0xf) 01:19:04 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x1200000000000000) [ 608.511755][ T8809] loop3: detected capacity change from 0 to 512 [ 608.520656][ T8810] loop4: detected capacity change from 0 to 512 [ 608.548578][ T8810] EXT4-fs error (device loop4): ext4_fill_super:4822: inode #2: comm syz-executor.4: iget: root inode unallocated 01:19:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x300, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x500, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 608.569280][ T8819] loop5: detected capacity change from 0 to 512 [ 608.581131][ T8809] EXT4-fs error (device loop3): ext4_fill_super:4822: inode #2: comm syz-executor.3: iget: root inode unallocated [ 608.593283][ T8810] EXT4-fs (loop4): get root inode failed [ 608.594553][ T8809] EXT4-fs (loop3): get root inode failed [ 608.598942][ T8810] EXT4-fs (loop4): mount failed [ 608.604596][ T8809] EXT4-fs (loop3): mount failed 01:19:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000064c0000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:19:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f0000000000000400", 0x1c, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:19:04 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x2500000000000000) 01:19:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x600, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:04 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x14) 01:19:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000", 0x1a, 0x11080}], 0x0, &(0x7f0000013c00)) [ 608.645042][ T8819] EXT4-fs (loop5): 1 orphan inode deleted [ 608.650827][ T8819] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 608.661861][ T8819] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1412/file0 supports timestamps until 2038 (0x7fffffff) 01:19:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x700, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:04 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x34) 01:19:04 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x4000000000000000) 01:19:04 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x74) [ 608.710287][ T8837] loop4: detected capacity change from 0 to 512 [ 608.718428][ T8840] loop3: detected capacity change from 0 to 512 01:19:04 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x4800000000000000) 01:19:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f0000000000000400", 0x1c, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) [ 608.767089][ T8840] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 608.767862][ T8845] loop5: detected capacity change from 0 to 512 [ 608.773710][ T8840] EXT4-fs (loop3): mount failed [ 608.803428][ T8837] EXT4-fs error (device loop4): ext4_fill_super:4822: inode #2: comm syz-executor.4: iget: root inode unallocated [ 608.826659][ T8857] loop3: detected capacity change from 0 to 512 [ 608.833167][ T8837] EXT4-fs (loop4): get root inode failed [ 608.838915][ T8837] EXT4-fs (loop4): mount failed [ 608.852357][ T8857] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 608.858901][ T8857] EXT4-fs (loop3): mount failed [ 608.867287][ T8845] EXT4-fs (loop5): 1 orphan inode deleted 01:19:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006600000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:19:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x4000, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:04 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1de) 01:19:04 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x4c00000000000000) 01:19:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f0000000000000400", 0x1c, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:19:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000", 0x1a, 0x11080}], 0x0, &(0x7f0000013c00)) [ 608.873132][ T8845] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 608.884377][ T8845] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1413/file0 supports timestamps until 2038 (0x7fffffff) 01:19:04 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1f4) 01:19:04 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x241) 01:19:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x9000, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:04 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x6800000000000000) [ 608.945365][ T8870] loop3: detected capacity change from 0 to 512 [ 608.955709][ T8872] loop4: detected capacity change from 0 to 512 [ 608.966825][ T8876] loop5: detected capacity change from 0 to 512 01:19:04 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x244) 01:19:04 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x300) [ 609.004716][ T8876] EXT4-fs (loop5): 1 orphan inode deleted [ 609.010525][ T8876] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 609.019713][ T8870] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 609.028691][ T8870] EXT4-fs (loop3): mount failed [ 609.030062][ T8876] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1414/file0 supports timestamps until 2038 (0x7fffffff) 01:19:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006680000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:19:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x2, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:04 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x6c00000000000000) 01:19:04 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x3e8) 01:19:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) [ 609.050209][ T8872] EXT4-fs error (device loop4): ext4_fill_super:4822: inode #2: comm syz-executor.4: iget: root inode unallocated [ 609.083862][ T8872] EXT4-fs (loop4): get root inode failed [ 609.089749][ T8872] EXT4-fs (loop4): mount failed 01:19:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000", 0x1a, 0x11080}], 0x0, &(0x7f0000013c00)) 01:19:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x14, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:04 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x488) 01:19:04 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x7400000000000000) 01:19:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf0b38b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:04 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x500) [ 609.141412][ T8901] loop3: detected capacity change from 0 to 512 [ 609.142132][ T8902] loop5: detected capacity change from 0 to 512 [ 609.177631][ T8901] EXT4-fs error (device loop3): ext4_fill_super:4822: inode #2: comm syz-executor.3: iget: root inode unallocated 01:19:04 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x7a00000000000000) [ 609.198526][ T8902] EXT4-fs (loop5): 1 orphan inode deleted [ 609.202526][ T8914] loop4: detected capacity change from 0 to 512 [ 609.204291][ T8902] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 01:19:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000066c0000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:19:04 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0xa1ffffff00000000) 01:19:04 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x600) 01:19:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf310bb823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 609.238881][ T8901] EXT4-fs (loop3): get root inode failed [ 609.244592][ T8901] EXT4-fs (loop3): mount failed [ 609.253661][ T8902] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1415/file0 supports timestamps until 2038 (0x7fffffff) [ 609.264347][ T8914] EXT4-fs error (device loop4): ext4_fill_super:4822: inode #2: comm syz-executor.4: iget: root inode unallocated 01:19:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) [ 609.284655][ T8914] EXT4-fs (loop4): get root inode failed [ 609.290439][ T8914] EXT4-fs (loop4): mount failed 01:19:04 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0xeaffffff00000000) 01:19:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b80b619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b}], 0x0, &(0x7f0000013c00)) 01:19:04 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x700) [ 609.329427][ T8930] loop3: detected capacity change from 0 to 512 [ 609.341200][ T8930] EXT4-fs error (device loop3): ext4_fill_super:4822: inode #2: comm syz-executor.3: iget: root inode unallocated [ 609.356016][ T8930] EXT4-fs (loop3): get root inode failed [ 609.361709][ T8930] EXT4-fs (loop3): mount failed [ 609.367218][ T8934] loop5: detected capacity change from 0 to 512 01:19:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc10606ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f04ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 609.393242][ T8942] loop4: detected capacity change from 0 to 512 [ 609.414678][ T8934] EXT4-fs (loop5): 1 orphan inode deleted [ 609.420466][ T8934] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 01:19:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f0bead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006740000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:19:05 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0xfeffffff00000000) 01:19:05 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0xa00) 01:19:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:19:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f11ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 609.440653][ T8934] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1416/file0 supports timestamps until 2038 (0x7fffffff) [ 609.473028][ T8942] EXT4-fs error (device loop4): ext4_fill_super:4822: inode #2: comm syz-executor.4: iget: root inode unallocated 01:19:05 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0xffffffff00000000) 01:19:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f21ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 609.504751][ T8942] EXT4-fs (loop4): get root inode failed [ 609.510543][ T8942] EXT4-fs (loop4): mount failed [ 609.517617][ T8958] loop3: detected capacity change from 0 to 512 01:19:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b}], 0x0, &(0x7f0000013c00)) 01:19:05 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0xf00) 01:19:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f29ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:05 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0/bus\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x8, 0x8, 0x6, 0x3}]}) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) r1 = accept(r0, &(0x7f0000000200)=@in={0x2, 0x0, @local}, &(0x7f0000000140)=0x80) recvmsg$can_j1939(r1, &(0x7f0000001400)={0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001280)=""/10, 0xa}, {&(0x7f00000012c0)=""/131, 0x83}], 0x2, &(0x7f00000013c0)=""/48, 0x30}, 0x40) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x0) [ 609.553759][ T8958] EXT4-fs error (device loop3): ext4_fill_super:4822: inode #2: comm syz-executor.3: iget: root inode unallocated [ 609.583472][ T8958] EXT4-fs (loop3): get root inode failed [ 609.588503][ T8968] loop5: detected capacity change from 0 to 512 [ 609.589236][ T8958] EXT4-fs (loop3): mount failed 01:19:05 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1400) [ 609.614291][ T24] kauditd_printk_skb: 557 callbacks suppressed [ 609.614347][ T24] audit: type=1326 audit(1639358345.149:11970): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8972 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7febc7e7ce99 code=0x7ffc0000 [ 609.635859][ T8968] Quota error (device loop5): find_tree_dqentry: Getting block too big (262144 >= 6) [ 609.654254][ T8968] Quota error (device loop5): qtree_read_dquot: Can't read quota structure for id 0 [ 609.662360][ T8978] loop4: detected capacity change from 0 to 512 [ 609.674142][ T8968] Quota error (device loop5): find_tree_dqentry: Getting block too big (262144 >= 6) [ 609.683697][ T8968] Quota error (device loop5): qtree_read_dquot: Can't read quota structure for id 0 [ 609.695471][ T8968] Quota error (device loop5): find_tree_dqentry: Getting block too big (262144 >= 6) [ 609.705044][ T8968] Quota error (device loop5): qtree_read_dquot: Can't read quota structure for id 0 [ 609.714696][ T8968] EXT4-fs (loop5): 1 orphan inode deleted [ 609.720626][ T8968] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 609.732003][ T8968] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1417/file0 supports timestamps until 2038 (0x7fffffff) [ 609.738108][ T24] audit: type=1326 audit(1639358345.189:11971): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8972 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=83 compat=0 ip=0x7febc7e7ce99 code=0x7ffc0000 [ 609.756495][ T8978] EXT4-fs error (device loop4): ext4_fill_super:4822: inode #2: comm syz-executor.4: iget: root inode unallocated [ 609.770297][ T24] audit: type=1326 audit(1639358345.189:11972): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8972 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7febc7e7ce99 code=0x7ffc0000 [ 609.783694][ T8978] EXT4-fs (loop4): get root inode failed 01:19:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000067a0000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000002000400000000000800030000000af301000400000000000000000000000100000020000000000000000000000000000000000000000000000000000000000000000000000000000000c6d15a57000000000000000000000000000000000000000000000000ed8100001a040000d8f4655fd8f4655fd8f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000ec07159c000000000000000000000000000000000000000000000000ffa1000026000000d8f4655fd8f4655fd8f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3034363634343935392f66696c65302f66696c65300000000000000000000000000000000000000000000011b29fd4000000000000000000000000000000000000000000000000ed81", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:19:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f2bead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:05 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0/bus\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x8, 0x8, 0x6, 0x3}]}) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) r1 = accept(r0, &(0x7f0000000200)=@in={0x2, 0x0, @local}, &(0x7f0000000140)=0x80) recvmsg$can_j1939(r1, &(0x7f0000001400)={0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001280)=""/10, 0xa}, {&(0x7f00000012c0)=""/131, 0x83}], 0x2, &(0x7f00000013c0)=""/48, 0x30}, 0x40) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) (async) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) (async) mount(0x0, &(0x7f0000000080)='./file0/bus\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) (async) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x8, 0x8, 0x6, 0x3}]}) (async) open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) (async) accept(r0, &(0x7f0000000200)=@in={0x2, 0x0, @local}, &(0x7f0000000140)=0x80) (async) recvmsg$can_j1939(r1, &(0x7f0000001400)={0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001280)=""/10, 0xa}, {&(0x7f00000012c0)=""/131, 0x83}], 0x2, &(0x7f00000013c0)=""/48, 0x30}, 0x40) (async) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) (async) getdents64(r0, 0x0, 0x0) (async) 01:19:05 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1d4c) 01:19:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:19:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f2cead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f2fead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 609.806162][ T24] audit: type=1326 audit(1639358345.189:11973): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8972 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=165 compat=0 ip=0x7febc7e7ce99 code=0x7ffc0000 [ 609.811811][ T8978] EXT4-fs (loop4): mount failed [ 609.850843][ T8990] loop3: detected capacity change from 0 to 512 01:19:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b}], 0x0, &(0x7f0000013c00)) 01:19:05 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x3075) 01:19:05 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) (async, rerun: 64) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) (rerun: 64) mount(0x0, &(0x7f0000000080)='./file0/bus\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x8, 0x8, 0x6, 0x3}]}) (async) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) r1 = accept(r0, &(0x7f0000000200)=@in={0x2, 0x0, @local}, &(0x7f0000000140)=0x80) recvmsg$can_j1939(r1, &(0x7f0000001400)={0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001280)=""/10, 0xa}, {&(0x7f00000012c0)=""/131, 0x83}], 0x2, &(0x7f00000013c0)=""/48, 0x30}, 0x40) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) (async) getdents64(r0, 0x0, 0x0) 01:19:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f33ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:05 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x3400) [ 609.889291][ T8990] EXT4-fs warning (device loop3): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 609.920005][ T9008] loop4: detected capacity change from 0 to 512 [ 609.922929][ T9011] loop5: detected capacity change from 0 to 512 [ 609.953035][ T8990] EXT4-fs (loop3): mount failed [ 609.970307][ T9011] EXT4-fs (loop5): 1 orphan inode deleted [ 609.976168][ T9011] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 609.985109][ T9008] EXT4-fs error (device loop4): ext4_fill_super:4822: inode #2: comm syz-executor.4: iget: root inode unallocated 01:19:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006fe0000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:19:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f3aead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:05 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x6, &(0x7f00000000c0)=[{0x1, 0xff, 0x92, 0x2}, {0x9f, 0x80, 0x9, 0x8}, {0x200, 0x20, 0x4, 0x1516}, {0x1f, 0x1, 0x40}, {0x7, 0x56, 0x80, 0x5}, {0x7f, 0x5, 0x8, 0x6}]}) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f00000001c0)={0x8, &(0x7f0000000140)=[{0x0, 0x5, 0x30, 0x7}, {0x3, 0x1, 0x1, 0xabe4}, {0x7, 0x8, 0xd5, 0x2}, {0x7, 0x1, 0x3, 0x3f}, {0x7, 0x3f, 0x0, 0x1f}, {0x232, 0x2, 0x4, 0x2}, {0x8, 0x0, 0x20, 0x101}, {0x7fff, 0x6, 0x1, 0x20}]}) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0/bus\x00', 0x208080, 0x150) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x0) 01:19:05 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x3a98) 01:19:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) [ 609.987677][ T9011] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1418/file0 supports timestamps until 2038 (0x7fffffff) [ 610.012466][ T9008] EXT4-fs (loop4): get root inode failed [ 610.019122][ T9008] EXT4-fs (loop4): mount failed 01:19:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f3bead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:05 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x6, &(0x7f00000000c0)=[{0x1, 0xff, 0x92, 0x2}, {0x9f, 0x80, 0x9, 0x8}, {0x200, 0x20, 0x4, 0x1516}, {0x1f, 0x1, 0x40}, {0x7, 0x56, 0x80, 0x5}, {0x7f, 0x5, 0x8, 0x6}]}) (async) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) (async) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) (async) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f00000001c0)={0x8, &(0x7f0000000140)=[{0x0, 0x5, 0x30, 0x7}, {0x3, 0x1, 0x1, 0xabe4}, {0x7, 0x8, 0xd5, 0x2}, {0x7, 0x1, 0x3, 0x3f}, {0x7, 0x3f, 0x0, 0x1f}, {0x232, 0x2, 0x4, 0x2}, {0x8, 0x0, 0x20, 0x101}, {0x7fff, 0x6, 0x1, 0x20}]}) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0/bus\x00', 0x208080, 0x150) (async) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) (async, rerun: 64) getdents64(r0, 0x0, 0x0) (rerun: 64) 01:19:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) 01:19:05 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x4000) 01:19:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f3cead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 610.049110][ T9027] loop3: detected capacity change from 0 to 512 01:19:05 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x6, &(0x7f00000000c0)=[{0x1, 0xff, 0x92, 0x2}, {0x9f, 0x80, 0x9, 0x8}, {0x200, 0x20, 0x4, 0x1516}, {0x1f, 0x1, 0x40}, {0x7, 0x56, 0x80, 0x5}, {0x7f, 0x5, 0x8, 0x6}]}) (async) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) (async) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) (async) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f00000001c0)={0x8, &(0x7f0000000140)=[{0x0, 0x5, 0x30, 0x7}, {0x3, 0x1, 0x1, 0xabe4}, {0x7, 0x8, 0xd5, 0x2}, {0x7, 0x1, 0x3, 0x3f}, {0x7, 0x3f, 0x0, 0x1f}, {0x232, 0x2, 0x4, 0x2}, {0x8, 0x0, 0x20, 0x101}, {0x7fff, 0x6, 0x1, 0x20}]}) (async) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0/bus\x00', 0x208080, 0x150) (async) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) (async) getdents64(r0, 0x0, 0x0) 01:19:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f3dead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 610.104717][ T9039] loop5: detected capacity change from 0 to 512 [ 610.116510][ T9027] EXT4-fs warning (device loop3): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 610.135388][ T9027] EXT4-fs (loop3): mount failed [ 610.140928][ T9045] loop4: detected capacity change from 0 to 512 [ 610.157308][ T9045] EXT4-fs warning (device loop4): read_mmp_block:107: Error -117 while reading MMP block 12 [ 610.180666][ T9039] EXT4-fs (loop5): 1 orphan inode deleted [ 610.186491][ T9039] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 01:19:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006b80100600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000002000400000000000800030000000af301000400000000000000000000000100000020000000000000000000000000000000000000000000000000000000000000000000000000000000c6d15a57000000000000000000000000000000000000000000000000ed8100001a040000d8f4655fd8f4655fd8f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000ec07159c000000000000000000000000000000000000000000000000ffa1000026000000d8f4655fd8f4655fd8f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3034363634343935392f66696c65302f66696c65300000000000000000000000000000000000000000000011b29fd4000000000000000000000000000000000000000000000000ed81", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:19:05 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x4102) 01:19:05 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup(r1) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x0, 0x0, 0x0, 0x40000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000100)=ANY=[], 0x99, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x162) r4 = getpid() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000400)={{0x0, 0xffffffffffffffff, 0xee01, 0xee00, 0xee00, 0x80, 0x1ff}, 0x0, 0x0, 0x1d41, 0x5, 0xc98, 0x1a72, 0x1, 0x2, 0x3f, 0x5, r4, 0xffffffffffffffff}) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f00000006c0)=ANY=[]) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r5, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000010304, @remote}, 0x4, {0x2, 0x0, @empty}}) ioctl$sock_inet_SIOCSARP(r5, 0x8953, &(0x7f0000000080)={{}, {0x0, @link_local}, 0x0, {0x2, 0x0, @multicast1}}) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)=@ethernet={0x0, @link_local}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000140)=""/38, 0x26}, {0x0}], 0x2, &(0x7f0000001700)=""/4096, 0x1000}, 0x2000) lsetxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000480)='system.posix_acl_access\x00', &(0x7f0000001280)=ANY=[@ANYBLOB="02000000010006000000000002000000", @ANYRES32=0x0, @ANYBLOB="040002000000000008bf88dcb9abb547ff782439c90042a89ecacbb237b270e88c", @ANYRES32=0x0, @ANYBLOB="10000300000000002000020000000000"], 0x34, 0x2) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e22, 0x2, @local, 0xe4}}, 0x0, 0x0, 0x45, 0x0, "a50e919ec5d1ff4071797a9d23bc6f179e1b358c1d78a0d288d1cc26cb6145eb7e78b3f8f572064e947e9fe96155a7a22f7644196a8204e1f5cfd98f9cc8bd036b6ee2d95a431109725e6d6fc04a7ee5"}, 0xd8) 01:19:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f8fead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) 01:19:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) [ 610.197673][ T9039] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1419/file0 supports timestamps until 2038 (0x7fffffff) 01:19:05 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x4402) 01:19:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead9490200"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:05 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) (async, rerun: 64) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) (async, rerun: 64) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) (async) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) (async) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup(r1) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) (async, rerun: 32) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x0, 0x0, 0x0, 0x40000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (rerun: 32) msgsnd(0x0, &(0x7f0000000100)=ANY=[], 0x99, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x162) (async) r4 = getpid() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000400)={{0x0, 0xffffffffffffffff, 0xee01, 0xee00, 0xee00, 0x80, 0x1ff}, 0x0, 0x0, 0x1d41, 0x5, 0xc98, 0x1a72, 0x1, 0x2, 0x3f, 0x5, r4, 0xffffffffffffffff}) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f00000006c0)=ANY=[]) (async, rerun: 32) r5 = socket$inet_tcp(0x2, 0x1, 0x0) (rerun: 32) ioctl$sock_inet_SIOCSARP(r5, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000010304, @remote}, 0x4, {0x2, 0x0, @empty}}) ioctl$sock_inet_SIOCSARP(r5, 0x8953, &(0x7f0000000080)={{}, {0x0, @link_local}, 0x0, {0x2, 0x0, @multicast1}}) (async) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)=@ethernet={0x0, @link_local}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000140)=""/38, 0x26}, {0x0}], 0x2, &(0x7f0000001700)=""/4096, 0x1000}, 0x2000) (async) lsetxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000480)='system.posix_acl_access\x00', &(0x7f0000001280)=ANY=[@ANYBLOB="02000000010006000000000002000000", @ANYRES32=0x0, @ANYBLOB="040002000000000008bf88dcb9abb547ff782439c90042a89ecacbb237b270e88c", @ANYRES32=0x0, @ANYBLOB="10000300000000002000020000000000"], 0x34, 0x2) (async, rerun: 64) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e22, 0x2, @local, 0xe4}}, 0x0, 0x0, 0x45, 0x0, "a50e919ec5d1ff4071797a9d23bc6f179e1b358c1d78a0d288d1cc26cb6145eb7e78b3f8f572064e947e9fe96155a7a22f7644196a8204e1f5cfd98f9cc8bd036b6ee2d95a431109725e6d6fc04a7ee5"}, 0xd8) (rerun: 64) [ 610.245524][ T9063] loop4: detected capacity change from 0 to 512 [ 610.252394][ T9066] loop3: detected capacity change from 0 to 512 [ 610.253670][ T9064] tmpfs: Unknown parameter ' ' 01:19:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead9490300"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:05 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x4c1d) 01:19:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead9490400"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 610.295752][ T9063] EXT4-fs warning (device loop4): read_mmp_block:107: Error -117 while reading MMP block 12 [ 610.329655][ T9075] tmpfs: Unknown parameter ' ' [ 610.333896][ T9084] loop5: detected capacity change from 0 to 512 [ 610.340417][ T9075] tmpfs: Unknown parameter ' ' [ 610.350917][ T9075] tmpfs: Unknown parameter ' ' [ 610.358073][ T9066] EXT4-fs warning (device loop3): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 610.382197][ T9066] EXT4-fs (loop3): mount failed 01:19:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006be0100600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:19:06 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x7400) 01:19:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) 01:19:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead9490500"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {0x0, 0x0, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) [ 610.412430][ T9084] EXT4-fs (loop5): 1 orphan inode deleted [ 610.418202][ T9084] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 610.430858][ T9084] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1420/file0 supports timestamps until 2038 (0x7fffffff) 01:19:06 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x7530) 01:19:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead9490600"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:06 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x80fb) [ 610.476658][ T9104] loop4: detected capacity change from 0 to 512 [ 610.498288][ T9109] loop3: detected capacity change from 0 to 512 [ 610.508775][ T9104] EXT4-fs warning (device loop4): read_mmp_block:107: Error -117 while reading MMP block 12 [ 610.536880][ T9109] EXT4-fs warning (device loop3): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 610.551723][ T9109] EXT4-fs (loop3): mount failed [ 610.570019][ T9125] loop5: detected capacity change from 0 to 512 [ 610.609829][ T9125] EXT4-fs (loop5): 1 orphan inode deleted [ 610.615717][ T9125] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 610.628163][ T9125] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1421/file0 supports timestamps until 2038 (0x7fffffff) 01:19:06 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) (async) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) (async) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) (async) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup(r1) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x0, 0x0, 0x0, 0x40000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000100)=ANY=[], 0x99, 0x0) (async) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x162) (async) r4 = getpid() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000400)={{0x0, 0xffffffffffffffff, 0xee01, 0xee00, 0xee00, 0x80, 0x1ff}, 0x0, 0x0, 0x1d41, 0x5, 0xc98, 0x1a72, 0x1, 0x2, 0x3f, 0x5, r4, 0xffffffffffffffff}) (async) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f00000006c0)=ANY=[]) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r5, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000010304, @remote}, 0x4, {0x2, 0x0, @empty}}) (async) ioctl$sock_inet_SIOCSARP(r5, 0x8953, &(0x7f0000000080)={{}, {0x0, @link_local}, 0x0, {0x2, 0x0, @multicast1}}) (async) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)=@ethernet={0x0, @link_local}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000140)=""/38, 0x26}, {0x0}], 0x2, &(0x7f0000001700)=""/4096, 0x1000}, 0x2000) (async) lsetxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000480)='system.posix_acl_access\x00', &(0x7f0000001280)=ANY=[@ANYBLOB="02000000010006000000000002000000", @ANYRES32=0x0, @ANYBLOB="040002000000000008bf88dcb9abb547ff782439c90042a89ecacbb237b270e88c", @ANYRES32=0x0, @ANYBLOB="10000300000000002000020000000000"], 0x34, 0x2) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e22, 0x2, @local, 0xe4}}, 0x0, 0x0, 0x45, 0x0, "a50e919ec5d1ff4071797a9d23bc6f179e1b358c1d78a0d288d1cc26cb6145eb7e78b3f8f572064e947e9fe96155a7a22f7644196a8204e1f5cfd98f9cc8bd036b6ee2d95a431109725e6d6fc04a7ee5"}, 0xd8) 01:19:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead9490700"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:06 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x8804) 01:19:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {0x0, 0x0, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:19:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) 01:19:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006bf0100600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:19:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead9499000"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:06 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x4, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) r1 = syz_io_uring_complete(0x0) getdents(r1, &(0x7f00000022c0)=""/4110, 0x1060) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x7, &(0x7f0000000080)={0x2, &(0x7f00000000c0)=[{0x6, 0xf, 0xd4, 0x9}, {0x9, 0x74, 0x5, 0x8}]}) getdents64(r0, 0x0, 0x0) 01:19:06 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x983a) [ 610.740319][ T9156] loop3: detected capacity change from 0 to 512 [ 610.748242][ T9153] loop4: detected capacity change from 0 to 512 [ 610.748279][ T9152] loop5: detected capacity change from 0 to 512 [ 610.776299][ T9153] EXT4-fs warning (device loop4): read_mmp_block:107: Error -117 while reading MMP block 12 01:19:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) 01:19:06 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0xde01) 01:19:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead949000300"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:06 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x4, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) (async) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) (async) r1 = syz_io_uring_complete(0x0) getdents(r1, &(0x7f00000022c0)=""/4110, 0x1060) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x7, &(0x7f0000000080)={0x2, &(0x7f00000000c0)=[{0x6, 0xf, 0xd4, 0x9}, {0x9, 0x74, 0x5, 0x8}]}) (async) getdents64(r0, 0x0, 0x0) 01:19:06 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0xe803) 01:19:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead949000500"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 610.808516][ T9156] EXT4-fs warning (device loop3): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 610.832935][ T9156] EXT4-fs (loop3): mount failed [ 610.836427][ T9152] EXT4-fs (loop5): 1 orphan inode deleted [ 610.843665][ T9152] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 01:19:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {0x0, 0x0, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:19:06 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x4, 0x0, 0x7ffc0001}]}) (async) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) (async) r1 = syz_io_uring_complete(0x0) getdents(r1, &(0x7f00000022c0)=""/4110, 0x1060) (async) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x7, &(0x7f0000000080)={0x2, &(0x7f00000000c0)=[{0x6, 0xf, 0xd4, 0x9}, {0x9, 0x74, 0x5, 0x8}]}) getdents64(r0, 0x0, 0x0) 01:19:06 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0xf401) 01:19:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead949000600"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006c80100600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) [ 610.872662][ T9152] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1422/file0 supports timestamps until 2038 (0x7fffffff) [ 610.882051][ T9184] loop4: detected capacity change from 0 to 512 [ 610.903550][ T9184] EXT4-fs warning (device loop4): read_mmp_block:107: Error -117 while reading MMP block 12 01:19:06 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0xfb80) 01:19:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) 01:19:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead949000700"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:06 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mount(&(0x7f0000000080)=@md0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000100)='reiserfs\x00', 0x1080416, &(0x7f0000000140)='%!)\x00') getdents(r0, &(0x7f0000001280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x0) 01:19:06 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x20000) [ 610.933057][ T9188] loop3: detected capacity change from 0 to 512 [ 610.968586][ T9198] loop5: detected capacity change from 0 to 512 01:19:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead949004000"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:06 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x400000) [ 611.001094][ T9205] loop4: detected capacity change from 0 to 512 [ 611.001667][ T9188] EXT4-fs warning (device loop3): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 611.037672][ T9188] EXT4-fs (loop3): mount failed 01:19:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead949009000"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700), 0x0, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:19:06 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1000000) 01:19:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006c90100600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000002000400000000000800030000000af301000400000000000000000000000100000020000000000000000000000000000000000000000000000000000000000000000000000000000000c6d15a57000000000000000000000000000000000000000000000000ed8100001a040000d8f4655fd8f4655fd8f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000ec07159c000000000000000000000000000000000000000000000000ffa1000026000000d8f4655fd8f4655fd8f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3034363634343935392f66696c65302f66696c65300000000000000000000000000000000000000000000011b29fd4000000000000000000000000000000000000000000000000ed81", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:19:06 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mount(&(0x7f0000000080)=@md0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000100)='reiserfs\x00', 0x1080416, &(0x7f0000000140)='%!)\x00') getdents(r0, &(0x7f0000001280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) (async) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) (async) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) (async) open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) (async) mount(&(0x7f0000000080)=@md0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000100)='reiserfs\x00', 0x1080416, &(0x7f0000000140)='%!)\x00') (async) getdents(r0, &(0x7f0000001280)=""/4096, 0x1000) (async) getdents64(r0, 0x0, 0x0) (async) 01:19:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) [ 611.051222][ T9205] EXT4-fs warning (device loop4): read_mmp_block:107: Error -117 while reading MMP block 12 [ 611.065592][ T9198] EXT4-fs (loop5): 1 orphan inode deleted [ 611.071434][ T9198] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 611.082745][ T9198] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1423/file0 supports timestamps until 2038 (0x7fffffff) 01:19:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:06 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) (async) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) (async) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) (async) mount(&(0x7f0000000080)=@md0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000100)='reiserfs\x00', 0x1080416, &(0x7f0000000140)='%!)\x00') getdents(r0, &(0x7f0000001280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x0) 01:19:06 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x2000000) 01:19:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 611.154483][ T9226] loop4: detected capacity change from 0 to 512 [ 611.159317][ T9225] loop3: detected capacity change from 0 to 512 [ 611.184464][ T9222] loop5: detected capacity change from 0 to 512 01:19:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:06 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000080)=ANY=[@ANYBLOB="01000000eaff000018000000", @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="0000550f2e0726696c65302f62757300"]) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000100)={0x7, &(0x7f00000000c0)=[{0x7, 0x5a, 0xfc}, {0x7, 0xff, 0x58, 0x6}, {0x1, 0x8, 0x8, 0xe000}, {0x8001, 0x1, 0x2, 0x9}, {0x5, 0x2, 0x20, 0x3}, {0xc, 0xff, 0x1, 0x1ff}, {0x100, 0x4, 0x6, 0x6}]}) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup(r1) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) socketpair(0x33, 0x6, 0x3f, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f0000001700)={{0x1, 0x1, 0x18, r1}, './file0/bus\x00'}) renameat(r0, &(0x7f00000016c0)='./file0/bus\x00', r4, &(0x7f0000001740)='./file0/bus\x00') getsockopt$inet_sctp_SCTP_EVENTS(r3, 0x84, 0xc, &(0x7f0000001680), &(0x7f0000000100)=0xe) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000001280)=@filter={'filter\x00', 0xe, 0x4, 0x388, 0xffffffff, 0x150, 0x258, 0x150, 0xffffffff, 0xffffffff, 0x2f0, 0x2f0, 0x2f0, 0xffffffff, 0x4, &(0x7f0000000140), {[{{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @empty, 0xffffffff, 0x7f, 'ip6tnl0\x00', 'vxcan1\x00', {}, {}, 0x73, 0x2}, 0x0, 0xf0, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'\x00', {0x20, 0x3, 0x101, 0x1, 0x100, 0x0, 0x8, 0x78, 0x80}, {0x9}}}, @common=@icmp={{0x28}, {0x0, 'Ip', 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x1, 0xb, [0x1b, 0x3d, 0xa, 0x22, 0x9, 0x1d, 0x28, 0x3, 0x3f, 0xd, 0xd, 0x1f, 0x2d, 0x37, 0x37, 0x2c], 0x0, 0x200, 0x80000001}}}, {{@ip={@empty, @local, 0xff000000, 0xffffff00, 'sit0\x00', 'team_slave_1\x00', {}, {0xff}, 0x1, 0x3, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@unspec=@mac={{0x30}, {@local, 0x1}}, @common=@ah={{0x30}, {[0x7, 0x80000000]}}]}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0x3, 0x4, 0x2}, {0x2, 0x5, 0x1}, {0x4, 0x0, 0x2}, 0x5, 0x7}}}, {{@uncond, 0x0, 0x70, 0x98}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e8) getdents64(r0, 0x0, 0x0) 01:19:06 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x3000000) [ 611.207952][ T9225] EXT4-fs warning (device loop3): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 611.230586][ T9225] EXT4-fs (loop3): mount failed [ 611.232298][ T9226] EXT4-fs warning (device loop4): read_mmp_block:107: Error -117 while reading MMP block 12 01:19:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700), 0x0, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:19:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:06 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x4000000) 01:19:06 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) (async, rerun: 32) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) (rerun: 32) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) (async) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) (async) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000080)=ANY=[@ANYBLOB="01000000eaff000018000000", @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="0000550f2e0726696c65302f62757300"]) (async, rerun: 64) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000100)={0x7, &(0x7f00000000c0)=[{0x7, 0x5a, 0xfc}, {0x7, 0xff, 0x58, 0x6}, {0x1, 0x8, 0x8, 0xe000}, {0x8001, 0x1, 0x2, 0x9}, {0x5, 0x2, 0x20, 0x3}, {0xc, 0xff, 0x1, 0x1ff}, {0x100, 0x4, 0x6, 0x6}]}) (async, rerun: 64) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup(r1) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) socketpair(0x33, 0x6, 0x3f, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f0000001700)={{0x1, 0x1, 0x18, r1}, './file0/bus\x00'}) renameat(r0, &(0x7f00000016c0)='./file0/bus\x00', r4, &(0x7f0000001740)='./file0/bus\x00') (async, rerun: 64) getsockopt$inet_sctp_SCTP_EVENTS(r3, 0x84, 0xc, &(0x7f0000001680), &(0x7f0000000100)=0xe) (rerun: 64) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000001280)=@filter={'filter\x00', 0xe, 0x4, 0x388, 0xffffffff, 0x150, 0x258, 0x150, 0xffffffff, 0xffffffff, 0x2f0, 0x2f0, 0x2f0, 0xffffffff, 0x4, &(0x7f0000000140), {[{{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @empty, 0xffffffff, 0x7f, 'ip6tnl0\x00', 'vxcan1\x00', {}, {}, 0x73, 0x2}, 0x0, 0xf0, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'\x00', {0x20, 0x3, 0x101, 0x1, 0x100, 0x0, 0x8, 0x78, 0x80}, {0x9}}}, @common=@icmp={{0x28}, {0x0, 'Ip', 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x1, 0xb, [0x1b, 0x3d, 0xa, 0x22, 0x9, 0x1d, 0x28, 0x3, 0x3f, 0xd, 0xd, 0x1f, 0x2d, 0x37, 0x37, 0x2c], 0x0, 0x200, 0x80000001}}}, {{@ip={@empty, @local, 0xff000000, 0xffffff00, 'sit0\x00', 'team_slave_1\x00', {}, {0xff}, 0x1, 0x3, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@unspec=@mac={{0x30}, {@local, 0x1}}, @common=@ah={{0x30}, {[0x7, 0x80000000]}}]}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0x3, 0x4, 0x2}, {0x2, 0x5, 0x1}, {0x4, 0x0, 0x2}, 0x5, 0x7}}}, {{@uncond, 0x0, 0x70, 0x98}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e8) (async) getdents64(r0, 0x0, 0x0) 01:19:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006ca0100600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000002000400000000000800030000000af301000400000000000000000000000100000020000000000000000000000000000000000000000000000000000000000000000000000000000000c6d15a57000000000000000000000000000000000000000000000000ed8100001a040000d8f4655fd8f4655fd8f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000ec07159c000000000000000000000000000000000000000000000000ffa1000026000000d8f4655fd8f4655fd8f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3034363634343935392f66696c65302f66696c65300000000000000000000000000000000000000000000011b29fd4000000000000000000000000000000000000000000000000ed81", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:19:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) [ 611.258797][ T9248] x_tables: duplicate underflow at hook 2 [ 611.266459][ T9222] EXT4-fs (loop5): 1 orphan inode deleted [ 611.272301][ T9222] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 611.286594][ T9222] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1424/file0 supports timestamps until 2038 (0x7fffffff) 01:19:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:06 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x5000000) [ 611.363331][ T9258] loop4: detected capacity change from 0 to 512 [ 611.370124][ T9268] loop3: detected capacity change from 0 to 512 [ 611.376088][ T9266] loop5: detected capacity change from 0 to 512 [ 611.400568][ T9261] x_tables: duplicate underflow at hook 2 01:19:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:06 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x6000000) 01:19:06 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000080)=ANY=[@ANYBLOB="01000000eaff000018000000", @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="0000550f2e0726696c65302f62757300"]) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000100)={0x7, &(0x7f00000000c0)=[{0x7, 0x5a, 0xfc}, {0x7, 0xff, 0x58, 0x6}, {0x1, 0x8, 0x8, 0xe000}, {0x8001, 0x1, 0x2, 0x9}, {0x5, 0x2, 0x20, 0x3}, {0xc, 0xff, 0x1, 0x1ff}, {0x100, 0x4, 0x6, 0x6}]}) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup(r1) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) socketpair(0x33, 0x6, 0x3f, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f0000001700)={{0x1, 0x1, 0x18, r1}, './file0/bus\x00'}) renameat(r0, &(0x7f00000016c0)='./file0/bus\x00', r4, &(0x7f0000001740)='./file0/bus\x00') getsockopt$inet_sctp_SCTP_EVENTS(r3, 0x84, 0xc, &(0x7f0000001680), &(0x7f0000000100)=0xe) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000001280)=@filter={'filter\x00', 0xe, 0x4, 0x388, 0xffffffff, 0x150, 0x258, 0x150, 0xffffffff, 0xffffffff, 0x2f0, 0x2f0, 0x2f0, 0xffffffff, 0x4, &(0x7f0000000140), {[{{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @empty, 0xffffffff, 0x7f, 'ip6tnl0\x00', 'vxcan1\x00', {}, {}, 0x73, 0x2}, 0x0, 0xf0, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'\x00', {0x20, 0x3, 0x101, 0x1, 0x100, 0x0, 0x8, 0x78, 0x80}, {0x9}}}, @common=@icmp={{0x28}, {0x0, 'Ip', 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x1, 0xb, [0x1b, 0x3d, 0xa, 0x22, 0x9, 0x1d, 0x28, 0x3, 0x3f, 0xd, 0xd, 0x1f, 0x2d, 0x37, 0x37, 0x2c], 0x0, 0x200, 0x80000001}}}, {{@ip={@empty, @local, 0xff000000, 0xffffff00, 'sit0\x00', 'team_slave_1\x00', {}, {0xff}, 0x1, 0x3, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@unspec=@mac={{0x30}, {@local, 0x1}}, @common=@ah={{0x30}, {[0x7, 0x80000000]}}]}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0x3, 0x4, 0x2}, {0x2, 0x5, 0x1}, {0x4, 0x0, 0x2}, 0x5, 0x7}}}, {{@uncond, 0x0, 0x70, 0x98}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e8) getdents64(r0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) (async) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) (async) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) (async) open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) (async) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) (async) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000080)=ANY=[@ANYBLOB="01000000eaff000018000000", @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="0000550f2e0726696c65302f62757300"]) (async) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000100)={0x7, &(0x7f00000000c0)=[{0x7, 0x5a, 0xfc}, {0x7, 0xff, 0x58, 0x6}, {0x1, 0x8, 0x8, 0xe000}, {0x8001, 0x1, 0x2, 0x9}, {0x5, 0x2, 0x20, 0x3}, {0xc, 0xff, 0x1, 0x1ff}, {0x100, 0x4, 0x6, 0x6}]}) (async) socket$inet_sctp(0x2, 0x5, 0x84) (async) dup(r1) (async) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) (async) socketpair(0x33, 0x6, 0x3f, &(0x7f0000000200)) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f0000001700)={{0x1, 0x1, 0x18, r1}, './file0/bus\x00'}) (async) renameat(r0, &(0x7f00000016c0)='./file0/bus\x00', r4, &(0x7f0000001740)='./file0/bus\x00') (async) getsockopt$inet_sctp_SCTP_EVENTS(r3, 0x84, 0xc, &(0x7f0000001680), &(0x7f0000000100)=0xe) (async) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000001280)=@filter={'filter\x00', 0xe, 0x4, 0x388, 0xffffffff, 0x150, 0x258, 0x150, 0xffffffff, 0xffffffff, 0x2f0, 0x2f0, 0x2f0, 0xffffffff, 0x4, &(0x7f0000000140), {[{{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @empty, 0xffffffff, 0x7f, 'ip6tnl0\x00', 'vxcan1\x00', {}, {}, 0x73, 0x2}, 0x0, 0xf0, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'\x00', {0x20, 0x3, 0x101, 0x1, 0x100, 0x0, 0x8, 0x78, 0x80}, {0x9}}}, @common=@icmp={{0x28}, {0x0, 'Ip', 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x1, 0xb, [0x1b, 0x3d, 0xa, 0x22, 0x9, 0x1d, 0x28, 0x3, 0x3f, 0xd, 0xd, 0x1f, 0x2d, 0x37, 0x37, 0x2c], 0x0, 0x200, 0x80000001}}}, {{@ip={@empty, @local, 0xff000000, 0xffffff00, 'sit0\x00', 'team_slave_1\x00', {}, {0xff}, 0x1, 0x3, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@unspec=@mac={{0x30}, {@local, 0x1}}, @common=@ah={{0x30}, {[0x7, 0x80000000]}}]}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0x3, 0x4, 0x2}, {0x2, 0x5, 0x1}, {0x4, 0x0, 0x2}, 0x5, 0x7}}}, {{@uncond, 0x0, 0x70, 0x98}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e8) (async) getdents64(r0, 0x0, 0x0) (async) [ 611.412966][ T9268] EXT4-fs warning (device loop3): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 611.414118][ T9258] EXT4-fs warning (device loop4): read_mmp_block:107: Error -117 while reading MMP block 12 [ 611.463323][ T9268] EXT4-fs (loop3): mount failed [ 611.470214][ T9266] EXT4-fs (loop5): 1 orphan inode deleted [ 611.476044][ T9266] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 611.489968][ T9266] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1425/file0 supports timestamps until 2038 (0x7fffffff) 01:19:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700), 0x0, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:19:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:07 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x7000000) 01:19:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006cb0100600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:19:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) 01:19:07 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4098, 0x1002) getdents64(r0, 0x0, 0x0) [ 611.518908][ T9284] x_tables: duplicate underflow at hook 2 [ 611.526289][ T9284] x_tables: duplicate underflow at hook 2 [ 611.556882][ T9299] loop4: detected capacity change from 0 to 512 01:19:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead949ffffff"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:07 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x8000000) 01:19:07 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) (async) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) (async) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) (async) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4098, 0x1002) getdents64(r0, 0x0, 0x0) 01:19:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 611.567121][ T9299] EXT4-fs warning (device loop4): read_mmp_block:107: Error -117 while reading MMP block 12 [ 611.589941][ T9304] loop5: detected capacity change from 0 to 512 [ 611.596812][ T9305] loop3: detected capacity change from 0 to 512 01:19:07 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0xa000000) 01:19:07 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) (async, rerun: 32) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) (rerun: 32) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) (async) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4098, 0x1002) (async) getdents64(r0, 0x0, 0x0) [ 611.646720][ T9304] EXT4-fs (loop5): 1 orphan inode deleted [ 611.652540][ T9304] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 611.680752][ T9304] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1426/file0 supports timestamps until 2038 (0x7fffffff) 01:19:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111f", 0x2, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:19:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)='PMM\x00', 0x4, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) 01:19:07 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0xf000000) 01:19:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead949ffffff"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006cc0100600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:19:07 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0/bus\x00', &(0x7f0000000100)='fuseblk\x00', 0x1000040, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x40000, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x3, 0xff, 0xaf}]}) getdents64(r0, 0x0, 0x0) [ 611.697384][ T9305] EXT4-fs warning (device loop3): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 611.718437][ T9305] EXT4-fs (loop3): mount failed 01:19:07 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x14000000) 01:19:07 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x30750000) 01:19:07 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) (async) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) (async) mount(0x0, &(0x7f0000000140)='./file0/bus\x00', &(0x7f0000000100)='fuseblk\x00', 0x1000040, 0x0) (async) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x40000, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) (async) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x3, 0xff, 0xaf}]}) (async) getdents64(r0, 0x0, 0x0) [ 611.776294][ T9334] loop4: detected capacity change from 0 to 512 [ 611.778644][ T9336] loop3: detected capacity change from 0 to 512 [ 611.795857][ T9338] loop5: detected capacity change from 0 to 512 01:19:07 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x34000000) 01:19:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead9498dffff"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:07 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x41020000) [ 611.827240][ T9336] EXT4-fs warning (device loop3): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 611.852779][ T9336] EXT4-fs (loop3): mount failed [ 611.871484][ T9338] EXT4-fs (loop5): 1 orphan inode deleted 01:19:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111f", 0x2, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) [ 611.877257][ T9338] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 611.893982][ T9338] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1427/file0 supports timestamps until 2038 (0x7fffffff) [ 611.930485][ T9359] loop3: detected capacity change from 0 to 512 [ 611.943369][ T9359] EXT4-fs warning (device loop3): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 611.957974][ T9359] EXT4-fs (loop3): mount failed 01:19:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)='PMM\x00', 0x4, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) 01:19:08 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) (async) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0/bus\x00', &(0x7f0000000100)='fuseblk\x00', 0x1000040, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x40000, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x3, 0xff, 0xaf}]}) (async) getdents64(r0, 0x0, 0x0) 01:19:08 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x44020000) 01:19:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead949f5ffff"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006cd0100600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000002000400000000000800030000000af301000400000000000000000000000100000020000000000000000000000000000000000000000000000000000000000000000000000000000000c6d15a57000000000000000000000000000000000000000000000000ed8100001a040000d8f4655fd8f4655fd8f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000ec07159c000000000000000000000000000000000000000000000000ffa1000026000000d8f4655fd8f4655fd8f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3034363634343935392f66696c65302f66696c65300000000000000000000000000000000000000000000011b29fd4000000000000000000000000000000000000000000000000ed81", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:19:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111f", 0x2, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) [ 612.610591][ T9334] EXT4-fs warning (device loop4): ext4_multi_mount_protect:330: MMP startup interrupted, failing mount [ 612.610591][ T9334] 01:19:08 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x4c1d0000) 01:19:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:08 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x74000000) 01:19:08 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup(r0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x8, 0x2) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001540)={&(0x7f0000000100), 0x6e, &(0x7f0000001480)=[{&(0x7f0000001280)=""/236, 0xec}, {&(0x7f0000000200)=""/43, 0x2b}, {&(0x7f0000001380)=""/186, 0xba}, {&(0x7f0000001440)=""/52, 0x34}], 0x4, &(0x7f00000014c0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x12101) r1 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r1, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r1, 0x0, 0x0) [ 612.676350][ T9370] loop3: detected capacity change from 0 to 512 [ 612.676734][ T9367] loop5: detected capacity change from 0 to 512 [ 612.708552][ T9374] loop4: detected capacity change from 0 to 512 01:19:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 612.748314][ T9367] EXT4-fs (loop5): 1 orphan inode deleted [ 612.754133][ T9367] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 612.775091][ T9370] EXT4-fs warning (device loop3): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 612.790623][ T9367] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1428/file0 supports timestamps until 2038 (0x7fffffff) [ 612.796665][ T9370] EXT4-fs (loop3): mount failed [ 613.540403][ T9374] EXT4-fs warning (device loop4): ext4_multi_mount_protect:330: MMP startup interrupted, failing mount [ 613.540403][ T9374] 01:19:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)='PMM\x00', 0x4, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) 01:19:09 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup(r0) (async) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x8, 0x2) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) (async) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) (async) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001540)={&(0x7f0000000100), 0x6e, &(0x7f0000001480)=[{&(0x7f0000001280)=""/236, 0xec}, {&(0x7f0000000200)=""/43, 0x2b}, {&(0x7f0000001380)=""/186, 0xba}, {&(0x7f0000001440)=""/52, 0x34}], 0x4, &(0x7f00000014c0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x12101) (async) r1 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r1, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r1, 0x0, 0x0) 01:19:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:09 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x7fffedbc) 01:19:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006d20100600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:19:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0", 0x3, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:19:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:09 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup(r0) (async) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x8, 0x2) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001540)={&(0x7f0000000100), 0x6e, &(0x7f0000001480)=[{&(0x7f0000001280)=""/236, 0xec}, {&(0x7f0000000200)=""/43, 0x2b}, {&(0x7f0000001380)=""/186, 0xba}, {&(0x7f0000001440)=""/52, 0x34}], 0x4, &(0x7f00000014c0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x12101) (async) r1 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r1, &(0x7f0000000280)=""/4096, 0x1000) (async) getdents64(r1, 0x0, 0x0) 01:19:09 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x80fb0000) [ 613.609925][ T9393] loop3: detected capacity change from 0 to 512 [ 613.620683][ T9399] loop5: detected capacity change from 0 to 512 01:19:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 613.656777][ T9393] EXT4-fs warning (device loop3): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 613.672450][ T9393] EXT4-fs (loop3): mount failed [ 613.677740][ T9411] loop4: detected capacity change from 0 to 512 [ 613.698662][ T9399] EXT4-fs (loop5): 1 orphan inode deleted 01:19:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:09 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x88040000) [ 613.704516][ T9399] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 613.737881][ T9399] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1429/file0 supports timestamps until 2038 (0x7fffffff) 01:19:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)='PMM\x00PM', 0x6, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) 01:19:10 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000001840)=0x2902a773, 0x4) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000000c0)={0x7, &(0x7f0000000080)=[{0x0, 0x5, 0x80, 0x926d}, {0x3, 0x0, 0x3, 0x20}, {0x7ff, 0x0, 0x5, 0xfffff800}, {0x4, 0x8d, 0x0, 0x100}, {0x3, 0x1f, 0x80, 0x40}, {0xff01, 0x7, 0x3e, 0x16}, {0x3f, 0x8, 0xff, 0x2}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r1, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r1, 0x0, 0x0) 01:19:10 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x983a0000) 01:19:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0", 0x3, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:19:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006fc0100600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000002000400000000000800030000000af301000400000000000000000000000100000020000000000000000000000000000000000000000000000000000000000000000000000000000000c6d15a57000000000000000000000000000000000000000000000000ed8100001a040000d8f4655fd8f4655fd8f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000ec07159c000000000000000000000000000000000000000000000000ffa1000026000000d8f4655fd8f4655fd8f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3034363634343935392f66696c65302f66696c65300000000000000000000000000000000000000000000011b29fd4000000000000000000000000000000000000000000000000ed81", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) [ 614.506524][ T9411] EXT4-fs warning (device loop4): ext4_multi_mount_protect:330: MMP startup interrupted, failing mount [ 614.506524][ T9411] 01:19:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:10 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0xbcedff7f) [ 614.576566][ T9429] loop3: detected capacity change from 0 to 512 [ 614.583371][ T9430] loop5: detected capacity change from 0 to 512 01:19:10 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000001840)=0x2902a773, 0x4) (async) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) (async) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000000c0)={0x7, &(0x7f0000000080)=[{0x0, 0x5, 0x80, 0x926d}, {0x3, 0x0, 0x3, 0x20}, {0x7ff, 0x0, 0x5, 0xfffff800}, {0x4, 0x8d, 0x0, 0x100}, {0x3, 0x1f, 0x80, 0x40}, {0xff01, 0x7, 0x3e, 0x16}, {0x3f, 0x8, 0xff, 0x2}]}) (async) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) (async) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r1, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r1, 0x0, 0x0) 01:19:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:10 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0xde010000) 01:19:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 614.618081][ T9438] loop4: detected capacity change from 0 to 512 [ 614.652995][ T9429] EXT4-fs warning (device loop3): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. 01:19:10 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0xe8030000) [ 614.668944][ T9429] EXT4-fs (loop3): mount failed [ 614.676877][ T9430] __quota_error: 500 callbacks suppressed [ 614.676892][ T9430] Quota error (device loop5): find_tree_dqentry: Getting block too big (262144 >= 6) [ 614.692616][ T9430] Quota error (device loop5): qtree_read_dquot: Can't read quota structure for id 0 [ 614.705053][ T9430] Quota error (device loop5): find_tree_dqentry: Getting block too big (262144 >= 6) [ 614.715292][ T9430] Quota error (device loop5): qtree_read_dquot: Can't read quota structure for id 0 [ 614.724932][ T9430] Quota error (device loop5): find_tree_dqentry: Getting block too big (262144 >= 6) [ 614.734420][ T9430] Quota error (device loop5): qtree_read_dquot: Can't read quota structure for id 0 [ 614.744115][ T9430] EXT4-fs (loop5): 1 orphan inode deleted [ 614.749964][ T9430] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 614.763589][ T9430] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1430/file0 supports timestamps until 2038 (0x7fffffff) 01:19:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)='PMM\x00PM', 0x6, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) 01:19:11 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000001840)=0x2902a773, 0x4) (async) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) (async) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000000c0)={0x7, &(0x7f0000000080)=[{0x0, 0x5, 0x80, 0x926d}, {0x3, 0x0, 0x3, 0x20}, {0x7ff, 0x0, 0x5, 0xfffff800}, {0x4, 0x8d, 0x0, 0x100}, {0x3, 0x1f, 0x80, 0x40}, {0xff01, 0x7, 0x3e, 0x16}, {0x3f, 0x8, 0xff, 0x2}]}) (async) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) (async) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) (async) r1 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r1, &(0x7f0000000280)=""/4096, 0x1000) (async, rerun: 32) getdents64(r1, 0x0, 0x0) (rerun: 32) 01:19:11 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0xf4010000) 01:19:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0", 0x3, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:19:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006040200600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) [ 615.454831][ T9438] EXT4-fs warning (device loop4): ext4_multi_mount_protect:330: MMP startup interrupted, failing mount [ 615.454831][ T9438] 01:19:11 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x8000000000) [ 615.503456][ T9462] loop5: detected capacity change from 0 to 512 [ 615.511171][ T9472] loop3: detected capacity change from 0 to 512 [ 615.536397][ T9472] EXT4-fs warning (device loop3): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. 01:19:11 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0/bus\x00', &(0x7f0000000100), 0x10080, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x0) 01:19:11 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x7ffffffff000) 01:19:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 615.553949][ T9479] loop4: detected capacity change from 0 to 512 [ 615.569819][ T9472] EXT4-fs (loop3): mount failed [ 615.576279][ T9462] Quota error (device loop5): find_tree_dqentry: Getting block too big (262144 >= 6) [ 615.585839][ T9462] Quota error (device loop5): qtree_read_dquot: Can't read quota structure for id 0 01:19:11 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0/bus\x00', &(0x7f0000000100), 0x10080, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) (async) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) (async) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) (async) open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) (async) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0/bus\x00', &(0x7f0000000100), 0x10080, 0x0) (async) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) (async) getdents64(r0, 0x0, 0x0) (async) [ 615.595947][ T24] audit: type=1326 audit(1639358351.139:12402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9481 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7febc7e7ce99 code=0x7ffc0000 [ 615.619951][ T24] audit: type=1326 audit(1639358351.139:12403): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9481 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=83 compat=0 ip=0x7febc7e7ce99 code=0x7ffc0000 [ 615.635930][ T9462] EXT4-fs (loop5): 1 orphan inode deleted 01:19:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 615.649691][ T9462] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 615.665014][ T9462] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1431/file0 supports timestamps until 2038 (0x7fffffff) [ 616.381976][ T9479] EXT4-fs warning (device loop4): ext4_multi_mount_protect:330: MMP startup interrupted, failing mount [ 616.381976][ T9479] 01:19:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead949000200"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)='PMM\x00PM', 0x6, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) 01:19:11 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x2000000000000) 01:19:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006320200600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:19:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:19:11 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) (async) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) (async) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) (async) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mount$bind(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0/bus\x00', &(0x7f0000000100), 0x10080, 0x0) (async) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) (async) getdents64(r0, 0x0, 0x0) 01:19:12 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x40000000000000) 01:19:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead949000300"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:12 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x70) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x0) unlink(&(0x7f0000000100)='./file0\x00') r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup(r1) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0xee00, 0xee00}}, './file0/bus\x00'}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, &(0x7f0000001280)={{0x1, 0x1, 0x18, r0}, './file0/bus\x00'}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f0000000080)='./file0/bus\x00', r2}, 0x20) 01:19:12 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0xf0ffffff7f0000) 01:19:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead949000400"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 616.453671][ T9503] loop3: detected capacity change from 0 to 512 [ 616.462137][ T9512] loop5: detected capacity change from 0 to 512 01:19:12 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x100000000000000) 01:19:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead949000500"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 616.514432][ T9523] loop4: detected capacity change from 0 to 512 [ 616.518878][ T9512] EXT4-fs (loop5): 1 orphan inode deleted [ 616.526575][ T9512] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 616.540807][ T9512] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1432/file0 supports timestamps until 2038 (0x7fffffff) [ 616.560697][ T9503] EXT4-fs warning (device loop3): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 616.584967][ T9503] EXT4-fs (loop3): mount failed 01:19:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006330200600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:19:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)='PMM\x00PMM', 0x7, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) 01:19:12 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x200000000000000) 01:19:12 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x70) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x0) unlink(&(0x7f0000000100)='./file0\x00') r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup(r1) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0xee00, 0xee00}}, './file0/bus\x00'}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, &(0x7f0000001280)={{0x1, 0x1, 0x18, r0}, './file0/bus\x00'}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f0000000080)='./file0/bus\x00', r2}, 0x20) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) (async) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) (async) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) (async) open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x70) (async) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) (async) getdents64(r0, 0x0, 0x0) (async) unlink(&(0x7f0000000100)='./file0\x00') (async) socket$inet_sctp(0x2, 0x5, 0x84) (async) dup(r1) (async) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) (async) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0xee00, 0xee00}}, './file0/bus\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, &(0x7f0000001280)={{0x1, 0x1, 0x18, r0}, './file0/bus\x00'}) (async) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f0000000080)='./file0/bus\x00', r2}, 0x20) (async) 01:19:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead949000600"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) [ 617.348143][ T9523] EXT4-fs warning (device loop4): ext4_multi_mount_protect:330: MMP startup interrupted, failing mount [ 617.348143][ T9523] 01:19:12 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x300000000000000) 01:19:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead949000700"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:13 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) (async) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) (async) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x70) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x0) (async) unlink(&(0x7f0000000100)='./file0\x00') r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup(r1) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) (async) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0xee00, 0xee00}}, './file0/bus\x00'}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, &(0x7f0000001280)={{0x1, 0x1, 0x18, r0}, './file0/bus\x00'}) (async) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f0000000080)='./file0/bus\x00', r2}, 0x20) [ 617.419901][ T9541] loop5: detected capacity change from 0 to 512 [ 617.421611][ T9542] loop3: detected capacity change from 0 to 512 [ 617.447484][ T9551] loop4: detected capacity change from 0 to 512 01:19:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead949009000"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:13 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x400000000000000) 01:19:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead949000003"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 617.468176][ T9541] EXT4-fs (loop5): 1 orphan inode deleted [ 617.473970][ T9541] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 617.502933][ T9541] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1433/file0 supports timestamps until 2038 (0x7fffffff) 01:19:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006340200600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:19:13 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x500000000000000) [ 617.526167][ T9542] EXT4-fs warning (device loop3): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 617.550797][ T9542] EXT4-fs (loop3): mount failed [ 617.587982][ T9571] loop5: detected capacity change from 0 to 512 [ 617.606251][ T9571] EXT4-fs (loop5): 1 orphan inode deleted [ 617.612051][ T9571] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 617.623487][ T9571] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1434/file0 supports timestamps until 2038 (0x7fffffff) 01:19:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)='PMM\x00PMM', 0x7, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) [ 618.284554][ T9551] EXT4-fs warning (device loop4): ext4_multi_mount_protect:330: MMP startup interrupted, failing mount [ 618.284554][ T9551] 01:19:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead949000005"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:13 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x600000000000000) 01:19:13 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x71, 0x9c, 0x9}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000280)=""/4096, 0x1000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup(r0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) getdents64(r1, &(0x7f0000001280)=""/235, 0xeb) getdents(r1, &(0x7f0000001380)=""/219, 0xdb) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="2f64657623f967fe3000"], &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='dax\x00', 0x2004020, &(0x7f0000000200)='*-') getdents64(0xffffffffffffffff, 0x0, 0x0) 01:19:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:19:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006350200600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:19:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead949000006"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:13 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x700000000000000) 01:19:13 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x71, 0x9c, 0x9}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000280)=""/4096, 0x1000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup(r0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) getdents64(r1, &(0x7f0000001280)=""/235, 0xeb) getdents(r1, &(0x7f0000001380)=""/219, 0xdb) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="2f64657623f967fe3000"], &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='dax\x00', 0x2004020, &(0x7f0000000200)='*-') getdents64(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x71, 0x9c, 0x9}]}) (async) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) (async) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) (async) getdents(0xffffffffffffffff, &(0x7f0000000280)=""/4096, 0x1000) (async) socket$inet_sctp(0x2, 0x5, 0x84) (async) dup(r0) (async) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) (async) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) (async) getdents64(r1, &(0x7f0000001280)=""/235, 0xeb) (async) getdents(r1, &(0x7f0000001380)=""/219, 0xdb) (async) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="2f64657623f967fe3000"], &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='dax\x00', 0x2004020, &(0x7f0000000200)='*-') (async) getdents64(0xffffffffffffffff, 0x0, 0x0) (async) 01:19:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead949000007"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 618.358989][ T9579] sysfs: Unknown parameter '*-' [ 618.369010][ T9582] loop3: detected capacity change from 0 to 512 [ 618.369027][ T9583] loop5: detected capacity change from 0 to 512 [ 618.389123][ T9585] loop4: detected capacity change from 0 to 512 01:19:13 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x800000000000000) [ 618.444975][ T9582] EXT4-fs warning (device loop3): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 618.463058][ T9593] sysfs: Unknown parameter '*-' [ 618.478952][ T9583] EXT4-fs (loop5): 1 orphan inode deleted 01:19:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead949000040"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 618.484808][ T9583] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 618.487945][ T9582] EXT4-fs (loop3): mount failed [ 618.502670][ T9583] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1435/file0 supports timestamps until 2038 (0x7fffffff) 01:19:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)='PMM\x00PMM', 0x7, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) 01:19:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006360200600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:19:14 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0xa00000000000000) 01:19:14 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x71, 0x9c, 0x9}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000280)=""/4096, 0x1000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup(r0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) getdents64(r1, &(0x7f0000001280)=""/235, 0xeb) getdents(r1, &(0x7f0000001380)=""/219, 0xdb) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="2f64657623f967fe3000"], &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='dax\x00', 0x2004020, &(0x7f0000000200)='*-') getdents64(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x71, 0x9c, 0x9}]}) (async) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) (async) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) (async) getdents(0xffffffffffffffff, &(0x7f0000000280)=""/4096, 0x1000) (async) socket$inet_sctp(0x2, 0x5, 0x84) (async) dup(r0) (async) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) (async) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) (async) getdents64(r1, &(0x7f0000001280)=""/235, 0xeb) (async) getdents(r1, &(0x7f0000001380)=""/219, 0xdb) (async) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="2f64657623f967fe3000"], &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='dax\x00', 0x2004020, &(0x7f0000000200)='*-') (async) getdents64(0xffffffffffffffff, 0x0, 0x0) (async) 01:19:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead949000090"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 619.214841][ T9585] EXT4-fs warning (device loop4): ext4_multi_mount_protect:330: MMP startup interrupted, failing mount [ 619.214841][ T9585] 01:19:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:19:14 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0xf00000000000000) 01:19:14 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0xff, 0x81, 0x2, 0x8001}, {0x81, 0x3e, 0xff, 0x6}]}) 01:19:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 619.265067][ T9614] loop5: detected capacity change from 0 to 512 [ 619.269879][ T9620] sysfs: Unknown parameter '*-' [ 619.272066][ T9619] loop3: detected capacity change from 0 to 512 [ 619.300147][ T9619] EXT4-fs warning (device loop3): read_mmp_block:107: Error -117 while reading MMP block 12 01:19:14 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1400000000000000) 01:19:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:14 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0xff, 0x81, 0x2, 0x8001}, {0x81, 0x3e, 0xff, 0x6}]}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) (async) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) (async) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) (async) open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) (async) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) (async) getdents64(r0, 0x0, 0x0) (async) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0xff, 0x81, 0x2, 0x8001}, {0x81, 0x3e, 0xff, 0x6}]}) (async) [ 619.331869][ T9638] loop4: detected capacity change from 0 to 512 [ 619.348226][ T9614] EXT4-fs (loop5): 1 orphan inode deleted [ 619.354021][ T9614] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 619.388429][ T9614] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1436/file0 supports timestamps until 2038 (0x7fffffff) 01:19:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) 01:19:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 620.160647][ T9638] EXT4-fs warning (device loop4): ext4_multi_mount_protect:330: MMP startup interrupted, failing mount [ 620.160647][ T9638] 01:19:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:19:15 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x3075000000000000) 01:19:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006370200600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:19:15 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) (async) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) (async) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) (async) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) (async) getdents64(r0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0xff, 0x81, 0x2, 0x8001}, {0x81, 0x3e, 0xff, 0x6}]}) 01:19:15 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x4, &(0x7f0000000080)=[{0x7, 0x3b, 0xd8, 0x2}, {0x7, 0x17, 0x8, 0x8}, {0x7fff, 0x5d, 0x20, 0x3}, {0x205, 0x2, 0x1f, 0x8e9}]}, 0x10) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) lsetxattr$trusted_overlay_origin(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140), &(0x7f0000000200), 0x2, 0x0) getdents64(r0, 0x0, 0x0) 01:19:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:15 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x3400000000000000) [ 620.227973][ T9666] loop5: detected capacity change from 0 to 512 [ 620.235051][ T9661] loop3: detected capacity change from 0 to 512 01:19:15 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x4102000000000000) [ 620.268861][ T9661] EXT4-fs warning (device loop3): read_mmp_block:107: Error -117 while reading MMP block 12 [ 620.287705][ T24] kauditd_printk_skb: 175 callbacks suppressed [ 620.287719][ T24] audit: type=1326 audit(1639358355.819:12545): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9671 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7febc7e7ce99 code=0x7ffc0000 [ 620.318520][ T24] audit: type=1326 audit(1639358355.819:12546): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9671 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=83 compat=0 ip=0x7febc7e7ce99 code=0x7ffc0000 [ 620.319808][ T9666] Quota error (device loop5): find_tree_dqentry: Getting block too big (262144 >= 6) [ 620.342519][ T24] audit: type=1326 audit(1639358355.819:12547): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9671 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7febc7e7ce99 code=0x7ffc0000 [ 620.342546][ T24] audit: type=1326 audit(1639358355.819:12548): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9671 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7febc7e7ce99 code=0x7ffc0000 01:19:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:15 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x4, &(0x7f0000000080)=[{0x7, 0x3b, 0xd8, 0x2}, {0x7, 0x17, 0x8, 0x8}, {0x7fff, 0x5d, 0x20, 0x3}, {0x205, 0x2, 0x1f, 0x8e9}]}, 0x10) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) lsetxattr$trusted_overlay_origin(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140), &(0x7f0000000200), 0x2, 0x0) getdents64(r0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) (async) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) (async) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x4, &(0x7f0000000080)=[{0x7, 0x3b, 0xd8, 0x2}, {0x7, 0x17, 0x8, 0x8}, {0x7fff, 0x5d, 0x20, 0x3}, {0x205, 0x2, 0x1f, 0x8e9}]}, 0x10) (async) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) (async) open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) (async) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) (async) lsetxattr$trusted_overlay_origin(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140), &(0x7f0000000200), 0x2, 0x0) (async) getdents64(r0, 0x0, 0x0) (async) [ 620.342567][ T24] audit: type=1326 audit(1639358355.819:12549): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9671 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7febc7e7ce99 code=0x7ffc0000 [ 620.342588][ T24] audit: type=1326 audit(1639358355.819:12550): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9671 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=165 compat=0 ip=0x7febc7e7ce99 code=0x7ffc0000 [ 620.352072][ T9666] Quota error (device loop5): qtree_read_dquot: Can't read quota structure for id 0 [ 620.376015][ T24] audit: type=1326 audit(1639358355.819:12551): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9671 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7febc7e7ce99 code=0x7ffc0000 [ 620.414015][ T9666] Quota error (device loop5): find_tree_dqentry: Getting block too big (262144 >= 6) [ 620.427366][ T9682] loop4: detected capacity change from 0 to 512 [ 620.506073][ T9666] EXT4-fs (loop5): 1 orphan inode deleted [ 620.511973][ T9666] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 620.523099][ T9682] EXT4-fs warning (device loop4): read_mmp_block:107: Error -117 while reading MMP block 12 [ 620.526148][ T9666] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1437/file0 supports timestamps until 2038 (0x7fffffff) 01:19:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) 01:19:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:19:16 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x4, &(0x7f0000000080)=[{0x7, 0x3b, 0xd8, 0x2}, {0x7, 0x17, 0x8, 0x8}, {0x7fff, 0x5d, 0x20, 0x3}, {0x205, 0x2, 0x1f, 0x8e9}]}, 0x10) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) (async) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) lsetxattr$trusted_overlay_origin(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140), &(0x7f0000000200), 0x2, 0x0) (async) getdents64(r0, 0x0, 0x0) 01:19:16 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x4402000000000000) 01:19:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006400200600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:19:16 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x4c1d000000000000) 01:19:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 620.622398][ T9798] loop3: detected capacity change from 0 to 512 [ 620.644769][ T9803] loop5: detected capacity change from 0 to 512 [ 620.658643][ T9798] EXT4-fs warning (device loop3): read_mmp_block:107: Error -117 while reading MMP block 12 01:19:16 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000000c0)={0x4, &(0x7f0000000080)=[{0x4, 0x1, 0x40, 0x1f}, {0x3, 0x9, 0xca, 0x9}, {0x1, 0x3, 0x7, 0x1}, {0x401, 0xff, 0x1f, 0xfff}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000140)={0x3, &(0x7f0000000100)=[{0x8e77, 0xd1, 0x2}, {0x0, 0xff, 0x7, 0xd36}, {0x3, 0x1, 0xff, 0xfffffff7}]}) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) 01:19:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:16 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x7400000000000000) [ 620.669607][ T9806] loop4: detected capacity change from 0 to 512 [ 620.689647][ T9806] EXT4-fs warning (device loop4): read_mmp_block:107: Error -117 while reading MMP block 12 01:19:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) 01:19:16 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x8000000000000000) [ 620.721569][ T9803] EXT4-fs (loop5): 1 orphan inode deleted 01:19:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:19:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900ffff"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:16 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000000c0)={0x4, &(0x7f0000000080)=[{0x4, 0x1, 0x40, 0x1f}, {0x3, 0x9, 0xca, 0x9}, {0x1, 0x3, 0x7, 0x1}, {0x401, 0xff, 0x1f, 0xfff}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000140)={0x3, &(0x7f0000000100)=[{0x8e77, 0xd1, 0x2}, {0x0, 0xff, 0x7, 0xd36}, {0x3, 0x1, 0xff, 0xfffffff7}]}) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) (async) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000000c0)={0x4, &(0x7f0000000080)=[{0x4, 0x1, 0x40, 0x1f}, {0x3, 0x9, 0xca, 0x9}, {0x1, 0x3, 0x7, 0x1}, {0x401, 0xff, 0x1f, 0xfff}]}) (async) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) (async) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) (async) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000140)={0x3, &(0x7f0000000100)=[{0x8e77, 0xd1, 0x2}, {0x0, 0xff, 0x7, 0xd36}, {0x3, 0x1, 0xff, 0xfffffff7}]}) (async) open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) (async) getdents64(r0, 0x0, 0x0) (async) 01:19:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006410200600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:19:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:16 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x80fb000000000000) [ 620.744765][ T9820] loop4: detected capacity change from 0 to 512 [ 620.751141][ T9803] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1438/file0 supports timestamps until 2038 (0x7fffffff) [ 620.769436][ T9820] EXT4-fs warning (device loop4): read_mmp_block:107: Error -117 while reading MMP block 12 01:19:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900ffff"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:16 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) (async) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000000c0)={0x4, &(0x7f0000000080)=[{0x4, 0x1, 0x40, 0x1f}, {0x3, 0x9, 0xca, 0x9}, {0x1, 0x3, 0x7, 0x1}, {0x401, 0xff, 0x1f, 0xfff}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) (async, rerun: 32) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) (async, rerun: 32) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000140)={0x3, &(0x7f0000000100)=[{0x8e77, 0xd1, 0x2}, {0x0, 0xff, 0x7, 0xd36}, {0x3, 0x1, 0xff, 0xfffffff7}]}) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) 01:19:16 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x8804000000000000) 01:19:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) 01:19:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead949008dff"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 620.817914][ T9827] loop3: detected capacity change from 0 to 512 [ 620.841381][ T9827] EXT4-fs warning (device loop3): read_mmp_block:107: Error -117 while reading MMP block 12 01:19:16 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x983a000000000000) 01:19:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:19:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900f5ff"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:16 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0xbcedff7f00000000) [ 620.892053][ T9847] loop4: detected capacity change from 0 to 512 [ 620.907363][ T9847] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 620.917254][ T9847] EXT4-fs (loop4): group descriptors corrupted! [ 620.934243][ T9853] loop5: detected capacity change from 0 to 512 01:19:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006460200600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000002000400000000000800030000000af301000400000000000000000000000100000020000000000000000000000000000000000000000000000000000000000000000000000000000000c6d15a57000000000000000000000000000000000000000000000000ed8100001a040000d8f4655fd8f4655fd8f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000ec07159c000000000000000000000000000000000000000000000000ffa1000026000000d8f4655fd8f4655fd8f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3034363634343935392f66696c65302f66696c65300000000000000000000000000000000000000000000011b29fd4000000000000000000000000000000000000000000000000ed81", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:19:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) 01:19:16 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0xde01000000000000) 01:19:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 620.979112][ T9859] loop3: detected capacity change from 0 to 512 [ 620.993398][ T9859] EXT4-fs warning (device loop3): read_mmp_block:107: Error -117 while reading MMP block 12 [ 621.002390][ T9853] EXT4-fs (loop5): 1 orphan inode deleted [ 621.009285][ T9853] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1439/file0 supports timestamps until 2038 (0x7fffffff) [ 621.046141][ T9865] loop4: detected capacity change from 0 to 512 [ 621.058552][ T9865] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 621.068407][ T9865] EXT4-fs (loop4): group descriptors corrupted! [ 621.107826][ T9870] loop5: detected capacity change from 0 to 512 [ 621.122113][ T9870] EXT4-fs (loop5): 1 orphan inode deleted [ 621.128091][ T9870] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1440/file0 supports timestamps until 2038 (0x7fffffff) 01:19:17 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x10081, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000001280)=""/4085, 0xff5) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000100)={0x3, &(0x7f00000000c0)=[{0x8, 0x1f, 0x6a, 0x1f}, {0x9, 0x0, 0x20, 0x1}, {0x7, 0x2, 0x81, 0x8}]}) getdents64(r0, 0x0, 0x0) 01:19:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:19:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) 01:19:17 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0xe803000000000000) 01:19:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000300600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:19:17 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0xf401000000000000) 01:19:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 621.732835][ T9879] loop4: detected capacity change from 0 to 512 [ 621.733929][ T9880] loop5: detected capacity change from 0 to 512 [ 621.748894][ T9883] loop3: detected capacity change from 0 to 512 [ 621.769286][ T9883] EXT4-fs warning (device loop3): read_mmp_block:107: Error -117 while reading MMP block 12 01:19:17 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) (async) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) (async) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x10081, 0x0) (async) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000001280)=""/4085, 0xff5) (async) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000100)={0x3, &(0x7f00000000c0)=[{0x8, 0x1f, 0x6a, 0x1f}, {0x9, 0x0, 0x20, 0x1}, {0x7, 0x2, 0x81, 0x8}]}) (async) getdents64(r0, 0x0, 0x0) 01:19:17 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0xffffffff00000000) 01:19:17 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) 01:19:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006140300600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000002000400000000000800030000000af301000400000000000000000000000100000020000000000000000000000000000000000000000000000000000000000000000000000000000000c6d15a57000000000000000000000000000000000000000000000000ed8100001a040000d8f4655fd8f4655fd8f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000ec07159c000000000000000000000000000000000000000000000000ffa1000026000000d8f4655fd8f4655fd8f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3034363634343935392f66696c65302f66696c65300000000000000000000000000000000000000000000011b29fd4000000000000000000000000000000000000000000000000ed81", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) [ 621.783849][ T9879] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 621.793610][ T9879] EXT4-fs (loop4): group descriptors corrupted! [ 621.804980][ T9880] EXT4-fs (loop5): 1 orphan inode deleted [ 621.818947][ T9880] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1441/file0 supports timestamps until 2038 (0x7fffffff) 01:19:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:19:17 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) (async) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x10081, 0x0) (async) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000001280)=""/4085, 0xff5) (async) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000100)={0x3, &(0x7f00000000c0)=[{0x8, 0x1f, 0x6a, 0x1f}, {0x9, 0x0, 0x20, 0x1}, {0x7, 0x2, 0x81, 0x8}]}) (async) getdents64(r0, 0x0, 0x0) 01:19:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:17 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) (async) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) (async) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) (async) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) (async) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) (async) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) (async) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) (async) 01:19:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) 01:19:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) [ 621.899626][ T9911] loop3: detected capacity change from 0 to 512 [ 621.913338][ T9918] loop5: detected capacity change from 0 to 512 [ 621.922446][ T9911] EXT4-fs warning (device loop3): read_mmp_block:107: Error -117 while reading MMP block 12 01:19:17 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, &(0x7f0000000080)=""/38, 0x26) getdents64(r0, 0x0, 0x0) 01:19:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 621.950181][ T9933] loop4: detected capacity change from 0 to 512 [ 621.963681][ T9943] loop3: detected capacity change from 0 to 512 [ 621.974869][ T9933] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 621.984661][ T9933] EXT4-fs (loop4): group descriptors corrupted! 01:19:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:17 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) (async) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) (async) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) (async) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) (async) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) (async) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) (async) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) (async) [ 621.988119][ T9943] EXT4-fs warning (device loop3): read_mmp_block:107: Error -117 while reading MMP block 12 01:19:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000068c0300600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:19:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:19:17 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) (async) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) (async) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) (async) getdents64(r0, &(0x7f0000000080)=""/38, 0x26) (async) getdents64(r0, 0x0, 0x0) 01:19:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) [ 622.037090][ T9918] EXT4-fs (loop5): 1 orphan inode deleted [ 622.052783][ T9918] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1442/file0 supports timestamps until 2038 (0x7fffffff) 01:19:17 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) r1 = socket$inet_sctp(0x2, 0x5, 0x84) dup(r1) recvmsg(r1, &(0x7f0000001440)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x7115}, 0x0) 01:19:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:17 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) (async) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) (async) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) (async) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) (async) r1 = socket$inet_sctp(0x2, 0x5, 0x84) dup(r1) (async) recvmsg(r1, &(0x7f0000001440)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x7115}, 0x0) 01:19:17 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) (async) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) (async, rerun: 32) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) (rerun: 32) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) (async) getdents64(r0, &(0x7f0000000080)=""/38, 0x26) (async, rerun: 64) getdents64(r0, 0x0, 0x0) (rerun: 64) 01:19:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 622.094718][T10133] loop3: detected capacity change from 0 to 512 [ 622.111107][T10133] EXT4-fs warning (device loop3): read_mmp_block:107: Error -117 while reading MMP block 12 [ 622.129471][T10141] loop4: detected capacity change from 0 to 512 01:19:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:17 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x2000000000000098, &(0x7f0000000080)}) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001400)={{{@in6=@loopback, @in6=@ipv4={""/10, ""/2, @multicast2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={""/10, ""/2, @multicast2}}, 0x0, @in6=@mcast1}}, &(0x7f0000001500)=0xe8) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000140)='./file0\x00', &(0x7f0000000200), 0x3000009, &(0x7f0000001540)={'trans=tcp,', {'port', 0x3d, 0x4e23}, 0x2c, {[{@fscache}, {@cache_none}, {@access_uid={'access', 0x3d, r1}}], [{@smackfshat={'smackfshat', 0x3d, '}*'}}, {@subj_type}]}}) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x1000, 0x100, &(0x7f0000001280)) [ 622.170672][T10141] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 622.180481][T10141] EXT4-fs (loop4): group descriptors corrupted! [ 622.213708][T10258] loop5: detected capacity change from 0 to 512 01:19:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)='PMM\x00', 0x4, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:19:17 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) (async) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) (async) r1 = socket$inet_sctp(0x2, 0x5, 0x84) dup(r1) recvmsg(r1, &(0x7f0000001440)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x7115}, 0x0) 01:19:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006c40300600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:19:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) 01:19:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 622.255044][T10258] EXT4-fs (loop5): 1 orphan inode deleted [ 622.260948][T10258] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1443/file0 supports timestamps until 2038 (0x7fffffff) [ 622.288521][T10268] loop3: detected capacity change from 0 to 512 01:19:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead949000002"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:17 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000040)={@in={{0x2, 0x4e21, @local}}, 0x0, 0x0, 0x4d, 0x0, "3884d7bdcc8d5521217aff8c6f7f3cddd83d0fc907a9556749823009675f2aee0789614455b562abe5f9fd0ba18a1fa874857b2a3b219e440eab5a3936cbcccb9924f3abbf97a66471057c5943bc3257"}, 0xd8) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) 01:19:17 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) (async) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) (async) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000040)={@in={{0x2, 0x4e21, @local}}, 0x0, 0x0, 0x4d, 0x0, "3884d7bdcc8d5521217aff8c6f7f3cddd83d0fc907a9556749823009675f2aee0789614455b562abe5f9fd0ba18a1fa874857b2a3b219e440eab5a3936cbcccb9924f3abbf97a66471057c5943bc3257"}, 0xd8) (async) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) (async) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) (async) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) 01:19:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead949000003"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead949000004"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 622.305356][T10274] loop4: detected capacity change from 0 to 512 [ 622.329660][T10274] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 622.339515][T10274] EXT4-fs (loop4): group descriptors corrupted! [ 622.388927][T10320] loop5: detected capacity change from 0 to 512 [ 622.404926][T10320] EXT4-fs (loop5): 1 orphan inode deleted [ 622.411550][T10320] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1444/file0 supports timestamps until 2038 (0x7fffffff) 01:19:18 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) (async) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) (async) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) (async) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x2000000000000098, &(0x7f0000000080)}) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) (async) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001400)={{{@in6=@loopback, @in6=@ipv4={""/10, ""/2, @multicast2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={""/10, ""/2, @multicast2}}, 0x0, @in6=@mcast1}}, &(0x7f0000001500)=0xe8) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000140)='./file0\x00', &(0x7f0000000200), 0x3000009, &(0x7f0000001540)={'trans=tcp,', {'port', 0x3d, 0x4e23}, 0x2c, {[{@fscache}, {@cache_none}, {@access_uid={'access', 0x3d, r1}}], [{@smackfshat={'smackfshat', 0x3d, '}*'}}, {@subj_type}]}}) (async) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) (async) getdents64(r0, 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x1000, 0x100, &(0x7f0000001280)) [ 623.057381][T10262] 9pnet: p9_fd_create_tcp (10262): problem connecting socket to 127.0.0.1 01:19:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)='PMM\x00', 0x4, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:19:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) 01:19:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead949000005"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:18 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) (async) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) (async) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000040)={@in={{0x2, 0x4e21, @local}}, 0x0, 0x0, 0x4d, 0x0, "3884d7bdcc8d5521217aff8c6f7f3cddd83d0fc907a9556749823009675f2aee0789614455b562abe5f9fd0ba18a1fa874857b2a3b219e440eab5a3936cbcccb9924f3abbf97a66471057c5943bc3257"}, 0xd8) (async) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) 01:19:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006c50300600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) [ 623.122270][T10268] EXT4-fs warning (device loop3): ext4_multi_mount_protect:330: MMP startup interrupted, failing mount [ 623.122270][T10268] 01:19:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead949000006"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) [ 623.187363][T10403] loop5: detected capacity change from 0 to 512 [ 623.196087][T10407] loop4: detected capacity change from 0 to 512 [ 623.206893][T10407] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 623.216719][T10407] EXT4-fs (loop4): group descriptors corrupted! [ 623.226103][T10441] loop3: detected capacity change from 0 to 512 01:19:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead949000007"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead949000090"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:18 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x80000000, 0x1ff}}, './file0\x00'}) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, &(0x7f0000000140)={'mangle\x00', 0x82, "e0d323dd8f5e2a32fb3a16737189eb2fb06bbca6aedad4a61026b51f6096a81fe1aa24d4f0ea5604f4c2c15483fca288982c48db5f80b7f2cd7497d28c8b7f60ad014a19278747046a75d9674b75a952dee97466d0de14d61287cebea875828aa1b97bfe89c6b780ab3bcc452051af080c54ebace78c1f8d28b19f0f7d32049a87bd"}, &(0x7f0000000200)=0xa6) 01:19:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 623.238746][T10403] EXT4-fs (loop5): 1 orphan inode deleted [ 623.246360][T10403] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1445/file0 supports timestamps until 2038 (0x7fffffff) [ 623.296784][T10521] loop4: detected capacity change from 0 to 512 [ 623.312346][T10521] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 623.322178][T10521] EXT4-fs (loop4): group descriptors corrupted! 01:19:19 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) (async) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) (async) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) (async) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x2000000000000098, &(0x7f0000000080)}) (async) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) (async) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001400)={{{@in6=@loopback, @in6=@ipv4={""/10, ""/2, @multicast2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={""/10, ""/2, @multicast2}}, 0x0, @in6=@mcast1}}, &(0x7f0000001500)=0xe8) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000140)='./file0\x00', &(0x7f0000000200), 0x3000009, &(0x7f0000001540)={'trans=tcp,', {'port', 0x3d, 0x4e23}, 0x2c, {[{@fscache}, {@cache_none}, {@access_uid={'access', 0x3d, r1}}], [{@smackfshat={'smackfshat', 0x3d, '}*'}}, {@subj_type}]}}) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) (async) getdents64(r0, 0x0, 0x0) (async) statx(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x1000, 0x100, &(0x7f0000001280)) [ 623.917235][T10394] 9pnet: p9_fd_create_tcp (10394): problem connecting socket to 127.0.0.1 01:19:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)='PMM\x00', 0x4, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:19:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006f50300600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000002000400000000000800030000000af301000400000000000000000000000100000020000000000000000000000000000000000000000000000000000000000000000000000000000000c6d15a57000000000000000000000000000000000000000000000000ed8100001a040000d8f4655fd8f4655fd8f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000ec07159c000000000000000000000000000000000000000000000000ffa1000026000000d8f4655fd8f4655fd8f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3034363634343935392f66696c65302f66696c65300000000000000000000000000000000000000000000011b29fd4000000000000000000000000000000000000000000000000ed81", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:19:19 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) (async, rerun: 64) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) (rerun: 64) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) (async) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) (async, rerun: 32) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) (rerun: 32) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x80000000, 0x1ff}}, './file0\x00'}) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, &(0x7f0000000140)={'mangle\x00', 0x82, "e0d323dd8f5e2a32fb3a16737189eb2fb06bbca6aedad4a61026b51f6096a81fe1aa24d4f0ea5604f4c2c15483fca288982c48db5f80b7f2cd7497d28c8b7f60ad014a19278747046a75d9674b75a952dee97466d0de14d61287cebea875828aa1b97bfe89c6b780ab3bcc452051af080c54ebace78c1f8d28b19f0f7d32049a87bd"}, &(0x7f0000000200)=0xa6) 01:19:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) [ 624.059961][T10441] EXT4-fs warning (device loop3): ext4_multi_mount_protect:330: MMP startup interrupted, failing mount [ 624.059961][T10441] 01:19:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 624.123736][T10535] loop4: detected capacity change from 0 to 512 [ 624.125588][T10537] loop5: detected capacity change from 0 to 512 [ 624.149658][T10535] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 624.159714][T10535] EXT4-fs (loop4): group descriptors corrupted! 01:19:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:19 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) (async) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) (async) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) (async) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x80000000, 0x1ff}}, './file0\x00'}) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, &(0x7f0000000140)={'mangle\x00', 0x82, "e0d323dd8f5e2a32fb3a16737189eb2fb06bbca6aedad4a61026b51f6096a81fe1aa24d4f0ea5604f4c2c15483fca288982c48db5f80b7f2cd7497d28c8b7f60ad014a19278747046a75d9674b75a952dee97466d0de14d61287cebea875828aa1b97bfe89c6b780ab3bcc452051af080c54ebace78c1f8d28b19f0f7d32049a87bd"}, &(0x7f0000000200)=0xa6) 01:19:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006020400600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) [ 624.169455][T10537] EXT4-fs (loop5): 1 orphan inode deleted [ 624.175270][T10537] EXT4-fs mount: 8 callbacks suppressed [ 624.175282][T10537] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 624.202763][T10649] loop3: detected capacity change from 0 to 512 [ 624.206105][T10537] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1446/file0 supports timestamps until 2038 (0x7fffffff) [ 624.298856][T10756] loop5: detected capacity change from 0 to 512 [ 624.313536][T10756] EXT4-fs (loop5): 1 orphan inode deleted [ 624.319290][T10756] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 624.330789][T10756] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1447/file0 supports timestamps until 2038 (0x7fffffff) 01:19:20 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup(r1) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) symlinkat(&(0x7f0000000080)='./file0/bus\x00', r2, &(0x7f00000000c0)='./file1\x00') [ 624.776418][T10525] 9pnet: p9_fd_create_tcp (10525): problem connecting socket to 127.0.0.1 01:19:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)='PMM\x00PM', 0x6, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:19:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="0200000012", 0x5, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) 01:19:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:20 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth1_macvtap\x00'}) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) r1 = dup3(r0, r0, 0x80000) r2 = socket$l2tp6(0xa, 0x2, 0x73) splice(r1, &(0x7f0000000080)=0x80000000, r2, &(0x7f00000000c0)=0x5, 0x8, 0xc) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) recvmsg(r3, &(0x7f0000001440)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x7115}, 0x0) 01:19:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006060400600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000002000400000000000800030000000af301000400000000000000000000000100000020000000000000000000000000000000000000000000000000000000000000000000000000000000c6d15a57000000000000000000000000000000000000000000000000ed8100001a040000d8f4655fd8f4655fd8f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000ec07159c000000000000000000000000000000000000000000000000ffa1000026000000d8f4655fd8f4655fd8f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3034363634343935392f66696c65302f66696c65300000000000000000000000000000000000000000000011b29fd4000000000000000000000000000000000000000000000000ed81", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:19:20 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup(r1) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) symlinkat(&(0x7f0000000080)='./file0/bus\x00', r2, &(0x7f00000000c0)='./file1\x00') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) (async) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) (async) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) (async) open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) (async) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) (async) getdents64(r0, 0x0, 0x0) (async) socket$inet_sctp(0x2, 0x5, 0x84) (async) dup(r1) (async) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) (async) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) (async) symlinkat(&(0x7f0000000080)='./file0/bus\x00', r2, &(0x7f00000000c0)='./file1\x00') (async) [ 625.036099][T10649] EXT4-fs warning (device loop3): ext4_multi_mount_protect:330: MMP startup interrupted, failing mount [ 625.036099][T10649] 01:19:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 625.097880][T10768] loop5: detected capacity change from 0 to 512 [ 625.100011][T10769] loop4: detected capacity change from 0 to 512 [ 625.126450][T10782] loop3: detected capacity change from 0 to 512 [ 625.132323][T10769] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock 01:19:20 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth1_macvtap\x00'}) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) r1 = dup3(r0, r0, 0x80000) r2 = socket$l2tp6(0xa, 0x2, 0x73) splice(r1, &(0x7f0000000080)=0x80000000, r2, &(0x7f00000000c0)=0x5, 0x8, 0xc) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) recvmsg(r3, &(0x7f0000001440)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x7115}, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) (async) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) (async) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) (async) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) (async) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth1_macvtap\x00'}) (async) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) (async) dup3(r0, r0, 0x80000) (async) socket$l2tp6(0xa, 0x2, 0x73) (async) splice(r1, &(0x7f0000000080)=0x80000000, r2, &(0x7f00000000c0)=0x5, 0x8, 0xc) (async) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) (async) socket$phonet_pipe(0x23, 0x5, 0x2) (async) recvmsg(r3, &(0x7f0000001440)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x7115}, 0x0) (async) 01:19:20 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup(r1) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) symlinkat(&(0x7f0000000080)='./file0/bus\x00', r2, &(0x7f00000000c0)='./file1\x00') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) (async) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) (async) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) (async) open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) (async) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) (async) getdents64(r0, 0x0, 0x0) (async) socket$inet_sctp(0x2, 0x5, 0x84) (async) dup(r1) (async) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) (async) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) (async) symlinkat(&(0x7f0000000080)='./file0/bus\x00', r2, &(0x7f00000000c0)='./file1\x00') (async) [ 625.142522][T10769] EXT4-fs (loop4): group descriptors corrupted! 01:19:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006100400600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:19:20 executing program 1: write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100)=0xffffffffffffffff, 0x12) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='qnx4\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) open(&(0x7f0000000080)='./file0/bus\x00', 0x400, 0x0) getdents64(r0, 0x0, 0x0) ioctl$F2FS_IOC_SET_PIN_FILE(r0, 0x4004f50d, &(0x7f00000000c0)) [ 625.168494][T10768] EXT4-fs (loop5): 1 orphan inode deleted [ 625.174318][T10768] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 625.188821][T10768] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1448/file0 supports timestamps until 2038 (0x7fffffff) [ 625.269594][T10908] loop5: detected capacity change from 0 to 512 [ 625.282687][T10908] EXT4-fs (loop5): 1 orphan inode deleted [ 625.288532][T10908] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 625.301072][T10908] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1449/file0 supports timestamps until 2038 (0x7fffffff) 01:19:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)='PMM\x00PM', 0x6, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:19:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="0200000012", 0x5, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) 01:19:21 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) (async) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) (async) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth1_macvtap\x00'}) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) (async) r1 = dup3(r0, r0, 0x80000) r2 = socket$l2tp6(0xa, 0x2, 0x73) splice(r1, &(0x7f0000000080)=0x80000000, r2, &(0x7f00000000c0)=0x5, 0x8, 0xc) (async) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) (async) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) recvmsg(r3, &(0x7f0000001440)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x7115}, 0x0) 01:19:21 executing program 1: write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100)=0xffffffffffffffff, 0x12) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) (async, rerun: 64) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) (async, rerun: 64) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='qnx4\x00', 0x0, 0x0) (async, rerun: 64) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) (rerun: 64) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) open(&(0x7f0000000080)='./file0/bus\x00', 0x400, 0x0) (async) getdents64(r0, 0x0, 0x0) (async) ioctl$F2FS_IOC_SET_PIN_FILE(r0, 0x4004f50d, &(0x7f00000000c0)) 01:19:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000500600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) [ 625.960341][T10782] EXT4-fs warning (device loop3): ext4_multi_mount_protect:330: MMP startup interrupted, failing mount [ 625.960341][T10782] 01:19:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 626.029705][T10923] loop5: detected capacity change from 0 to 512 [ 626.029977][T10924] loop4: detected capacity change from 0 to 512 [ 626.063699][T10924] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 626.073486][T10924] EXT4-fs (loop4): group descriptors corrupted! 01:19:21 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000080)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x9}}, './file0\x00'}) fcntl$setown(r1, 0x8, 0x0) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) 01:19:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 626.090457][T11031] loop3: detected capacity change from 0 to 512 [ 626.127131][T10923] __quota_error: 347 callbacks suppressed 01:19:21 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000080)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x9}}, './file0\x00'}) fcntl$setown(r1, 0x8, 0x0) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) (async) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) (async) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000080)={0x2, 0x4e23, @broadcast}, 0x10) (async) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) (async) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) (async) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x9}}, './file0\x00'}) (async) fcntl$setown(r1, 0x8, 0x0) (async) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) (async) 01:19:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:21 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000080)={0x2, 0x4e23, @broadcast}, 0x10) (async) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) (async) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x9}}, './file0\x00'}) fcntl$setown(r1, 0x8, 0x0) (async) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) [ 626.127147][T10923] Quota error (device loop5): find_tree_dqentry: Getting block too big (262144 >= 6) [ 626.142413][T10923] Quota error (device loop5): qtree_read_dquot: Can't read quota structure for id 0 [ 626.157427][T10923] Quota error (device loop5): find_tree_dqentry: Getting block too big (262144 >= 6) [ 626.166993][T10923] Quota error (device loop5): qtree_read_dquot: Can't read quota structure for id 0 [ 626.189445][T10923] Quota error (device loop5): find_tree_dqentry: Getting block too big (262144 >= 6) [ 626.198982][T10923] Quota error (device loop5): qtree_read_dquot: Can't read quota structure for id 0 [ 626.208857][T10923] EXT4-fs (loop5): 1 orphan inode deleted [ 626.214659][T10923] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 626.227158][T10923] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1450/file0 supports timestamps until 2038 (0x7fffffff) 01:19:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)='PMM\x00PM', 0x6, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:19:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="0200000012", 0x5, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) 01:19:22 executing program 2: r0 = socket$caif_seqpacket(0x25, 0x5, 0x2) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8983, &(0x7f0000000040)={0x3, '\x00', {0x8}, 0x7}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000080)=0x280, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r1, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) 01:19:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000600600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) [ 626.923847][T11031] EXT4-fs warning (device loop3): ext4_multi_mount_protect:330: MMP startup interrupted, failing mount [ 626.923847][T11031] 01:19:22 executing program 1: write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100)=0xffffffffffffffff, 0x12) (async, rerun: 64) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) (async, rerun: 64) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) (async) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='qnx4\x00', 0x0, 0x0) (async, rerun: 32) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) (rerun: 32) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) (async) open(&(0x7f0000000080)='./file0/bus\x00', 0x400, 0x0) (async) getdents64(r0, 0x0, 0x0) ioctl$F2FS_IOC_SET_PIN_FILE(r0, 0x4004f50d, &(0x7f00000000c0)) 01:19:22 executing program 2: r0 = socket$caif_seqpacket(0x25, 0x5, 0x2) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8983, &(0x7f0000000040)={0x3, '\x00', {0x8}, 0x7}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000080)=0x280, 0x4) (async) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) (async) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r1, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) 01:19:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead9490000ff"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 626.974789][T11113] loop5: detected capacity change from 0 to 512 [ 626.981625][T11116] loop4: detected capacity change from 0 to 512 [ 626.989695][T11116] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 626.999481][T11116] EXT4-fs (loop4): group descriptors corrupted! 01:19:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead9490000ff"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:22 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000634000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_setup(0x495a, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) r5 = io_uring_setup(0x2096, &(0x7f0000000000)) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r5, 0x9, 0x0, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_MADVISE={0x19, 0x5, 0x0, 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x0, {0x0, r6}}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_POLL_REMOVE={0x7, 0x3, 0x0, 0x0, 0x0, 0x23457, 0x0, 0x0, 0x0, {0x0, r6}}, 0x0) io_uring_enter(r0, 0x2a6e, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mknod(&(0x7f0000000140)='./file0/bus\x00', 0x2, 0x8) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r7 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r7, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r7, 0x0, 0x0) [ 627.025095][T11123] loop3: detected capacity change from 0 to 512 [ 627.047006][T11113] Quota error (device loop5): find_tree_dqentry: Getting block too big (262144 >= 6) [ 627.056529][T11113] Quota error (device loop5): qtree_read_dquot: Can't read quota structure for id 0 01:19:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000120000", 0x7, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) [ 627.069226][T11113] Quota error (device loop5): find_tree_dqentry: Getting block too big (262144 >= 6) [ 627.079291][T11113] Quota error (device loop5): qtree_read_dquot: Can't read quota structure for id 0 [ 627.097159][T11113] EXT4-fs (loop5): 1 orphan inode deleted [ 627.102953][T11113] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 627.119956][T11113] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1451/file0 supports timestamps until 2038 (0x7fffffff) [ 627.134845][T11167] loop4: detected capacity change from 0 to 512 [ 627.144987][T11167] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 627.154834][T11167] EXT4-fs (loop4): group descriptors corrupted! 01:19:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)='PMM\x00PMM', 0x7, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:19:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900008d"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006040600600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:19:23 executing program 2: r0 = socket$caif_seqpacket(0x25, 0x5, 0x2) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8983, &(0x7f0000000040)={0x3, '\x00', {0x8}, 0x7}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000080)=0x280, 0x4) (async, rerun: 32) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) (rerun: 32) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r1, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) [ 627.860177][T11123] EXT4-fs warning (device loop3): ext4_multi_mount_protect:330: MMP startup interrupted, failing mount [ 627.860177][T11123] 01:19:23 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) (async) r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000634000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) (async) syz_io_uring_setup(0x495a, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) r5 = io_uring_setup(0x2096, &(0x7f0000000000)) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r5, 0x9, 0x0, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_MADVISE={0x19, 0x5, 0x0, 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x0, {0x0, r6}}, 0x0) (async) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_POLL_REMOVE={0x7, 0x3, 0x0, 0x0, 0x0, 0x23457, 0x0, 0x0, 0x0, {0x0, r6}}, 0x0) (async) io_uring_enter(r0, 0x2a6e, 0x0, 0x0, 0x0, 0x0) (async) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mknod(&(0x7f0000000140)='./file0/bus\x00', 0x2, 0x8) (async) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r7 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r7, &(0x7f0000000280)=""/4096, 0x1000) (async) getdents64(r7, 0x0, 0x0) 01:19:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000120000", 0x7, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) 01:19:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead9490000f5"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 627.923267][T11243] loop4: detected capacity change from 0 to 512 [ 627.935280][T11249] loop5: detected capacity change from 0 to 512 [ 627.960171][T11256] loop3: detected capacity change from 0 to 512 01:19:23 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) (async) r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000634000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) (async) syz_io_uring_setup(0x495a, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) r5 = io_uring_setup(0x2096, &(0x7f0000000000)) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r5, 0x9, 0x0, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_MADVISE={0x19, 0x5, 0x0, 0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x0, {0x0, r6}}, 0x0) (async) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_POLL_REMOVE={0x7, 0x3, 0x0, 0x0, 0x0, 0x23457, 0x0, 0x0, 0x0, {0x0, r6}}, 0x0) (async) io_uring_enter(r0, 0x2a6e, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mknod(&(0x7f0000000140)='./file0/bus\x00', 0x2, 0x8) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r7 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r7, &(0x7f0000000280)=""/4096, 0x1000) (async) getdents64(r7, 0x0, 0x0) 01:19:23 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) r1 = socket$inet_icmp(0x2, 0x2, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x5, 0x7ae, [0x0, 0x20000400, 0x200007d4, 0x20000902], 0x0, &(0x7f0000000040), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x2, [{0x9, 0x0, 0x7, 'bridge0\x00', 'sit0\x00', 'ip6gretap0\x00', 'dummy0\x00', @broadcast, [], @link_local, [0xff, 0x0, 0x0, 0xff, 0xff, 0xff], 0x6e, 0xe6, 0x15e, [], [@common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00', 0xff, 0x4f, {0x1f7b}}}}, @common=@AUDIT={'AUDIT\x00', 0x8}], @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x4, 0x1, 0x0, 0x0, "963ff7366f029ab6cdbc35adcd270d987c587ad615490b0a20bb92a1e0ffc4323b7522f897a235021f7c8d9f36f4ce48f842c63f6bf437d70f9d0204c1daeb9b"}}}}, {0x3, 0x60, 0x8847, 'caif0\x00', 'vlan0\x00', 'veth0_virt_wifi\x00', 'veth0_to_team\x00', @random="3344e0c02121", [0xff, 0xff, 0x0, 0x0, 0x17e], @broadcast, [0xff, 0xff, 0xff, 0x0, 0xff], 0x6e, 0x1ce, 0x246, [], [@common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x8001}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x9, 'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00'}}}], @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x4, 0x0, 0x0, 0x0, "7dde1939676ceb8c4963042362b7b191f6ff1216ba45774dfc7c36b80b90c2b1acdc708754494f37a682ada17024b46a7e064d61374e588560d285fc16af3606"}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{0x5, 0x3b, 0x22eb, 'veth0_to_batadv\x00', 'veth1_to_bridge\x00', 'wlan0\x00', 'syz_tun\x00', @broadcast, [], @local, [0x0, 0xff, 0xff, 0x0, 0x0, 0xff], 0xae, 0xae, 0xfe, [@devgroup={{'devgroup\x00', 0x0, 0x18}, {{0xc, 0x9, 0x1, 0x20, 0x1}}}], [], @common=@log={'log\x00', 0x28, {{0x4, "f4ea3c068fdbf982fe76380864af8e4b8783f00bf771e80c228edfc8f224", 0xc}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffc, 0x1, [{0x11, 0x0, 0x1fd, 'syz_tun\x00', 'vlan0\x00', 'bond0\x00', 'wg2\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @random="f52a43f79182", [0xff, 0xff, 0x0, 0x0, 0xff], 0xde, 0xde, 0x12e, [@stp={{'stp\x00', 0x0, 0x48}, {{0xdf, {0x2, 0x3, 0x1000, @local, [0x0, 0x0, 0xff, 0x0, 0xff, 0xff], 0x7f, 0x84, 0x0, 0x400, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xb}, [0xff, 0xff, 0xff], 0x4e20, 0x4e21, 0xffff, 0x9, 0xfffd, 0xe8, 0x0, 0x8000, 0x0, 0x4}, 0x400, 0xa00}}}], [], @common=@log={'log\x00', 0x28, {{0x5, "094a6f6efafa1bbe0b74f780d87f5c904d0f510436c8b5755dd7994882f0", 0xa}}}}]}, {0x0, '\x00', 0x4, 0xfffffffffffffffe, 0x1, [{0x18, 0x8, 0xf5, 'veth1_to_bond\x00', 'ip6erspan0\x00', 'veth0\x00', 'veth1_to_team\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x41}, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @random="e134ac9d3029", [0xff, 0x0, 0x0, 0x0, 0xff], 0xa6, 0xa6, 0x11e, [@cluster={{'cluster\x00', 0x0, 0x10}, {{0x8000, 0x3f, 0x4, 0x1}}}], [], @common=@NFLOG={'NFLOG\x00', 0x50, {{0xcbdb, 0x4, 0x4, 0x1, 0x0, "0afe2d8c473668698acff62845b2c3844778fcf1972a37611e99f07dc21a699a4e50dde54646f5f08e48e7717fca7a06e8bedce26b966608a299d1ead9d730f8"}}}}]}]}, 0x826) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) 01:19:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 627.969553][T11243] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 627.979318][T11243] EXT4-fs (loop4): group descriptors corrupted! [ 628.008684][T11249] EXT4-fs (loop5): 1 orphan inode deleted 01:19:23 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1, &(0x7f0000000300)=0x80, 0x4) (async, rerun: 64) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) (rerun: 64) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) (async, rerun: 32) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) (async, rerun: 32) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) r1 = socket$inet_icmp(0x2, 0x2, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x5, 0x7ae, [0x0, 0x20000400, 0x200007d4, 0x20000902], 0x0, &(0x7f0000000040), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x2, [{0x9, 0x0, 0x7, 'bridge0\x00', 'sit0\x00', 'ip6gretap0\x00', 'dummy0\x00', @broadcast, [], @link_local, [0xff, 0x0, 0x0, 0xff, 0xff, 0xff], 0x6e, 0xe6, 0x15e, [], [@common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00', 0xff, 0x4f, {0x1f7b}}}}, @common=@AUDIT={'AUDIT\x00', 0x8}], @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x4, 0x1, 0x0, 0x0, "963ff7366f029ab6cdbc35adcd270d987c587ad615490b0a20bb92a1e0ffc4323b7522f897a235021f7c8d9f36f4ce48f842c63f6bf437d70f9d0204c1daeb9b"}}}}, {0x3, 0x60, 0x8847, 'caif0\x00', 'vlan0\x00', 'veth0_virt_wifi\x00', 'veth0_to_team\x00', @random="3344e0c02121", [0xff, 0xff, 0x0, 0x0, 0x17e], @broadcast, [0xff, 0xff, 0xff, 0x0, 0xff], 0x6e, 0x1ce, 0x246, [], [@common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x8001}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x9, 'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00'}}}], @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x4, 0x0, 0x0, 0x0, "7dde1939676ceb8c4963042362b7b191f6ff1216ba45774dfc7c36b80b90c2b1acdc708754494f37a682ada17024b46a7e064d61374e588560d285fc16af3606"}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{0x5, 0x3b, 0x22eb, 'veth0_to_batadv\x00', 'veth1_to_bridge\x00', 'wlan0\x00', 'syz_tun\x00', @broadcast, [], @local, [0x0, 0xff, 0xff, 0x0, 0x0, 0xff], 0xae, 0xae, 0xfe, [@devgroup={{'devgroup\x00', 0x0, 0x18}, {{0xc, 0x9, 0x1, 0x20, 0x1}}}], [], @common=@log={'log\x00', 0x28, {{0x4, "f4ea3c068fdbf982fe76380864af8e4b8783f00bf771e80c228edfc8f224", 0xc}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffc, 0x1, [{0x11, 0x0, 0x1fd, 'syz_tun\x00', 'vlan0\x00', 'bond0\x00', 'wg2\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @random="f52a43f79182", [0xff, 0xff, 0x0, 0x0, 0xff], 0xde, 0xde, 0x12e, [@stp={{'stp\x00', 0x0, 0x48}, {{0xdf, {0x2, 0x3, 0x1000, @local, [0x0, 0x0, 0xff, 0x0, 0xff, 0xff], 0x7f, 0x84, 0x0, 0x400, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xb}, [0xff, 0xff, 0xff], 0x4e20, 0x4e21, 0xffff, 0x9, 0xfffd, 0xe8, 0x0, 0x8000, 0x0, 0x4}, 0x400, 0xa00}}}], [], @common=@log={'log\x00', 0x28, {{0x5, "094a6f6efafa1bbe0b74f780d87f5c904d0f510436c8b5755dd7994882f0", 0xa}}}}]}, {0x0, '\x00', 0x4, 0xfffffffffffffffe, 0x1, [{0x18, 0x8, 0xf5, 'veth1_to_bond\x00', 'ip6erspan0\x00', 'veth0\x00', 'veth1_to_team\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x41}, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @random="e134ac9d3029", [0xff, 0x0, 0x0, 0x0, 0xff], 0xa6, 0xa6, 0x11e, [@cluster={{'cluster\x00', 0x0, 0x10}, {{0x8000, 0x3f, 0x4, 0x1}}}], [], @common=@NFLOG={'NFLOG\x00', 0x50, {{0xcbdb, 0x4, 0x4, 0x1, 0x0, "0afe2d8c473668698acff62845b2c3844778fcf1972a37611e99f07dc21a699a4e50dde54646f5f08e48e7717fca7a06e8bedce26b966608a299d1ead9d730f8"}}}}]}]}, 0x826) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) [ 628.014503][T11249] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 628.030219][T11249] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1452/file0 supports timestamps until 2038 (0x7fffffff) 01:19:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)='PMM\x00PMM', 0x7, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:19:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000120000", 0x7, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) 01:19:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000700600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:19:24 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x22000, 0xb2) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup(r1) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) openat(r2, &(0x7f0000000080)='./file0\x00', 0x103000, 0xc8) 01:19:24 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) (async) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) (async, rerun: 64) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) (rerun: 64) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) (async, rerun: 64) r1 = socket$inet_icmp(0x2, 0x2, 0x1) (rerun: 64) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x5, 0x7ae, [0x0, 0x20000400, 0x200007d4, 0x20000902], 0x0, &(0x7f0000000040), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x2, [{0x9, 0x0, 0x7, 'bridge0\x00', 'sit0\x00', 'ip6gretap0\x00', 'dummy0\x00', @broadcast, [], @link_local, [0xff, 0x0, 0x0, 0xff, 0xff, 0xff], 0x6e, 0xe6, 0x15e, [], [@common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00', 0xff, 0x4f, {0x1f7b}}}}, @common=@AUDIT={'AUDIT\x00', 0x8}], @common=@nflog={'nflog\x00', 0x50, {{0x2, 0x4, 0x1, 0x0, 0x0, "963ff7366f029ab6cdbc35adcd270d987c587ad615490b0a20bb92a1e0ffc4323b7522f897a235021f7c8d9f36f4ce48f842c63f6bf437d70f9d0204c1daeb9b"}}}}, {0x3, 0x60, 0x8847, 'caif0\x00', 'vlan0\x00', 'veth0_virt_wifi\x00', 'veth0_to_team\x00', @random="3344e0c02121", [0xff, 0xff, 0x0, 0x0, 0x17e], @broadcast, [0xff, 0xff, 0xff, 0x0, 0xff], 0x6e, 0x1ce, 0x246, [], [@common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x8001}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x9, 'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00'}}}], @common=@NFLOG={'NFLOG\x00', 0x50, {{0x0, 0x4, 0x0, 0x0, 0x0, "7dde1939676ceb8c4963042362b7b191f6ff1216ba45774dfc7c36b80b90c2b1acdc708754494f37a682ada17024b46a7e064d61374e588560d285fc16af3606"}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{0x5, 0x3b, 0x22eb, 'veth0_to_batadv\x00', 'veth1_to_bridge\x00', 'wlan0\x00', 'syz_tun\x00', @broadcast, [], @local, [0x0, 0xff, 0xff, 0x0, 0x0, 0xff], 0xae, 0xae, 0xfe, [@devgroup={{'devgroup\x00', 0x0, 0x18}, {{0xc, 0x9, 0x1, 0x20, 0x1}}}], [], @common=@log={'log\x00', 0x28, {{0x4, "f4ea3c068fdbf982fe76380864af8e4b8783f00bf771e80c228edfc8f224", 0xc}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffc, 0x1, [{0x11, 0x0, 0x1fd, 'syz_tun\x00', 'vlan0\x00', 'bond0\x00', 'wg2\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @random="f52a43f79182", [0xff, 0xff, 0x0, 0x0, 0xff], 0xde, 0xde, 0x12e, [@stp={{'stp\x00', 0x0, 0x48}, {{0xdf, {0x2, 0x3, 0x1000, @local, [0x0, 0x0, 0xff, 0x0, 0xff, 0xff], 0x7f, 0x84, 0x0, 0x400, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xb}, [0xff, 0xff, 0xff], 0x4e20, 0x4e21, 0xffff, 0x9, 0xfffd, 0xe8, 0x0, 0x8000, 0x0, 0x4}, 0x400, 0xa00}}}], [], @common=@log={'log\x00', 0x28, {{0x5, "094a6f6efafa1bbe0b74f780d87f5c904d0f510436c8b5755dd7994882f0", 0xa}}}}]}, {0x0, '\x00', 0x4, 0xfffffffffffffffe, 0x1, [{0x18, 0x8, 0xf5, 'veth1_to_bond\x00', 'ip6erspan0\x00', 'veth0\x00', 'veth1_to_team\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x41}, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @random="e134ac9d3029", [0xff, 0x0, 0x0, 0x0, 0xff], 0xa6, 0xa6, 0x11e, [@cluster={{'cluster\x00', 0x0, 0x10}, {{0x8000, 0x3f, 0x4, 0x1}}}], [], @common=@NFLOG={'NFLOG\x00', 0x50, {{0xcbdb, 0x4, 0x4, 0x1, 0x0, "0afe2d8c473668698acff62845b2c3844778fcf1972a37611e99f07dc21a699a4e50dde54646f5f08e48e7717fca7a06e8bedce26b966608a299d1ead9d730f8"}}}}]}]}, 0x826) (async) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) [ 628.792492][T11256] EXT4-fs warning (device loop3): ext4_multi_mount_protect:330: MMP startup interrupted, failing mount [ 628.792492][T11256] 01:19:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 628.843128][T11376] loop4: detected capacity change from 0 to 512 [ 628.848567][T11379] loop5: detected capacity change from 0 to 512 [ 628.877079][T11376] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 628.886954][T11462] loop3: detected capacity change from 0 to 512 01:19:24 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) (async) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x22000, 0xb2) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) (async) getdents64(r0, 0x0, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup(r1) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) (async) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) openat(r2, &(0x7f0000000080)='./file0\x00', 0x103000, 0xc8) 01:19:24 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e24, @multicast2}, 0x10) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000400)=""/4109, 0xfffffffffffffcce}], 0x1, 0x0, 0x0, 0x7115}, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup(r2) setsockopt$inet_sctp_SCTP_EVENTS(r3, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) getsockopt$inet_sctp_SCTP_EVENTS(r3, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) bind$inet(r3, &(0x7f00000000c0)={0x2, 0x4e20, @multicast1}, 0x10) 01:19:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 628.893262][T11376] EXT4-fs (loop4): group descriptors corrupted! 01:19:24 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e24, @multicast2}, 0x10) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000400)=""/4109, 0xfffffffffffffcce}], 0x1, 0x0, 0x0, 0x7115}, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup(r2) setsockopt$inet_sctp_SCTP_EVENTS(r3, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) getsockopt$inet_sctp_SCTP_EVENTS(r3, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) bind$inet(r3, &(0x7f00000000c0)={0x2, 0x4e20, @multicast1}, 0x10) socket$inet(0x2, 0x4000000000000001, 0x0) (async) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) (async) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e24, @multicast2}, 0x10) (async) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) (async) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) (async) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) (async) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) (async) recvmsg(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000400)=""/4109, 0xfffffffffffffcce}], 0x1, 0x0, 0x0, 0x7115}, 0x0) (async) socket$inet_sctp(0x2, 0x5, 0x84) (async) dup(r2) (async) setsockopt$inet_sctp_SCTP_EVENTS(r3, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) (async) getsockopt$inet_sctp_SCTP_EVENTS(r3, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) (async) bind$inet(r3, &(0x7f00000000c0)={0x2, 0x4e20, @multicast1}, 0x10) (async) 01:19:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 628.937934][T11379] EXT4-fs (loop5): 1 orphan inode deleted [ 628.943813][T11379] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 628.972825][T11379] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1453/file0 supports timestamps until 2038 (0x7fffffff) 01:19:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)='PMM\x00PMM', 0x7, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:19:25 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) (async) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) (async) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) (async) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x22000, 0xb2) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) (async) getdents64(r0, 0x0, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup(r1) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) (async) openat(r2, &(0x7f0000000080)='./file0\x00', 0x103000, 0xc8) 01:19:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) 01:19:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000900600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:19:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:25 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) (async) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e24, @multicast2}, 0x10) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) (async, rerun: 32) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) (async, rerun: 32) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) (async) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) (async) recvmsg(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000400)=""/4109, 0xfffffffffffffcce}], 0x1, 0x0, 0x0, 0x7115}, 0x0) (async) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup(r2) setsockopt$inet_sctp_SCTP_EVENTS(r3, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) getsockopt$inet_sctp_SCTP_EVENTS(r3, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) (async) bind$inet(r3, &(0x7f00000000c0)={0x2, 0x4e20, @multicast1}, 0x10) [ 629.717670][T11462] EXT4-fs warning (device loop3): ext4_multi_mount_protect:330: MMP startup interrupted, failing mount [ 629.717670][T11462] 01:19:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:25 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup(r0) fcntl$getflags(r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r1, &(0x7f0000001600)={&(0x7f0000001280)=@x25={0x9, @remote}, 0x80, &(0x7f00000014c0)=[{&(0x7f0000000140)=""/63, 0x3f}, {&(0x7f0000001300)=""/116, 0x74}, {&(0x7f0000001380)=""/158, 0x9e}, {&(0x7f0000000200)=""/30, 0x1e}, {&(0x7f0000001440)=""/26, 0x1a}, {&(0x7f0000001480)=""/41, 0x29}], 0x6, &(0x7f0000001540)=""/183, 0xb7}, 0x20000) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup(r2) setsockopt$inet_sctp_SCTP_EVENTS(r3, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) getsockopt$inet_sctp_SCTP_EVENTS(r3, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) unlinkat(r3, &(0x7f0000000080)='./file0/bus\x00', 0x200) r4 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x40000, 0x0) getdents(r4, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r4, 0x0, 0x0) [ 629.786715][T11608] loop5: detected capacity change from 0 to 512 [ 629.794645][T11619] loop4: detected capacity change from 0 to 512 01:19:25 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) dup(r1) shutdown(r1, 0x0) 01:19:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 629.826909][T11619] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 629.833636][T11720] loop3: detected capacity change from 0 to 512 [ 629.836630][T11619] EXT4-fs (loop4): group descriptors corrupted! 01:19:25 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup(r0) fcntl$getflags(r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r1, &(0x7f0000001600)={&(0x7f0000001280)=@x25={0x9, @remote}, 0x80, &(0x7f00000014c0)=[{&(0x7f0000000140)=""/63, 0x3f}, {&(0x7f0000001300)=""/116, 0x74}, {&(0x7f0000001380)=""/158, 0x9e}, {&(0x7f0000000200)=""/30, 0x1e}, {&(0x7f0000001440)=""/26, 0x1a}, {&(0x7f0000001480)=""/41, 0x29}], 0x6, &(0x7f0000001540)=""/183, 0xb7}, 0x20000) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup(r2) setsockopt$inet_sctp_SCTP_EVENTS(r3, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) getsockopt$inet_sctp_SCTP_EVENTS(r3, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) unlinkat(r3, &(0x7f0000000080)='./file0/bus\x00', 0x200) r4 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x40000, 0x0) getdents(r4, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r4, 0x0, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) (async) dup(r0) (async) fcntl$getflags(r0, 0x0) (async) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) (async) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) (async) socket$can_j1939(0x1d, 0x2, 0x7) (async) recvmsg$can_j1939(r1, &(0x7f0000001600)={&(0x7f0000001280)=@x25={0x9, @remote}, 0x80, &(0x7f00000014c0)=[{&(0x7f0000000140)=""/63, 0x3f}, {&(0x7f0000001300)=""/116, 0x74}, {&(0x7f0000001380)=""/158, 0x9e}, {&(0x7f0000000200)=""/30, 0x1e}, {&(0x7f0000001440)=""/26, 0x1a}, {&(0x7f0000001480)=""/41, 0x29}], 0x6, &(0x7f0000001540)=""/183, 0xb7}, 0x20000) (async) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) (async) socket$inet_sctp(0x2, 0x5, 0x84) (async) dup(r2) (async) setsockopt$inet_sctp_SCTP_EVENTS(r3, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) (async) getsockopt$inet_sctp_SCTP_EVENTS(r3, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) (async) unlinkat(r3, &(0x7f0000000080)='./file0/bus\x00', 0x200) (async) open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x40000, 0x0) (async) getdents(r4, &(0x7f0000000280)=""/4096, 0x1000) (async) getdents64(r4, 0x0, 0x0) (async) 01:19:25 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) (async) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) (async) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) (async) r1 = socket$inet_sctp(0x2, 0x5, 0x84) dup(r1) (async) shutdown(r1, 0x0) [ 629.884024][T11608] EXT4-fs (loop5): 1 orphan inode deleted [ 629.889791][T11608] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 629.905107][T11608] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1454/file0 supports timestamps until 2038 (0x7fffffff) 01:19:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:19:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) 01:19:26 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) dup(r0) (async) fcntl$getflags(r0, 0x0) (async) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) (async) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) (async) r1 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r1, &(0x7f0000001600)={&(0x7f0000001280)=@x25={0x9, @remote}, 0x80, &(0x7f00000014c0)=[{&(0x7f0000000140)=""/63, 0x3f}, {&(0x7f0000001300)=""/116, 0x74}, {&(0x7f0000001380)=""/158, 0x9e}, {&(0x7f0000000200)=""/30, 0x1e}, {&(0x7f0000001440)=""/26, 0x1a}, {&(0x7f0000001480)=""/41, 0x29}], 0x6, &(0x7f0000001540)=""/183, 0xb7}, 0x20000) (async) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup(r2) setsockopt$inet_sctp_SCTP_EVENTS(r3, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) (async) getsockopt$inet_sctp_SCTP_EVENTS(r3, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) (async) unlinkat(r3, &(0x7f0000000080)='./file0/bus\x00', 0x200) r4 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x40000, 0x0) getdents(r4, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r4, 0x0, 0x0) 01:19:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000a00600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:19:26 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) (async) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) (async) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) (async, rerun: 32) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) (async, rerun: 32) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) dup(r1) (async, rerun: 64) shutdown(r1, 0x0) (rerun: 64) [ 630.662093][T11720] EXT4-fs warning (device loop3): ext4_multi_mount_protect:330: MMP startup interrupted, failing mount [ 630.662093][T11720] 01:19:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 630.725666][T11855] loop5: detected capacity change from 0 to 512 [ 630.741330][T11879] loop4: detected capacity change from 0 to 512 [ 630.749975][T11855] EXT4-fs (loop5): 1 orphan inode deleted [ 630.755841][T11855] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 01:19:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:26 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000000)={0x4, &(0x7f00000000c0)=[{0xff09, 0x1f, 0x40, 0xffffffff}, {0x2, 0x3, 0xc, 0x401}, {0x100, 0x2, 0xf6}, {0x101, 0x3f, 0x81, 0x4}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) chroot(&(0x7f0000000080)='./file0/bus\x00') getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x0) 01:19:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000b00600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) [ 630.767386][T11855] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1455/file0 supports timestamps until 2038 (0x7fffffff) [ 630.788773][T11953] loop3: detected capacity change from 0 to 512 [ 630.797273][T11953] EXT4-fs warning (device loop3): read_mmp_block:107: Error -117 while reading MMP block 12 [ 630.810343][T11879] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock 01:19:26 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup(r1) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) sendto$inet(r2, &(0x7f0000000040)="18856eacfc4712c753100a17b88b1d4e102d261f6f8425172c754e6533d2d38d16a6781e35b0b0e3742d34e959242a79ec18abef5fa9d7f7bfc6a6788f92b0c8137e778e33b6abd7c24ec97a31e1a28821713cfe6e9fe257b2d54ad63ebabf75dbc2317d029f41c8bebbfa3f721a27e23efae9a3eb632adae3ed06f9ff369a5bd48061305242ca463f5f5a84dde1d753e32d96ebd8cd0be50a4333fd0aefb8f6", 0xa0, 0x4000000, &(0x7f0000000100)={0x2, 0x4e22, @local}, 0x10) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = socket$inet_sctp(0x2, 0x5, 0x84) dup(r4) connect$inet(r4, &(0x7f0000000140)={0x2, 0x4e22, @broadcast}, 0x10) dup(r3) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) 01:19:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 630.820042][T11879] EXT4-fs (loop4): group descriptors corrupted! 01:19:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:19:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) 01:19:26 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup(r1) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) sendto$inet(r2, &(0x7f0000000040)="18856eacfc4712c753100a17b88b1d4e102d261f6f8425172c754e6533d2d38d16a6781e35b0b0e3742d34e959242a79ec18abef5fa9d7f7bfc6a6788f92b0c8137e778e33b6abd7c24ec97a31e1a28821713cfe6e9fe257b2d54ad63ebabf75dbc2317d029f41c8bebbfa3f721a27e23efae9a3eb632adae3ed06f9ff369a5bd48061305242ca463f5f5a84dde1d753e32d96ebd8cd0be50a4333fd0aefb8f6", 0xa0, 0x4000000, &(0x7f0000000100)={0x2, 0x4e22, @local}, 0x10) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = socket$inet_sctp(0x2, 0x5, 0x84) dup(r4) connect$inet(r4, &(0x7f0000000140)={0x2, 0x4e22, @broadcast}, 0x10) dup(r3) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) (async) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) (async) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) (async) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) (async) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) (async) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) (async) socket$inet_sctp(0x2, 0x5, 0x84) (async) dup(r1) (async) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) (async) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) (async) sendto$inet(r2, &(0x7f0000000040)="18856eacfc4712c753100a17b88b1d4e102d261f6f8425172c754e6533d2d38d16a6781e35b0b0e3742d34e959242a79ec18abef5fa9d7f7bfc6a6788f92b0c8137e778e33b6abd7c24ec97a31e1a28821713cfe6e9fe257b2d54ad63ebabf75dbc2317d029f41c8bebbfa3f721a27e23efae9a3eb632adae3ed06f9ff369a5bd48061305242ca463f5f5a84dde1d753e32d96ebd8cd0be50a4333fd0aefb8f6", 0xa0, 0x4000000, &(0x7f0000000100)={0x2, 0x4e22, @local}, 0x10) (async) socket$inet_sctp(0x2, 0x5, 0x84) (async) socket$inet_sctp(0x2, 0x5, 0x84) (async) dup(r4) (async) connect$inet(r4, &(0x7f0000000140)={0x2, 0x4e22, @broadcast}, 0x10) (async) dup(r3) (async) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) (async) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) (async) 01:19:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x3, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 630.885940][T11977] loop3: detected capacity change from 0 to 512 [ 630.894304][T11979] loop5: detected capacity change from 0 to 512 [ 630.918360][T11977] EXT4-fs warning (device loop3): read_mmp_block:107: Error -117 while reading MMP block 12 01:19:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x5, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 630.935656][T12025] loop4: detected capacity change from 0 to 512 [ 630.943749][T11979] EXT4-fs (loop5): 1 orphan inode deleted [ 630.949506][T11979] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 630.954085][T12025] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 630.970191][T12025] EXT4-fs (loop4): group descriptors corrupted! 01:19:26 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup(r1) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) sendto$inet(r2, &(0x7f0000000040)="18856eacfc4712c753100a17b88b1d4e102d261f6f8425172c754e6533d2d38d16a6781e35b0b0e3742d34e959242a79ec18abef5fa9d7f7bfc6a6788f92b0c8137e778e33b6abd7c24ec97a31e1a28821713cfe6e9fe257b2d54ad63ebabf75dbc2317d029f41c8bebbfa3f721a27e23efae9a3eb632adae3ed06f9ff369a5bd48061305242ca463f5f5a84dde1d753e32d96ebd8cd0be50a4333fd0aefb8f6", 0xa0, 0x4000000, &(0x7f0000000100)={0x2, 0x4e22, @local}, 0x10) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = socket$inet_sctp(0x2, 0x5, 0x84) dup(r4) connect$inet(r4, &(0x7f0000000140)={0x2, 0x4e22, @broadcast}, 0x10) dup(r3) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) (async) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) (async) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) (async) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) (async) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) (async) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) (async) socket$inet_sctp(0x2, 0x5, 0x84) (async) dup(r1) (async) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) (async) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) (async) sendto$inet(r2, &(0x7f0000000040)="18856eacfc4712c753100a17b88b1d4e102d261f6f8425172c754e6533d2d38d16a6781e35b0b0e3742d34e959242a79ec18abef5fa9d7f7bfc6a6788f92b0c8137e778e33b6abd7c24ec97a31e1a28821713cfe6e9fe257b2d54ad63ebabf75dbc2317d029f41c8bebbfa3f721a27e23efae9a3eb632adae3ed06f9ff369a5bd48061305242ca463f5f5a84dde1d753e32d96ebd8cd0be50a4333fd0aefb8f6", 0xa0, 0x4000000, &(0x7f0000000100)={0x2, 0x4e22, @local}, 0x10) (async) socket$inet_sctp(0x2, 0x5, 0x84) (async) socket$inet_sctp(0x2, 0x5, 0x84) (async) dup(r4) (async) connect$inet(r4, &(0x7f0000000140)={0x2, 0x4e22, @broadcast}, 0x10) (async) dup(r3) (async) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) (async) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) (async) 01:19:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0xb, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 630.978277][T11979] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1456/file0 supports timestamps until 2038 (0x7fffffff) 01:19:27 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000000)={0x4, &(0x7f00000000c0)=[{0xff09, 0x1f, 0x40, 0xffffffff}, {0x2, 0x3, 0xc, 0x401}, {0x100, 0x2, 0xf6}, {0x101, 0x3f, 0x81, 0x4}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) (async) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) chroot(&(0x7f0000000080)='./file0/bus\x00') (async) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) (async) getdents64(r0, 0x0, 0x0) 01:19:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000c00600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000002000400000000000800030000000af301000400000000000000000000000100000020000000000000000000000000000000000000000000000000000000000000000000000000000000c6d15a57000000000000000000000000000000000000000000000000ed8100001a040000d8f4655fd8f4655fd8f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000ec07159c000000000000000000000000000000000000000000000000ffa1000026000000d8f4655fd8f4655fd8f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3034363634343935392f66696c65302f66696c65300000000000000000000000000000000000000000000011b29fd4000000000000000000000000000000000000000000000000ed81", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:19:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) 01:19:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:19:27 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x2}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:27 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2b, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) 01:19:27 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x3}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 631.685192][T12200] loop4: detected capacity change from 0 to 512 [ 631.693640][T12206] loop5: detected capacity change from 0 to 512 [ 631.700752][T12202] loop3: detected capacity change from 0 to 512 [ 631.718605][ T24] kauditd_printk_skb: 198 callbacks suppressed 01:19:27 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) (async) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) (async) setsockopt$sock_int(r0, 0x1, 0x2b, &(0x7f00000003c0), 0x4) (async) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) [ 631.718684][ T24] audit: type=1326 audit(1639358367.249:12990): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12208 comm="syz-executor.1" exe="/root/syz-executor.1" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7febc7e7ce99 code=0x0 [ 631.727163][T12202] EXT4-fs warning (device loop3): read_mmp_block:107: Error -117 while reading MMP block 12 [ 631.759890][T12200] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 631.769769][T12200] EXT4-fs (loop4): group descriptors corrupted! 01:19:27 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0xb}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:27 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2b, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) (async) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) (async) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) (async) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) (async) setsockopt$sock_int(r0, 0x1, 0x2b, &(0x7f00000003c0), 0x4) (async) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) (async) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) (async) [ 631.779284][T12206] Quota error (device loop5): find_tree_dqentry: Getting block too big (262144 >= 6) [ 631.788917][T12206] Quota error (device loop5): qtree_read_dquot: Can't read quota structure for id 0 [ 631.800732][T12206] Quota error (device loop5): find_tree_dqentry: Getting block too big (262144 >= 6) [ 631.810307][T12206] Quota error (device loop5): qtree_read_dquot: Can't read quota structure for id 0 [ 631.819911][T12206] Quota error (device loop5): find_tree_dqentry: Getting block too big (262144 >= 6) 01:19:27 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) [ 631.829573][T12206] Quota error (device loop5): qtree_read_dquot: Can't read quota structure for id 0 [ 631.840193][T12206] EXT4-fs (loop5): 1 orphan inode deleted [ 631.846100][T12206] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 631.857997][T12206] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1457/file0 supports timestamps until 2038 (0x7fffffff) [ 631.888817][T12424] loop4: detected capacity change from 0 to 512 [ 631.896252][T12424] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 631.906144][T12424] EXT4-fs (loop4): group descriptors corrupted! 01:19:28 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000000)={0x4, &(0x7f00000000c0)=[{0xff09, 0x1f, 0x40, 0xffffffff}, {0x2, 0x3, 0xc, 0x401}, {0x100, 0x2, 0xf6}, {0x101, 0x3f, 0x81, 0x4}]}) (async) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) (async) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) (async) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) chroot(&(0x7f0000000080)='./file0/bus\x00') (async) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x0) 01:19:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4, 0x2}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:19:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000d00600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:19:28 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x6, 0xdb, 0x8, 0x7f}, {0x5283, 0x20, 0x80, 0x2}, {0x5, 0x7f, 0x7, 0x401}]}, 0x10) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) dup(r1) recvfrom(r1, &(0x7f00000000c0)=""/91, 0x5b, 0x10000, &(0x7f0000000140)=@in6={0xa, 0x4e21, 0xfff, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, 0x80) r2 = socket$inet_sctp(0x2, 0x5, 0x84) dup(r2) getsockopt$IPT_SO_GET_REVISION_MATCH(r2, 0x0, 0x42, &(0x7f00000001c0)={'NETMAP\x00'}, &(0x7f0000000200)=0x1e) 01:19:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) [ 632.564565][T12433] loop5: detected capacity change from 0 to 512 [ 632.573906][T12437] loop3: detected capacity change from 0 to 512 [ 632.584626][T12436] loop4: detected capacity change from 0 to 512 01:19:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4, 0x3}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 632.595183][ T24] audit: type=1326 audit(1639358368.129:12991): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12440 comm="syz-executor.1" exe="/root/syz-executor.1" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7febc7e7ce99 code=0x0 [ 632.625633][T12433] Quota error (device loop5): find_tree_dqentry: Getting block too big (262144 >= 6) [ 632.635183][T12433] Quota error (device loop5): qtree_read_dquot: Can't read quota structure for id 0 [ 632.636886][T12436] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 632.647108][T12437] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 01:19:28 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x6, 0xdb, 0x8, 0x7f}, {0x5283, 0x20, 0x80, 0x2}, {0x5, 0x7f, 0x7, 0x401}]}, 0x10) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) dup(r1) recvfrom(r1, &(0x7f00000000c0)=""/91, 0x5b, 0x10000, &(0x7f0000000140)=@in6={0xa, 0x4e21, 0xfff, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, 0x80) r2 = socket$inet_sctp(0x2, 0x5, 0x84) dup(r2) getsockopt$IPT_SO_GET_REVISION_MATCH(r2, 0x0, 0x42, &(0x7f00000001c0)={'NETMAP\x00'}, &(0x7f0000000200)=0x1e) socket$inet(0x2, 0x4000000000000001, 0x0) (async) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) (async) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) (async) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) (async) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) (async) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) (async) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x6, 0xdb, 0x8, 0x7f}, {0x5283, 0x20, 0x80, 0x2}, {0x5, 0x7f, 0x7, 0x401}]}, 0x10) (async) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) (async) socket$inet_sctp(0x2, 0x5, 0x84) (async) dup(r1) (async) recvfrom(r1, &(0x7f00000000c0)=""/91, 0x5b, 0x10000, &(0x7f0000000140)=@in6={0xa, 0x4e21, 0xfff, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, 0x80) (async) socket$inet_sctp(0x2, 0x5, 0x84) (async) dup(r2) (async) getsockopt$IPT_SO_GET_REVISION_MATCH(r2, 0x0, 0x42, &(0x7f00000001c0)={'NETMAP\x00'}, &(0x7f0000000200)=0x1e) (async) 01:19:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4, 0x5}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) 01:19:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000e00600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000002000400000000000800030000000af301000400000000000000000000000100000020000000000000000000000000000000000000000000000000000000000000000000000000000000c6d15a57000000000000000000000000000000000000000000000000ed8100001a040000d8f4655fd8f4655fd8f4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000ec07159c000000000000000000000000000000000000000000000000ffa1000026000000d8f4655fd8f4655fd8f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3034363634343935392f66696c65302f66696c65300000000000000000000000000000000000000000000011b29fd4000000000000000000000000000000000000000000000000ed81", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) [ 632.654336][T12436] EXT4-fs (loop4): group descriptors corrupted! [ 632.656311][T12433] EXT4-fs (loop5): 1 orphan inode deleted [ 632.664215][T12437] EXT4-fs (loop3): group descriptors corrupted! [ 632.682624][T12433] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 632.695791][T12433] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1458/file0 supports timestamps until 2038 (0x7fffffff) [ 632.766691][T12541] loop4: detected capacity change from 0 to 512 [ 632.788681][T12541] EXT4-fs (loop4): corrupt root inode, run e2fsck [ 632.789215][T12563] loop5: detected capacity change from 0 to 512 [ 632.796767][T12541] EXT4-fs (loop4): mount failed [ 632.812194][T12563] EXT4-fs (loop5): 1 orphan inode deleted [ 632.817965][T12563] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 632.829197][T12563] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1459/file0 supports timestamps until 2038 (0x7fffffff) 01:19:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4, 0x6}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:28 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0/bus\x00', 0x0, 0x104) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x0) 01:19:28 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) (async) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) (async) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) (async) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x6, 0xdb, 0x8, 0x7f}, {0x5283, 0x20, 0x80, 0x2}, {0x5, 0x7f, 0x7, 0x401}]}, 0x10) (async) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) (async) r1 = socket$inet_sctp(0x2, 0x5, 0x84) dup(r1) recvfrom(r1, &(0x7f00000000c0)=""/91, 0x5b, 0x10000, &(0x7f0000000140)=@in6={0xa, 0x4e21, 0xfff, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, 0x80) (async) r2 = socket$inet_sctp(0x2, 0x5, 0x84) dup(r2) getsockopt$IPT_SO_GET_REVISION_MATCH(r2, 0x0, 0x42, &(0x7f00000001c0)={'NETMAP\x00'}, &(0x7f0000000200)=0x1e) 01:19:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:19:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) 01:19:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000f00600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:19:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4, 0x7}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 633.445566][T12572] loop4: detected capacity change from 0 to 512 [ 633.455846][T12575] loop3: detected capacity change from 0 to 512 [ 633.456410][T12574] loop5: detected capacity change from 0 to 512 [ 633.477733][T12572] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 633.487586][T12572] EXT4-fs (loop4): group descriptors corrupted! 01:19:29 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup(r1) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup(r3) setsockopt$inet_sctp_SCTP_EVENTS(r4, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) getsockopt$inet_sctp_SCTP_EVENTS(r4, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000380)={'sit0\x00', &(0x7f00000002c0)=@ethtool_channels={0x3c, 0xa3b, 0x10001, 0x3, 0x0, 0x8, 0x9, 0x8, 0x3ff}}) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000240)={0x0, 0x48, &(0x7f00000001c0)=[@in6={0xa, 0x4e23, 0x7fffffff, @private1, 0x284}, @in={0x2, 0x4e20, @local}, @in6={0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x1ff}]}, &(0x7f0000000280)=0x10) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) getsockopt$inet_buf(r2, 0x0, 0x23, &(0x7f00000000c0)=""/140, &(0x7f0000000180)=0x8c) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) getsockopt$inet_mreqsrc(r0, 0x0, 0x26, &(0x7f0000000040)={@initdev, @dev, @empty}, &(0x7f0000000080)=0xc) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) 01:19:29 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) (async) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0/bus\x00', 0x0, 0x104) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x0) 01:19:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4, 0x90}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:29 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0/bus\x00', 0x0, 0x104) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) (async) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) (async) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) (async) open$dir(&(0x7f0000000080)='./file0/bus\x00', 0x0, 0x104) (async) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) (async) getdents64(r0, 0x0, 0x0) (async) [ 633.499222][T12575] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 633.509083][T12575] EXT4-fs (loop3): group descriptors corrupted! 01:19:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4, 0x300}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:29 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup(r1) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup(r3) setsockopt$inet_sctp_SCTP_EVENTS(r4, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) getsockopt$inet_sctp_SCTP_EVENTS(r4, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000380)={'sit0\x00', &(0x7f00000002c0)=@ethtool_channels={0x3c, 0xa3b, 0x10001, 0x3, 0x0, 0x8, 0x9, 0x8, 0x3ff}}) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000240)={0x0, 0x48, &(0x7f00000001c0)=[@in6={0xa, 0x4e23, 0x7fffffff, @private1, 0x284}, @in={0x2, 0x4e20, @local}, @in6={0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x1ff}]}, &(0x7f0000000280)=0x10) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) getsockopt$inet_buf(r2, 0x0, 0x23, &(0x7f00000000c0)=""/140, &(0x7f0000000180)=0x8c) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) getsockopt$inet_mreqsrc(r0, 0x0, 0x26, &(0x7f0000000040)={@initdev, @dev, @empty}, &(0x7f0000000080)=0xc) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) (async) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) (async) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) (async) socket$inet_sctp(0x2, 0x5, 0x84) (async) dup(r1) (async) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) (async) socket$inet_sctp(0x2, 0x5, 0x84) (async) dup(r3) (async) setsockopt$inet_sctp_SCTP_EVENTS(r4, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) (async) getsockopt$inet_sctp_SCTP_EVENTS(r4, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) (async) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000380)={'sit0\x00', &(0x7f00000002c0)=@ethtool_channels={0x3c, 0xa3b, 0x10001, 0x3, 0x0, 0x8, 0x9, 0x8, 0x3ff}}) (async) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000240)={0x0, 0x48, &(0x7f00000001c0)=[@in6={0xa, 0x4e23, 0x7fffffff, @private1, 0x284}, @in={0x2, 0x4e20, @local}, @in6={0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x1ff}]}, &(0x7f0000000280)=0x10) (async) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) (async) getsockopt$inet_buf(r2, 0x0, 0x23, &(0x7f00000000c0)=""/140, &(0x7f0000000180)=0x8c) (async) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) (async) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) (async) getsockopt$inet_mreqsrc(r0, 0x0, 0x26, &(0x7f0000000040)={@initdev, @dev, @empty}, &(0x7f0000000080)=0xc) (async) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) (async) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) (async) 01:19:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4, 0x500}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:19:29 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x4ca, 0x6, &(0x7f00000016c0)=[{&(0x7f0000001280)="6d885194d51bf2d30136c50d068404d7a16974820c0597c41d1efcb8e02c501956ec21fa5e674c6c84eef80e5259fb8713c9a5e4caa89ca10fd8b231fd05193b92a0079bc44bd559c167107599fff1a48f3e74a68eedcd85a607988933f1d467fbc4f4a2c44e0f6a000a13eaec5062369553066765495a7d4b68810f034d8cd9f68a3f9cad3d79f805fb4ed7a06ecad32f4ffdc23695f4d6164d5cfcb2d3b75e319f1b4a754ca3", 0xa7, 0x2}, {&(0x7f0000001340)="b43ca60003ab9b8fa4004d0b51636a9fa1e31d0f402c79f693d2de713881098848c4ac2d8e205f486e93f83e8ef22c98e9b59f385df6100526902e7234452f033331c0b180aa4118c706c4fe5b8ac933c52663bc4191b8449ef4aa34ebb3a08a7cbc28517a13b25e0eba6f2c7f9a0db9106d85de138d39308d7a89b1226510ef9634bcd7b5b1bf995a8c5fe2d80b62a8cf7b65546602b1e2376c0a7fa1ca91fd137cece411", 0xa5, 0x80}, {&(0x7f0000001400)="8037a086eae44477e788994319fc2df8558eddfaac6afc7a276f39a353ee97dcd3cfd4b093e839781b934d259579ed6da41db6e701a20e610be8f513221aabe3883a393382998ae9b22d845d0a12e0a288ba2e2888b1d0dffb0ff1f25bc28df90822e165f282b2c58eb33828faa7f16b9cca71f1f634c03412db1980ce1fd26905164c55a634994018fbf43de8217fbc7d6086fcb91f65d647d3664dc1fc9f3659bc2450367bd6798416bcb7a1edd4ec274d8227cc86982c845a4501458b2b5b8cd9fde5d41353c1e8f02019fa44fb2d4493070f7d40dd6c6bae625e36e8f2297026", 0xe2, 0x80000000}, {&(0x7f0000000100)="63efe795049d53b9a8ecae182e6c865317bff886d32749a581043e78e7ddb8e2fafae1597566840e42f05f67507d7e4db66116b40d25a6a834e7ce655ae173dcbd924cfdea35cf57e87938cd0320b8345dfe48aaea73bd594987093dd3ace042b77b339044e379dfc872f73f18d680b22a65a39c14935d", 0x77, 0xffffffff00000000}, {&(0x7f0000001500)="fc6eac7a496a5877b9f8ea180fe83184907bb7f5b829a4687b36d16d718bd41e7b1df773d7cfe97ca5a3f7d0d50cd10a8b441d319034bfb79cd46ada22eba71306577aa5dc0df9ca503a27710929170ac3f3503e8cc8319f360db21223182c24727d0d34e4d49da9136333b20a56841858893628c62d48a647da36ee72913e90d16a2e222da458a7db9ff1e3c356a93b614a715e38627a1c652d40d1730b7bfe4cabab275ea406ced37e512b45ec725227797c662e77f1942004eca0800af9d668847cc4fcbcda640c9c7f25f43c003ba06a585f92054abd3ce03b7ee558253fdc9f123ce8873a462d99cb03e2a6a45e03ea", 0xf2, 0x7}, {&(0x7f0000001600)="b66e26a16fc3cc27929cf1a37157ce94e8f77b0467aecee0944b80491e1aec60f27105ab5d0ec6fd7ee85b126f10a60a8a97dc55679ff73926017fae10036b152f8daafd5a6adb1d6ce6a6ebbe5d48696db465ea14dd03d5935182c7be73eb4d03ffb524425111b1b45eed09feba27d4f741c5ee3c98fb4445e7124a302a43deada34cadfe946c39d745b3884c2902c6acb07ec1d8de008d70a188df51f48e22b21975f9800e4a28353699acba", 0xad, 0x1}], 0x22ca000, &(0x7f0000001780)={[{@uni_xlate}, {@numtail}], [{@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@hash}, {@dont_measure}]}) openat(r1, &(0x7f0000000200)='./file0\x00', 0x100, 0x4) 01:19:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) [ 633.554113][T12574] EXT4-fs (loop5): 1 orphan inode deleted [ 633.559880][T12574] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 633.578445][T12574] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1460/file0 supports timestamps until 2038 (0x7fffffff) 01:19:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006041000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:19:29 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup(r1) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup(r3) setsockopt$inet_sctp_SCTP_EVENTS(r4, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) getsockopt$inet_sctp_SCTP_EVENTS(r4, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000380)={'sit0\x00', &(0x7f00000002c0)=@ethtool_channels={0x3c, 0xa3b, 0x10001, 0x3, 0x0, 0x8, 0x9, 0x8, 0x3ff}}) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000240)={0x0, 0x48, &(0x7f00000001c0)=[@in6={0xa, 0x4e23, 0x7fffffff, @private1, 0x284}, @in={0x2, 0x4e20, @local}, @in6={0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x1ff}]}, &(0x7f0000000280)=0x10) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) getsockopt$inet_buf(r2, 0x0, 0x23, &(0x7f00000000c0)=""/140, &(0x7f0000000180)=0x8c) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) getsockopt$inet_mreqsrc(r0, 0x0, 0x26, &(0x7f0000000040)={@initdev, @dev, @empty}, &(0x7f0000000080)=0xc) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) (async) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) (async) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) (async) socket$inet_sctp(0x2, 0x5, 0x84) (async) dup(r1) (async) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) (async) socket$inet_sctp(0x2, 0x5, 0x84) (async) dup(r3) (async) setsockopt$inet_sctp_SCTP_EVENTS(r4, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) (async) getsockopt$inet_sctp_SCTP_EVENTS(r4, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) (async) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000380)={'sit0\x00', &(0x7f00000002c0)=@ethtool_channels={0x3c, 0xa3b, 0x10001, 0x3, 0x0, 0x8, 0x9, 0x8, 0x3ff}}) (async) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000240)={0x0, 0x48, &(0x7f00000001c0)=[@in6={0xa, 0x4e23, 0x7fffffff, @private1, 0x284}, @in={0x2, 0x4e20, @local}, @in6={0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x1ff}]}, &(0x7f0000000280)=0x10) (async) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) (async) getsockopt$inet_buf(r2, 0x0, 0x23, &(0x7f00000000c0)=""/140, &(0x7f0000000180)=0x8c) (async) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) (async) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) (async) getsockopt$inet_mreqsrc(r0, 0x0, 0x26, &(0x7f0000000040)={@initdev, @dev, @empty}, &(0x7f0000000080)=0xc) (async) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) (async) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) (async) 01:19:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4, 0x600}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 633.639964][T12814] loop3: detected capacity change from 0 to 512 [ 633.655515][T12815] loop4: detected capacity change from 0 to 512 [ 633.667318][T12813] loop1: detected capacity change from 0 to 264192 [ 633.671745][T12815] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 633.683694][T12815] EXT4-fs (loop4): group descriptors corrupted! 01:19:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4, 0x700}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:29 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000280)=""/4096, 0x1000) (async) getdents64(r0, 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x4ca, 0x6, &(0x7f00000016c0)=[{&(0x7f0000001280)="6d885194d51bf2d30136c50d068404d7a16974820c0597c41d1efcb8e02c501956ec21fa5e674c6c84eef80e5259fb8713c9a5e4caa89ca10fd8b231fd05193b92a0079bc44bd559c167107599fff1a48f3e74a68eedcd85a607988933f1d467fbc4f4a2c44e0f6a000a13eaec5062369553066765495a7d4b68810f034d8cd9f68a3f9cad3d79f805fb4ed7a06ecad32f4ffdc23695f4d6164d5cfcb2d3b75e319f1b4a754ca3", 0xa7, 0x2}, {&(0x7f0000001340)="b43ca60003ab9b8fa4004d0b51636a9fa1e31d0f402c79f693d2de713881098848c4ac2d8e205f486e93f83e8ef22c98e9b59f385df6100526902e7234452f033331c0b180aa4118c706c4fe5b8ac933c52663bc4191b8449ef4aa34ebb3a08a7cbc28517a13b25e0eba6f2c7f9a0db9106d85de138d39308d7a89b1226510ef9634bcd7b5b1bf995a8c5fe2d80b62a8cf7b65546602b1e2376c0a7fa1ca91fd137cece411", 0xa5, 0x80}, {&(0x7f0000001400)="8037a086eae44477e788994319fc2df8558eddfaac6afc7a276f39a353ee97dcd3cfd4b093e839781b934d259579ed6da41db6e701a20e610be8f513221aabe3883a393382998ae9b22d845d0a12e0a288ba2e2888b1d0dffb0ff1f25bc28df90822e165f282b2c58eb33828faa7f16b9cca71f1f634c03412db1980ce1fd26905164c55a634994018fbf43de8217fbc7d6086fcb91f65d647d3664dc1fc9f3659bc2450367bd6798416bcb7a1edd4ec274d8227cc86982c845a4501458b2b5b8cd9fde5d41353c1e8f02019fa44fb2d4493070f7d40dd6c6bae625e36e8f2297026", 0xe2, 0x80000000}, {&(0x7f0000000100)="63efe795049d53b9a8ecae182e6c865317bff886d32749a581043e78e7ddb8e2fafae1597566840e42f05f67507d7e4db66116b40d25a6a834e7ce655ae173dcbd924cfdea35cf57e87938cd0320b8345dfe48aaea73bd594987093dd3ace042b77b339044e379dfc872f73f18d680b22a65a39c14935d", 0x77, 0xffffffff00000000}, {&(0x7f0000001500)="fc6eac7a496a5877b9f8ea180fe83184907bb7f5b829a4687b36d16d718bd41e7b1df773d7cfe97ca5a3f7d0d50cd10a8b441d319034bfb79cd46ada22eba71306577aa5dc0df9ca503a27710929170ac3f3503e8cc8319f360db21223182c24727d0d34e4d49da9136333b20a56841858893628c62d48a647da36ee72913e90d16a2e222da458a7db9ff1e3c356a93b614a715e38627a1c652d40d1730b7bfe4cabab275ea406ced37e512b45ec725227797c662e77f1942004eca0800af9d668847cc4fcbcda640c9c7f25f43c003ba06a585f92054abd3ce03b7ee558253fdc9f123ce8873a462d99cb03e2a6a45e03ea", 0xf2, 0x7}, {&(0x7f0000001600)="b66e26a16fc3cc27929cf1a37157ce94e8f77b0467aecee0944b80491e1aec60f27105ab5d0ec6fd7ee85b126f10a60a8a97dc55679ff73926017fae10036b152f8daafd5a6adb1d6ce6a6ebbe5d48696db465ea14dd03d5935182c7be73eb4d03ffb524425111b1b45eed09feba27d4f741c5ee3c98fb4445e7124a302a43deada34cadfe946c39d745b3884c2902c6acb07ec1d8de008d70a188df51f48e22b21975f9800e4a28353699acba", 0xad, 0x1}], 0x22ca000, &(0x7f0000001780)={[{@uni_xlate}, {@numtail}], [{@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@hash}, {@dont_measure}]}) openat(r1, &(0x7f0000000200)='./file0\x00', 0x100, 0x4) [ 633.697929][T12814] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 633.707766][T12814] EXT4-fs (loop3): group descriptors corrupted! [ 633.710921][T12869] loop5: detected capacity change from 0 to 512 01:19:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) 01:19:29 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x40, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000340)={0x8, 0x0, 0x5}, 0xc) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000280)=0x1, 0x4) r1 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000240)=0x24, 0x4) recvmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x7115}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x24000) r3 = socket$inet_sctp(0x2, 0x5, 0x84) dup(r3) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000380)={0x5e, @remote, 0x4e24, 0x4, 'dh\x00', 0x22, 0x4, 0x74}, 0x2c) sendto$inet(r2, &(0x7f0000000080)="5046374637e7b434b2cfdd391a41a239682cbae974732046e96d4dd3f2223e16026e76088705e5524696a9d9976e9d39da3fc6653421dd6092175cb37260ebd88779c3f175c667dc9f0b51f2cef60678a586c3cc95e682f253d8982a71d7672a87e30ddab4398c1c9b22f28d7a7aa0af647abf23cafa84126f2bc7519d1957ef7d1ca3c659aef8ee7ed67026ae8cc3e87b722e7c478bcd493247495998ee85cf73f2c800441f1feba844835ccdfb2301d90aa30d60225092fd6dcc3cb7181d0de018a145820177cfe8e4b04152c4d2a541da4020695eec5b410eeaff3c6ceadbc983b2d14c", 0xe5, 0x4, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) 01:19:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:19:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4, 0x4000}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:29 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000300)=0x80, 0x4) (async) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x40, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) (async) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) (async) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) (async) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000340)={0x8, 0x0, 0x5}, 0xc) (async) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000280)=0x1, 0x4) (async) r1 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000240)=0x24, 0x4) (async) recvmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x7115}, 0x0) (async) r2 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x24000) r3 = socket$inet_sctp(0x2, 0x5, 0x84) dup(r3) (async) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000380)={0x5e, @remote, 0x4e24, 0x4, 'dh\x00', 0x22, 0x4, 0x74}, 0x2c) (async) sendto$inet(r2, &(0x7f0000000080)="5046374637e7b434b2cfdd391a41a239682cbae974732046e96d4dd3f2223e16026e76088705e5524696a9d9976e9d39da3fc6653421dd6092175cb37260ebd88779c3f175c667dc9f0b51f2cef60678a586c3cc95e682f253d8982a71d7672a87e30ddab4398c1c9b22f28d7a7aa0af647abf23cafa84126f2bc7519d1957ef7d1ca3c659aef8ee7ed67026ae8cc3e87b722e7c478bcd493247495998ee85cf73f2c800441f1feba844835ccdfb2301d90aa30d60225092fd6dcc3cb7181d0de018a145820177cfe8e4b04152c4d2a541da4020695eec5b410eeaff3c6ceadbc983b2d14c", 0xe5, 0x4, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) 01:19:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006201000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) [ 633.767664][T12869] EXT4-fs (loop5): 1 orphan inode deleted [ 633.773467][T12869] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 633.775519][T12933] loop4: detected capacity change from 0 to 512 [ 633.794725][T12869] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1461/file0 supports timestamps until 2038 (0x7fffffff) 01:19:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4, 0x9000}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 633.834402][T12935] loop1: detected capacity change from 0 to 264192 [ 633.840118][T12938] loop3: detected capacity change from 0 to 512 [ 633.859941][T12938] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 633.866478][T12933] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 01:19:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xb, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:29 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x40, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) (async) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) (async, rerun: 64) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) (async, rerun: 64) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000340)={0x8, 0x0, 0x5}, 0xc) (async) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000280)=0x1, 0x4) (async) r1 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000240)=0x24, 0x4) (async) recvmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x7115}, 0x0) (async) r2 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x24000) (async, rerun: 64) r3 = socket$inet_sctp(0x2, 0x5, 0x84) (rerun: 64) dup(r3) (async) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000380)={0x5e, @remote, 0x4e24, 0x4, 'dh\x00', 0x22, 0x4, 0x74}, 0x2c) (async) sendto$inet(r2, &(0x7f0000000080)="5046374637e7b434b2cfdd391a41a239682cbae974732046e96d4dd3f2223e16026e76088705e5524696a9d9976e9d39da3fc6653421dd6092175cb37260ebd88779c3f175c667dc9f0b51f2cef60678a586c3cc95e682f253d8982a71d7672a87e30ddab4398c1c9b22f28d7a7aa0af647abf23cafa84126f2bc7519d1957ef7d1ca3c659aef8ee7ed67026ae8cc3e87b722e7c478bcd493247495998ee85cf73f2c800441f1feba844835ccdfb2301d90aa30d60225092fd6dcc3cb7181d0de018a145820177cfe8e4b04152c4d2a541da4020695eec5b410eeaff3c6ceadbc983b2d14c", 0xe5, 0x4, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) 01:19:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "0b5bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:29 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x6, &(0x7f0000000100)=0x82, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x9) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x9}}, './file0\x00'}) sendto$inet(r1, &(0x7f0000000080)="fdb350abd390d7a8c36d2627e8c3868b6fe4a62a0a0276ba459e68ab104cf0ed6f31600e4742c0963307ac9fc090071971a9f402fccf16938e50b5752c414d", 0x3f, 0x4000004, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) 01:19:29 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(0xffffffffffffff9c, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x4ca, 0x6, &(0x7f00000016c0)=[{&(0x7f0000001280)="6d885194d51bf2d30136c50d068404d7a16974820c0597c41d1efcb8e02c501956ec21fa5e674c6c84eef80e5259fb8713c9a5e4caa89ca10fd8b231fd05193b92a0079bc44bd559c167107599fff1a48f3e74a68eedcd85a607988933f1d467fbc4f4a2c44e0f6a000a13eaec5062369553066765495a7d4b68810f034d8cd9f68a3f9cad3d79f805fb4ed7a06ecad32f4ffdc23695f4d6164d5cfcb2d3b75e319f1b4a754ca3", 0xa7, 0x2}, {&(0x7f0000001340)="b43ca60003ab9b8fa4004d0b51636a9fa1e31d0f402c79f693d2de713881098848c4ac2d8e205f486e93f83e8ef22c98e9b59f385df6100526902e7234452f033331c0b180aa4118c706c4fe5b8ac933c52663bc4191b8449ef4aa34ebb3a08a7cbc28517a13b25e0eba6f2c7f9a0db9106d85de138d39308d7a89b1226510ef9634bcd7b5b1bf995a8c5fe2d80b62a8cf7b65546602b1e2376c0a7fa1ca91fd137cece411", 0xa5, 0x80}, {&(0x7f0000001400)="8037a086eae44477e788994319fc2df8558eddfaac6afc7a276f39a353ee97dcd3cfd4b093e839781b934d259579ed6da41db6e701a20e610be8f513221aabe3883a393382998ae9b22d845d0a12e0a288ba2e2888b1d0dffb0ff1f25bc28df90822e165f282b2c58eb33828faa7f16b9cca71f1f634c03412db1980ce1fd26905164c55a634994018fbf43de8217fbc7d6086fcb91f65d647d3664dc1fc9f3659bc2450367bd6798416bcb7a1edd4ec274d8227cc86982c845a4501458b2b5b8cd9fde5d41353c1e8f02019fa44fb2d4493070f7d40dd6c6bae625e36e8f2297026", 0xe2, 0x80000000}, {&(0x7f0000000100)="63efe795049d53b9a8ecae182e6c865317bff886d32749a581043e78e7ddb8e2fafae1597566840e42f05f67507d7e4db66116b40d25a6a834e7ce655ae173dcbd924cfdea35cf57e87938cd0320b8345dfe48aaea73bd594987093dd3ace042b77b339044e379dfc872f73f18d680b22a65a39c14935d", 0x77, 0xffffffff00000000}, {&(0x7f0000001500)="fc6eac7a496a5877b9f8ea180fe83184907bb7f5b829a4687b36d16d718bd41e7b1df773d7cfe97ca5a3f7d0d50cd10a8b441d319034bfb79cd46ada22eba71306577aa5dc0df9ca503a27710929170ac3f3503e8cc8319f360db21223182c24727d0d34e4d49da9136333b20a56841858893628c62d48a647da36ee72913e90d16a2e222da458a7db9ff1e3c356a93b614a715e38627a1c652d40d1730b7bfe4cabab275ea406ced37e512b45ec725227797c662e77f1942004eca0800af9d668847cc4fcbcda640c9c7f25f43c003ba06a585f92054abd3ce03b7ee558253fdc9f123ce8873a462d99cb03e2a6a45e03ea", 0xf2, 0x7}, {&(0x7f0000001600)="b66e26a16fc3cc27929cf1a37157ce94e8f77b0467aecee0944b80491e1aec60f27105ab5d0ec6fd7ee85b126f10a60a8a97dc55679ff73926017fae10036b152f8daafd5a6adb1d6ce6a6ebbe5d48696db465ea14dd03d5935182c7be73eb4d03ffb524425111b1b45eed09feba27d4f741c5ee3c98fb4445e7124a302a43deada34cadfe946c39d745b3884c2902c6acb07ec1d8de008d70a188df51f48e22b21975f9800e4a28353699acba", 0xad, 0x1}], 0x22ca000, &(0x7f0000001780)={[{@uni_xlate}, {@numtail}], [{@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@hash}, {@dont_measure}]}) openat(r1, &(0x7f0000000200)='./file0\x00', 0x100, 0x4) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) (async) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) (async) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) (async) open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) (async) getdents(0xffffffffffffff9c, &(0x7f0000000280)=""/4096, 0x1000) (async) getdents64(r0, 0x0, 0x0) (async) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x4ca, 0x6, &(0x7f00000016c0)=[{&(0x7f0000001280)="6d885194d51bf2d30136c50d068404d7a16974820c0597c41d1efcb8e02c501956ec21fa5e674c6c84eef80e5259fb8713c9a5e4caa89ca10fd8b231fd05193b92a0079bc44bd559c167107599fff1a48f3e74a68eedcd85a607988933f1d467fbc4f4a2c44e0f6a000a13eaec5062369553066765495a7d4b68810f034d8cd9f68a3f9cad3d79f805fb4ed7a06ecad32f4ffdc23695f4d6164d5cfcb2d3b75e319f1b4a754ca3", 0xa7, 0x2}, {&(0x7f0000001340)="b43ca60003ab9b8fa4004d0b51636a9fa1e31d0f402c79f693d2de713881098848c4ac2d8e205f486e93f83e8ef22c98e9b59f385df6100526902e7234452f033331c0b180aa4118c706c4fe5b8ac933c52663bc4191b8449ef4aa34ebb3a08a7cbc28517a13b25e0eba6f2c7f9a0db9106d85de138d39308d7a89b1226510ef9634bcd7b5b1bf995a8c5fe2d80b62a8cf7b65546602b1e2376c0a7fa1ca91fd137cece411", 0xa5, 0x80}, {&(0x7f0000001400)="8037a086eae44477e788994319fc2df8558eddfaac6afc7a276f39a353ee97dcd3cfd4b093e839781b934d259579ed6da41db6e701a20e610be8f513221aabe3883a393382998ae9b22d845d0a12e0a288ba2e2888b1d0dffb0ff1f25bc28df90822e165f282b2c58eb33828faa7f16b9cca71f1f634c03412db1980ce1fd26905164c55a634994018fbf43de8217fbc7d6086fcb91f65d647d3664dc1fc9f3659bc2450367bd6798416bcb7a1edd4ec274d8227cc86982c845a4501458b2b5b8cd9fde5d41353c1e8f02019fa44fb2d4493070f7d40dd6c6bae625e36e8f2297026", 0xe2, 0x80000000}, {&(0x7f0000000100)="63efe795049d53b9a8ecae182e6c865317bff886d32749a581043e78e7ddb8e2fafae1597566840e42f05f67507d7e4db66116b40d25a6a834e7ce655ae173dcbd924cfdea35cf57e87938cd0320b8345dfe48aaea73bd594987093dd3ace042b77b339044e379dfc872f73f18d680b22a65a39c14935d", 0x77, 0xffffffff00000000}, {&(0x7f0000001500)="fc6eac7a496a5877b9f8ea180fe83184907bb7f5b829a4687b36d16d718bd41e7b1df773d7cfe97ca5a3f7d0d50cd10a8b441d319034bfb79cd46ada22eba71306577aa5dc0df9ca503a27710929170ac3f3503e8cc8319f360db21223182c24727d0d34e4d49da9136333b20a56841858893628c62d48a647da36ee72913e90d16a2e222da458a7db9ff1e3c356a93b614a715e38627a1c652d40d1730b7bfe4cabab275ea406ced37e512b45ec725227797c662e77f1942004eca0800af9d668847cc4fcbcda640c9c7f25f43c003ba06a585f92054abd3ce03b7ee558253fdc9f123ce8873a462d99cb03e2a6a45e03ea", 0xf2, 0x7}, {&(0x7f0000001600)="b66e26a16fc3cc27929cf1a37157ce94e8f77b0467aecee0944b80491e1aec60f27105ab5d0ec6fd7ee85b126f10a60a8a97dc55679ff73926017fae10036b152f8daafd5a6adb1d6ce6a6ebbe5d48696db465ea14dd03d5935182c7be73eb4d03ffb524425111b1b45eed09feba27d4f741c5ee3c98fb4445e7124a302a43deada34cadfe946c39d745b3884c2902c6acb07ec1d8de008d70a188df51f48e22b21975f9800e4a28353699acba", 0xad, 0x1}], 0x22ca000, &(0x7f0000001780)={[{@uni_xlate}, {@numtail}], [{@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@hash}, {@dont_measure}]}) (async) openat(r1, &(0x7f0000000200)='./file0\x00', 0x100, 0x4) (async) [ 633.869747][T12938] EXT4-fs (loop3): group descriptors corrupted! [ 633.879492][T12933] EXT4-fs (loop4): group descriptors corrupted! 01:19:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) 01:19:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb60b54e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:29 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x6, &(0x7f0000000100)=0x82, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x9) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x9}}, './file0\x00'}) sendto$inet(r1, &(0x7f0000000080)="fdb350abd390d7a8c36d2627e8c3868b6fe4a62a0a0276ba459e68ab104cf0ed6f31600e4742c0963307ac9fc090071971a9f402fccf16938e50b5752c414d", 0x3f, 0x4000004, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) (async) setsockopt$inet_tcp_int(r0, 0x6, 0x6, &(0x7f0000000100)=0x82, 0x4) (async) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x9) (async) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) (async) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x9}}, './file0\x00'}) (async) sendto$inet(r1, &(0x7f0000000080)="fdb350abd390d7a8c36d2627e8c3868b6fe4a62a0a0276ba459e68ab104cf0ed6f31600e4742c0963307ac9fc090071971a9f402fccf16938e50b5752c414d", 0x3f, 0x4000004, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) (async) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) (async) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) (async) 01:19:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:19:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e0769e437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 633.948414][T12961] loop5: detected capacity change from 0 to 512 [ 633.986074][T12967] loop4: detected capacity change from 0 to 512 [ 633.994668][T12960] loop1: detected capacity change from 0 to 264192 [ 634.011789][T12967] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 634.021720][T12967] EXT4-fs (loop4): group descriptors corrupted! [ 634.028295][ T76] ================================================================== [ 634.036371][ T76] BUG: KCSAN: data-race in delete_from_page_cache_batch / nr_blockdev_pages [ 634.045047][ T76] [ 634.047371][ T76] write to 0xffff88810135cbf8 of 8 bytes by task 31073 on cpu 0: [ 634.055085][ T76] delete_from_page_cache_batch+0x5b2/0x780 [ 634.056692][T13073] loop3: detected capacity change from 0 to 512 [ 634.060978][ T76] truncate_inode_pages_range+0x1d5/0xa00 [ 634.061006][ T76] truncate_inode_pages+0x20/0x30 [ 634.068164][T13073] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 634.072921][ T76] blkdev_flush_mapping+0xde/0x230 [ 634.072944][ T76] blkdev_put+0x394/0x4a0 [ 634.077956][T13073] EXT4-fs (loop3): group descriptors corrupted! [ 634.087639][ T76] blkdev_close+0x32/0x40 [ 634.087661][ T76] __fput+0x295/0x520 [ 634.111495][ T76] ____fput+0x11/0x20 [ 634.115461][ T76] task_work_run+0x8e/0x110 [ 634.119946][ T76] exit_to_user_mode_prepare+0x160/0x190 [ 634.125563][ T76] syscall_exit_to_user_mode+0x20/0x40 [ 634.131009][ T76] do_syscall_64+0x50/0xd0 [ 634.135408][ T76] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 634.141288][ T76] [ 634.143593][ T76] read to 0xffff88810135cbf8 of 8 bytes by task 76 on cpu 1: [ 634.150938][ T76] nr_blockdev_pages+0x7f/0xd0 [ 634.155690][ T76] si_meminfo+0x3a/0x60 [ 634.159832][ T76] update_defense_level+0x46/0x560 [ 634.164930][ T76] defense_work_handler+0x1b/0x80 [ 634.169936][ T76] process_one_work+0x3fc/0x980 [ 634.174777][ T76] worker_thread+0x616/0xa70 [ 634.179364][ T76] kthread+0x2c7/0x2e0 [ 634.183415][ T76] ret_from_fork+0x1f/0x30 [ 634.187815][ T76] [ 634.190115][ T76] value changed: 0x00000000000000ab -> 0x000000000000009c [ 634.197211][ T76] [ 634.199528][ T76] Reported by Kernel Concurrency Sanitizer on: [ 634.205662][ T76] CPU: 1 PID: 76 Comm: kworker/1:2 Not tainted 5.16.0-rc4-syzkaller #0 [ 634.213894][ T76] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 634.223948][ T76] Workqueue: events_long defense_work_handler [ 634.230007][ T76] ================================================================== 01:19:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006001100600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:19:29 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x6, &(0x7f0000000100)=0x82, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x9) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x9}}, './file0\x00'}) sendto$inet(r1, &(0x7f0000000080)="fdb350abd390d7a8c36d2627e8c3868b6fe4a62a0a0276ba459e68ab104cf0ed6f31600e4742c0963307ac9fc090071971a9f402fccf16938e50b5752c414d", 0x3f, 0x4000004, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) (async) setsockopt$inet_tcp_int(r0, 0x6, 0x6, &(0x7f0000000100)=0x82, 0x4) (async) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x9) (async) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) (async) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x9}}, './file0\x00'}) (async) sendto$inet(r1, &(0x7f0000000080)="fdb350abd390d7a8c36d2627e8c3868b6fe4a62a0a0276ba459e68ab104cf0ed6f31600e4742c0963307ac9fc090071971a9f402fccf16938e50b5752c414d", 0x3f, 0x4000004, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) (async) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) (async) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) (async) 01:19:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de0b7b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) 01:19:29 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x7, &(0x7f0000000080)=[{0xfffc, 0x7f, 0x7, 0x7}, {0x5, 0x9, 0x2, 0x8}, {0x7, 0xff, 0x1, 0xf00}, {0x1000, 0xbc, 0x20, 0x2}, {0x8000, 0x25, 0x1, 0x10001}, {0xfff7, 0x3f, 0x3, 0x8}, {0x4ea, 0x9, 0x1, 0x3}]}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x2, 0x0, 0x1, 0xfffffffd}]}) 01:19:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) [ 634.254612][T12961] EXT4-fs (loop5): 1 orphan inode deleted [ 634.260398][T12961] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 634.271677][T12961] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1462/file0 supports timestamps until 2038 (0x7fffffff) 01:19:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0xb, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 634.309275][T13086] loop4: detected capacity change from 0 to 512 [ 634.321384][T13086] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 634.331191][T13086] EXT4-fs (loop4): group descriptors corrupted! [ 634.338134][T13143] loop3: detected capacity change from 0 to 512 01:19:29 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) (async, rerun: 32) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) (rerun: 32) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) (async) getdents64(r0, 0x0, 0x0) (async) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x7, &(0x7f0000000080)=[{0xfffc, 0x7f, 0x7, 0x7}, {0x5, 0x9, 0x2, 0x8}, {0x7, 0xff, 0x1, 0xf00}, {0x1000, 0xbc, 0x20, 0x2}, {0x8000, 0x25, 0x1, 0x10001}, {0xfff7, 0x3f, 0x3, 0x8}, {0x4ea, 0x9, 0x1, 0x3}]}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x2, 0x0, 0x1, 0xfffffffd}]}) 01:19:29 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) dup(r1) recvmsg(r1, &(0x7f0000000180)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/38, 0x26}], 0x1, &(0x7f0000000140)=""/38, 0x26}, 0x2000) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) 01:19:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xb}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) [ 634.355896][T13143] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 634.365734][T13143] EXT4-fs (loop3): group descriptors corrupted! [ 634.418060][T13206] loop5: detected capacity change from 0 to 512 [ 634.439411][T13208] loop4: detected capacity change from 0 to 512 [ 634.447888][T13208] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 634.457707][T13208] EXT4-fs (loop4): group descriptors corrupted! 01:19:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006001200600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:19:30 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) (async, rerun: 32) r1 = socket$inet_sctp(0x2, 0x5, 0x84) (rerun: 32) dup(r1) (async, rerun: 64) recvmsg(r1, &(0x7f0000000180)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/38, 0x26}], 0x1, &(0x7f0000000140)=""/38, 0x26}, 0x2000) (async, rerun: 64) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) (async) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) (async, rerun: 32) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) (rerun: 32) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) (async) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) 01:19:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc, 0x2}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:19:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="0200000012", 0x5, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) [ 634.465605][T13206] EXT4-fs (loop5): 1 orphan inode deleted [ 634.471376][T13206] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 634.482465][T13206] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1463/file0 supports timestamps until 2038 (0x7fffffff) 01:19:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc, 0x3}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc, 0x4}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 634.522562][T13221] loop3: detected capacity change from 0 to 512 [ 634.535254][T13221] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 634.541374][T13231] loop4: detected capacity change from 0 to 512 [ 634.545146][T13221] EXT4-fs (loop3): group descriptors corrupted! [ 634.565993][T13231] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 634.575786][T13231] EXT4-fs (loop4): group descriptors corrupted! [ 634.591176][T13329] loop5: detected capacity change from 0 to 512 [ 634.615441][T13329] EXT4-fs (loop5): 1 orphan inode deleted [ 634.621209][T13329] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 634.632528][T13329] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1464/file0 supports timestamps until 2038 (0x7fffffff) 01:19:30 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) (async) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) (async) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x0) (async) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x7, &(0x7f0000000080)=[{0xfffc, 0x7f, 0x7, 0x7}, {0x5, 0x9, 0x2, 0x8}, {0x7, 0xff, 0x1, 0xf00}, {0x1000, 0xbc, 0x20, 0x2}, {0x8000, 0x25, 0x1, 0x10001}, {0xfff7, 0x3f, 0x3, 0x8}, {0x4ea, 0x9, 0x1, 0x3}]}, 0x10) (async) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x2, 0x0, 0x1, 0xfffffffd}]}) 01:19:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc, 0x5}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:19:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006001300600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:19:30 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) (async) r1 = socket$inet_sctp(0x2, 0x5, 0x84) dup(r1) (async) recvmsg(r1, &(0x7f0000000180)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/38, 0x26}], 0x1, &(0x7f0000000140)=""/38, 0x26}, 0x2000) (async) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) (async) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) (async) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) 01:19:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="0200000012", 0x5, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) 01:19:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc, 0x6}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 635.229507][T13339] loop5: detected capacity change from 0 to 512 [ 635.239686][T13342] loop4: detected capacity change from 0 to 512 [ 635.246570][T13343] loop3: detected capacity change from 0 to 512 [ 635.256556][T13342] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 635.266375][T13342] EXT4-fs (loop4): group descriptors corrupted! 01:19:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc, 0x7}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="0200000012", 0x5, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) 01:19:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc, 0x90}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:30 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup(r1) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000040)={0x2, 0x8000, 0x7, 0x7, 0x1}, 0x14) [ 635.270378][T13343] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 635.282418][T13343] EXT4-fs (loop3): group descriptors corrupted! [ 635.304508][T13339] EXT4-fs (loop5): 1 orphan inode deleted [ 635.310272][T13339] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 01:19:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc, 0x300}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006031400600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) [ 635.346466][T13339] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1465/file0 supports timestamps until 2038 (0x7fffffff) [ 635.359374][T13458] loop4: detected capacity change from 0 to 512 [ 635.385766][T13458] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 635.395575][T13458] EXT4-fs (loop4): group descriptors corrupted! [ 635.476607][T13462] loop5: detected capacity change from 0 to 512 [ 635.493446][T13462] EXT4-fs (loop5): 1 orphan inode deleted [ 635.499295][T13462] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 635.510781][T13462] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1466/file0 supports timestamps until 2038 (0x7fffffff) 01:19:31 executing program 1: lsetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB='security*Fu-\'-]$)]$\x00'], &(0x7f0000000200)='sysfs\x00', 0x6, 0x1) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0xa808, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) dup(r1) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x5, &(0x7f0000000080)=[{0x7fff, 0x9, 0x94, 0xfffffff8}, {0x6, 0x3, 0x4, 0x800}, {0x9, 0x84, 0x0, 0x400000}, {0x0, 0xff, 0x7, 0xfffffff8}, {0x8000, 0x3, 0x2, 0x1}]}, 0x10) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x0) 01:19:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:19:31 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup(r1) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000040)={0x2, 0x8000, 0x7, 0x7, 0x1}, 0x14) socket$inet(0x2, 0x4000000000000001, 0x0) (async) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) (async) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) (async) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) (async) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) (async) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) (async) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) (async) socket$inet_sctp(0x2, 0x5, 0x84) (async) dup(r1) (async) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) (async) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) (async) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000040)={0x2, 0x8000, 0x7, 0x7, 0x1}, 0x14) (async) 01:19:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc, 0x500}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="02000000120000", 0x7, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) 01:19:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006001800600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:19:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc, 0x600}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:31 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup(r1) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) (async) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) (async) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000040)={0x2, 0x8000, 0x7, 0x7, 0x1}, 0x14) [ 636.081436][T13469] loop5: detected capacity change from 0 to 512 [ 636.089264][T13484] loop4: detected capacity change from 0 to 512 [ 636.096667][T13514] loop3: detected capacity change from 0 to 512 [ 636.109011][T13484] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 636.119017][T13484] EXT4-fs (loop4): group descriptors corrupted! 01:19:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc, 0x700}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:31 executing program 1: lsetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB='security*Fu-\'-]$)]$\x00'], &(0x7f0000000200)='sysfs\x00', 0x6, 0x1) (async) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0xa808, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) dup(r1) (async, rerun: 32) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x5, &(0x7f0000000080)=[{0x7fff, 0x9, 0x94, 0xfffffff8}, {0x6, 0x3, 0x4, 0x800}, {0x9, 0x84, 0x0, 0x400000}, {0x0, 0xff, 0x7, 0xfffffff8}, {0x8000, 0x3, 0x2, 0x1}]}, 0x10) (async, rerun: 32) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) (async) getdents64(r0, 0x0, 0x0) [ 636.136318][T13514] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 636.146291][T13514] EXT4-fs (loop3): group descriptors corrupted! [ 636.160219][T13469] EXT4-fs (loop5): 1 orphan inode deleted [ 636.166186][T13469] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 01:19:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006001b00600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:19:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc, 0x0, 0x2}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="0200000012", 0x5, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:19:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc, 0x0, 0x3}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="02000000120000", 0x7, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) [ 636.178695][T13469] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1467/file0 supports timestamps until 2038 (0x7fffffff) 01:19:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc, 0x0, 0x4}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:31 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup(r1) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup(r3) setsockopt$inet_sctp_SCTP_EVENTS(r4, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) getsockopt$inet_sctp_SCTP_EVENTS(r4, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) openat(r4, &(0x7f0000000040)='./file0\x00', 0x10000, 0x0) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) [ 636.253419][T13699] loop5: detected capacity change from 0 to 512 [ 636.268366][T13702] loop3: detected capacity change from 0 to 512 [ 636.282199][T13706] loop4: detected capacity change from 0 to 512 01:19:31 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) (async) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) (async) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup(r1) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup(r3) setsockopt$inet_sctp_SCTP_EVENTS(r4, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) (async) getsockopt$inet_sctp_SCTP_EVENTS(r4, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) (async) openat(r4, &(0x7f0000000040)='./file0\x00', 0x10000, 0x0) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0x2bcf) (async) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) 01:19:31 executing program 1: lsetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB='security*Fu-\'-]$)]$\x00'], &(0x7f0000000200)='sysfs\x00', 0x6, 0x1) (async) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) (async) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0xa808, 0x0) (async) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) (async) r1 = socket$inet_sctp(0x2, 0x5, 0x84) dup(r1) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x5, &(0x7f0000000080)=[{0x7fff, 0x9, 0x94, 0xfffffff8}, {0x6, 0x3, 0x4, 0x800}, {0x9, 0x84, 0x0, 0x400000}, {0x0, 0xff, 0x7, 0xfffffff8}, {0x8000, 0x3, 0x2, 0x1}]}, 0x10) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) (async) getdents64(r0, 0x0, 0x0) 01:19:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc, 0x0, 0x5}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc, 0x0, 0x6}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 636.303534][T13702] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 636.313260][T13702] EXT4-fs (loop3): group descriptors corrupted! [ 636.327349][T13706] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 636.337102][T13706] EXT4-fs (loop4): group descriptors corrupted! 01:19:31 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x2}}, './file0/bus\x00'}) pipe(&(0x7f00000000c0)) getdents64(r1, 0x0, 0x0) 01:19:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006001f00600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:19:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc, 0x0, 0x7}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="02000000120000", 0x7, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) 01:19:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="0200000012", 0x5, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) [ 636.348892][T13699] EXT4-fs (loop5): 1 orphan inode deleted [ 636.354685][T13699] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 636.366803][T13699] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1468/file0 supports timestamps until 2038 (0x7fffffff) 01:19:31 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x2}}, './file0/bus\x00'}) pipe(&(0x7f00000000c0)) getdents64(r1, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) (async) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) (async) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) (async) open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) (async) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x2}}, './file0/bus\x00'}) (async) pipe(&(0x7f00000000c0)) (async) getdents64(r1, 0x0, 0x0) (async) 01:19:31 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup(r1) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup(r3) setsockopt$inet_sctp_SCTP_EVENTS(r4, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) getsockopt$inet_sctp_SCTP_EVENTS(r4, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) openat(r4, &(0x7f0000000040)='./file0\x00', 0x10000, 0x0) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) (async) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) (async) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) (async) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) (async) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) (async) socket$inet_sctp(0x2, 0x5, 0x84) (async) dup(r1) (async) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) (async) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) (async) socket$inet_sctp(0x2, 0x5, 0x84) (async) dup(r3) (async) setsockopt$inet_sctp_SCTP_EVENTS(r4, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) (async) getsockopt$inet_sctp_SCTP_EVENTS(r4, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) (async) openat(r4, &(0x7f0000000040)='./file0\x00', 0x10000, 0x0) (async) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0x2bcf) (async) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) (async) 01:19:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc, 0x0, 0x0, 0x2}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 636.417963][T13816] loop3: detected capacity change from 0 to 512 [ 636.442289][T13816] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 636.452075][T13816] EXT4-fs (loop3): group descriptors corrupted! [ 636.456141][T13830] loop4: detected capacity change from 0 to 512 01:19:32 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) (async) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) (async) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) (async, rerun: 64) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) (rerun: 64) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x2}}, './file0/bus\x00'}) (async) pipe(&(0x7f00000000c0)) getdents64(r1, 0x0, 0x0) 01:19:32 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup(r1) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) r4 = socket$inet_sctp(0x2, 0x5, 0x84) dup(r4) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000140)={0x4002}) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) 01:19:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc, 0x0, 0x0, 0x3}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) [ 636.469604][T13830] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 636.479317][T13830] EXT4-fs (loop4): group descriptors corrupted! [ 636.507137][T13845] loop5: detected capacity change from 0 to 512 01:19:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="0200000012", 0x5, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) [ 636.572275][T13860] loop4: detected capacity change from 0 to 512 [ 636.580358][T13845] EXT4-fs (loop5): 1 orphan inode deleted [ 636.581184][T13861] loop3: detected capacity change from 0 to 512 [ 636.586240][T13845] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 636.586302][T13845] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1469/file0 supports timestamps until 2038 (0x7fffffff) 01:19:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006002000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:19:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc, 0x0, 0x0, 0x4}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:32 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) (async) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup(r1) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) (async, rerun: 64) r4 = socket$inet_sctp(0x2, 0x5, 0x84) (rerun: 64) dup(r4) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000140)={0x4002}) (async, rerun: 64) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) (async, rerun: 64) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) (async) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) (async) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) (async) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) 01:19:32 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f00000012c0)={0x1, &(0x7f0000001280)=[{0x9, 0x63, 0xf2, 0xcd09}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @private1}, &(0x7f0000000100)=0x80, 0x80000) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000200)={0x7, &(0x7f0000000140)=[{0x8000, 0xc3, 0x4}, {0x7, 0x20, 0x1, 0x1}, {0xfff7, 0x3, 0x78, 0x3}, {0x9, 0x7, 0x7}, {0x5, 0xbd, 0x0, 0x1}, {0x3, 0x7, 0x9, 0x3}, {0xd38d, 0x8a, 0x0, 0x7}]}, 0x10) 01:19:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc, 0x0, 0x0, 0x5}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) 01:19:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000120000", 0x7, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:19:32 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) (async) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f00000012c0)={0x1, &(0x7f0000001280)=[{0x9, 0x63, 0xf2, 0xcd09}]}) (async) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) (async) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) (async) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) (async) getdents64(r0, 0x0, 0x0) (async) r1 = accept4(0xffffffffffffffff, &(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @private1}, &(0x7f0000000100)=0x80, 0x80000) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000200)={0x7, &(0x7f0000000140)=[{0x8000, 0xc3, 0x4}, {0x7, 0x20, 0x1, 0x1}, {0xfff7, 0x3, 0x78, 0x3}, {0x9, 0x7, 0x7}, {0x5, 0xbd, 0x0, 0x1}, {0x3, 0x7, 0x9, 0x3}, {0xd38d, 0x8a, 0x0, 0x7}]}, 0x10) [ 636.610021][T13860] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 636.627424][T13860] EXT4-fs (loop4): group descriptors corrupted! [ 636.646574][T13861] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 636.656318][T13861] EXT4-fs (loop3): group descriptors corrupted! 01:19:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc, 0x0, 0x0, 0x6}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:32 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) (async) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) (async) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) (async) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup(r1) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) r4 = socket$inet_sctp(0x2, 0x5, 0x84) dup(r4) (async) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000140)={0x4002}) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) (async) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) (async) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) (async) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) (async) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) 01:19:32 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f00000012c0)={0x1, &(0x7f0000001280)=[{0x9, 0x63, 0xf2, 0xcd09}]}) (async) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) (async) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) (async) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r0, 0x0, 0x0) (async) r1 = accept4(0xffffffffffffffff, &(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @private1}, &(0x7f0000000100)=0x80, 0x80000) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000200)={0x7, &(0x7f0000000140)=[{0x8000, 0xc3, 0x4}, {0x7, 0x20, 0x1, 0x1}, {0xfff7, 0x3, 0x78, 0x3}, {0x9, 0x7, 0x7}, {0x5, 0xbd, 0x0, 0x1}, {0x3, 0x7, 0x9, 0x3}, {0xd38d, 0x8a, 0x0, 0x7}]}, 0x10) [ 636.727512][T13974] loop5: detected capacity change from 0 to 512 [ 636.735943][T13965] loop3: detected capacity change from 0 to 512 [ 636.751193][T13977] loop4: detected capacity change from 0 to 512 [ 636.759677][T13965] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 636.769397][T13965] EXT4-fs (loop3): group descriptors corrupted! 01:19:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc, 0x0, 0x0, 0x7}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 636.783662][T13977] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 636.793396][T13977] EXT4-fs (loop4): group descriptors corrupted! [ 636.800229][ T24] kauditd_printk_skb: 342 callbacks suppressed [ 636.800242][ T24] audit: type=1326 audit(1639358372.339:13264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14022 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7febc7e7ce99 code=0x7ffc0000 [ 636.830560][ T24] audit: type=1326 audit(1639358372.339:13265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14022 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7febc7e7ce99 code=0x7ffc0000 [ 636.854932][ T24] audit: type=1326 audit(1639358372.339:13266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14022 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7febc7e7ce99 code=0x7ffc0000 [ 636.865238][T13974] Quota error (device loop5): find_tree_dqentry: Getting block too big (262144 >= 6) [ 636.879022][ T24] audit: type=1326 audit(1639358372.339:13267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14022 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7febc7e7ce99 code=0x7ffc0000 [ 636.888545][T13974] Quota error (device loop5): qtree_read_dquot: Can't read quota structure for id 0 [ 636.912572][ T24] audit: type=1326 audit(1639358372.339:13268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14022 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7febc7e7ce99 code=0x7ffc0000 [ 636.924979][T13974] Quota error (device loop5): find_tree_dqentry: Getting block too big (262144 >= 6) [ 636.945980][ T24] audit: type=1326 audit(1639358372.339:13269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14022 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=78 compat=0 ip=0x7febc7e7ce99 code=0x7ffc0000 [ 636.946004][ T24] audit: type=1326 audit(1639358372.339:13270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14022 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7febc7e7ce99 code=0x7ffc0000 [ 637.003927][T13974] EXT4-fs (loop5): 1 orphan inode deleted [ 637.009692][T13974] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 01:19:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006102000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:19:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc, 0x0, 0x0, 0x90}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000120000", 0x7, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:19:32 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_int(r0, 0x0, 0x17, &(0x7f0000000040)=0x1, 0x4) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup(0xffffffffffffffff) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfc, 0x3f, 0x76, 0x80, 0x0, 0x0, 0x0, 0xfd}, 0xe) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) setsockopt$inet_tcp_int(r2, 0x6, 0x0, &(0x7f0000000180)=0x6, 0x4) r3 = dup(r1) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) connect$inet(r3, &(0x7f0000000140)={0x2, 0x4e21, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r5, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@RTM_GETNSID={0x24, 0x5a, 0x800, 0x70bd28, 0x25dfdbfd, {}, [@NETNSA_FD={0xfffffffffffffe71}, @NETNSA_PID={0x8, 0x2, 0xffffffffffffffff}]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x0) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000080)={r6, @local, @local}, 0xc) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) 01:19:32 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) r0 = dup(0xffffffffffffffff) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r5, @ANYBLOB="01000000002200001c0012000c000100626f6e64"], 0x3c}}, 0x0) getsockname$packet(r4, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="480000001000010400"/20, @ANYRES32=r2, @ANYBLOB="801100056afd162e53164ab92c8cfaf1e8dfecc60500000068008eda00"/52, @ANYRES32=r6, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000200)=0x4) 01:19:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) [ 637.023281][T13974] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1470/file0 supports timestamps until 2038 (0x7fffffff) [ 637.073645][T14105] loop3: detected capacity change from 0 to 512 [ 637.085384][T14106] loop4: detected capacity change from 0 to 512 [ 637.092838][T14101] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 637.094946][T14105] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 637.111865][T14105] EXT4-fs (loop3): group descriptors corrupted! 01:19:32 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) (async) setsockopt$inet_int(r0, 0x0, 0x17, &(0x7f0000000040)=0x1, 0x4) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) (async) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) (async) r1 = socket$inet_sctp(0x2, 0x5, 0x84) (async, rerun: 32) r2 = dup(0xffffffffffffffff) (rerun: 32) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfc, 0x3f, 0x76, 0x80, 0x0, 0x0, 0x0, 0xfd}, 0xe) (async, rerun: 32) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) (rerun: 32) setsockopt$inet_tcp_int(r2, 0x6, 0x0, &(0x7f0000000180)=0x6, 0x4) (async) r3 = dup(r1) r4 = socket$netlink(0x10, 0x3, 0x0) (async, rerun: 64) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) (async, rerun: 64) connect$inet(r3, &(0x7f0000000140)={0x2, 0x4e21, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r5, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@RTM_GETNSID={0x24, 0x5a, 0x800, 0x70bd28, 0x25dfdbfd, {}, [@NETNSA_FD={0xfffffffffffffe71}, @NETNSA_PID={0x8, 0x2, 0xffffffffffffffff}]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async, rerun: 32) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000080)={r6, @local, @local}, 0xc) (rerun: 32) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) (async, rerun: 32) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) (rerun: 32) 01:19:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc, 0x0, 0x0, 0x300}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc, 0x0, 0x0, 0x500}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:32 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) r0 = dup(0xffffffffffffffff) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r5, @ANYBLOB="01000000002200001c0012000c000100626f6e64"], 0x3c}}, 0x0) getsockname$packet(r4, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="480000001000010400"/20, @ANYRES32=r2, @ANYBLOB="801100056afd162e53164ab92c8cfaf1e8dfecc60500000068008eda00"/52, @ANYRES32=r6, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000200)=0x4) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) (async) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) (async) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) (async) open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) (async) socket$inet_sctp(0x2, 0x5, 0x84) (async) dup(0xffffffffffffffff) (async) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) (async) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) (async) socket$inet_sctp(0x2, 0x5, 0x84) (async) socket(0x10, 0x803, 0x0) (async) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) (async) getsockname$packet(r1, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) (async) socket$netlink(0x10, 0x3, 0x0) (async) socket(0x10, 0x803, 0x0) (async) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) (async) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) (async) sendmsg$nl_route(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r5, @ANYBLOB="01000000002200001c0012000c000100626f6e64"], 0x3c}}, 0x0) (async) getsockname$packet(r4, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) (async) sendmsg$nl_route(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="480000001000010400"/20, @ANYRES32=r2, @ANYBLOB="801100056afd162e53164ab92c8cfaf1e8dfecc60500000068008eda00"/52, @ANYRES32=r6, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) (async) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000200)=0x4) (async) 01:19:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc, 0x0, 0x0, 0x600}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 637.112334][T14106] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 637.127841][T14106] EXT4-fs (loop4): group descriptors corrupted! [ 637.145758][T14101] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.1'. 01:19:32 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) (async, rerun: 64) setsockopt$inet_int(r0, 0x0, 0x17, &(0x7f0000000040)=0x1, 0x4) (async, rerun: 64) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) (async) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) (async) r1 = socket$inet_sctp(0x2, 0x5, 0x84) (async) r2 = dup(0xffffffffffffffff) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfc, 0x3f, 0x76, 0x80, 0x0, 0x0, 0x0, 0xfd}, 0xe) (async, rerun: 64) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) (async, rerun: 64) setsockopt$inet_tcp_int(r2, 0x6, 0x0, &(0x7f0000000180)=0x6, 0x4) (async) r3 = dup(r1) r4 = socket$netlink(0x10, 0x3, 0x0) (async, rerun: 32) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) (async, rerun: 32) connect$inet(r3, &(0x7f0000000140)={0x2, 0x4e21, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r5, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@RTM_GETNSID={0x24, 0x5a, 0x800, 0x70bd28, 0x25dfdbfd, {}, [@NETNSA_FD={0xfffffffffffffe71}, @NETNSA_PID={0x8, 0x2, 0xffffffffffffffff}]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async, rerun: 64) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000080)={r6, @local, @local}, 0xc) (rerun: 64) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) [ 637.188024][T14220] loop5: detected capacity change from 0 to 512 [ 637.203922][T14216] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 01:19:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006002200600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:19:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000120000", 0x7, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:19:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc, 0x0, 0x0, 0x700}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) 01:19:32 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) (async) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) (async) socket$inet_sctp(0x2, 0x5, 0x84) (async) r0 = dup(0xffffffffffffffff) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x76, 0x80}, 0xb) (async) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) (async) socket$inet_sctp(0x2, 0x5, 0x84) (async, rerun: 32) r1 = socket(0x10, 0x803, 0x0) (rerun: 32) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) (async) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000480)={0x0, 0x28, &(0x7f0000000540)={0x0, 0x24}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008546000000000000ff0100000000", @ANYRES32=r5, @ANYBLOB="01000000002200001c0012000c000100626f6e64"], 0x3c}}, 0x0) (async) getsockname$packet(r4, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="480000001000010400"/20, @ANYRES32=r2, @ANYBLOB="801100056afd162e53164ab92c8cfaf1e8dfecc60500000068008eda00"/52, @ANYRES32=r6, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) (async) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000200)=0x4) 01:19:32 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200487f9, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) [ 637.238979][T14220] EXT4-fs (loop5): 1 orphan inode deleted [ 637.244822][T14220] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 637.246072][T14216] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.1'. [ 637.258113][T14220] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1471/file0 supports timestamps until 2038 (0x7fffffff) [ 637.275561][T14212] cgroup: fork rejected by pids controller in /syz1 01:19:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc, 0x0, 0x0, 0x4000}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:32 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) (async) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200487f9, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) (async) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) (async) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) (async) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) 01:19:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc, 0x0, 0x0, 0x9000}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 637.322025][T14350] loop4: detected capacity change from 0 to 512 [ 637.329996][T14353] loop3: detected capacity change from 0 to 512 [ 637.347215][T14353] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 637.357091][T14353] EXT4-fs (loop3): group descriptors corrupted! 01:19:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc, 0x0, 0x0, 0x1000000}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc, 0x0, 0x0, 0x2000000}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:32 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200487f9, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) (async) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) (async) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) (async) sendto$inet(r0, 0x0, 0x0, 0x200487f9, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) (async) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) (async) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x2bcf) (async) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) (async) [ 637.373075][T14350] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 637.382894][T14350] EXT4-fs (loop4): group descriptors corrupted! [ 637.407639][T14357] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.1'. [ 637.409248][T14436] loop5: detected capacity change from 0 to 512 01:19:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:19:33 executing program 1: r0 = inotify_init() ioctl$AUTOFS_IOC_FAIL(r0, 0x9361, 0x81) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0xfc, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0/bus\x00', &(0x7f0000000180)='sysfs\x00', 0x1008, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0/bus\x00', 0x0, 0x0) getdents(r1, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r1, 0x0, 0x0) 01:19:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f00000000000004", 0x1b, 0x11080}], 0x0, &(0x7f0000013c00)) 01:19:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc, 0x0, 0x0, 0x3000000}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006002300600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011800)="02", 0x1, 0x6c00}, {&(0x7f0000011900)="03", 0x1, 0x7000}, {&(0x7f0000011a00)="04", 0x1, 0x7402}, {&(0x7f0000012100)="ffff", 0x2, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x182, 0x11580}], 0x0, &(0x7f0000013c00)) 01:19:33 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000080)={0xff, {{0x2, 0x4e22, @rand_addr=0x64010100}}, {{0x2, 0x4e23, @broadcast}}}, 0x7f) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup(r1) r3 = accept4$x25(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000200)=0x12, 0x80800) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000240)={0x0, 0x4, 0xfc000000000000, 0xffffffff}) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRESHEX=r1, @ANYRESDEC=r2, @ANYRESDEC=r1], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) [ 637.483573][T14436] EXT4-fs (loop5): 1 orphan inode deleted [ 637.489910][T14436] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 637.502678][T14436] ext4 filesystem being mounted at /root/syzkaller-testdir841978273/syzkaller.FgUfPF/1472/file0 supports timestamps until 2038 (0x7fffffff) 01:19:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc, 0x0, 0x0, 0x4000000}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:33 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) (async) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000080)={0xff, {{0x2, 0x4e22, @rand_addr=0x64010100}}, {{0x2, 0x4e23, @broadcast}}}, 0x7f) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) (async) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) (async) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup(r1) (async) r3 = accept4$x25(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000200)=0x12, 0x80800) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000240)={0x0, 0x4, 0xfc000000000000, 0xffffffff}) (async) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRESHEX=r1, @ANYRESDEC=r2, @ANYRESDEC=r1], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) 01:19:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc, 0x0, 0x0, 0x5000000}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) [ 637.534073][T14582] loop4: detected capacity change from 0 to 512 [ 637.544777][T14580] loop3: detected capacity change from 0 to 512 [ 637.561721][T14580] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 637.571527][T14580] EXT4-fs (loop3): group descriptors corrupted! 01:19:33 executing program 1: r0 = inotify_init() ioctl$AUTOFS_IOC_FAIL(r0, 0x9361, 0x81) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0xfc, 0x7ffc0001}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0/bus\x00', &(0x7f0000000180)='sysfs\x00', 0x1008, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0/bus\x00', 0x0, 0x0) getdents(r1, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r1, 0x0, 0x0) inotify_init() (async) ioctl$AUTOFS_IOC_FAIL(r0, 0x9361, 0x81) (async) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0xfc, 0x7ffc0001}]}) (async) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) (async) mount(0x0, &(0x7f00000000c0)='./file0/bus\x00', &(0x7f0000000180)='sysfs\x00', 0x1008, 0x0) (async) open$dir(&(0x7f0000000080)='./file0/bus\x00', 0x0, 0x0) (async) getdents(r1, &(0x7f0000000280)=""/4096, 0x1000) (async) getdents64(r1, 0x0, 0x0) (async) 01:19:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x9e, &(0x7f0000003a40)={@local, @random="f8968583fe2f", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\x00[', 0x68, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "cf3138b823619bc18f06ead94900"}, @mss={0x2, 0x4}, @fastopen={0x22, 0xd, "075bbfb64054e076de437b"}, @mptcp=@mp_fclose={0x1e, 0xc, 0x0, 0x0, 0x6000000}, @sack={0x5, 0x22, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 01:19:33 executing program 1: r0 = inotify_init() ioctl$AUTOFS_IOC_FAIL(r0, 0x9361, 0x81) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0xfc, 0x7ffc0001}]}) (async) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) (async) mount(0x0, &(0x7f00000000c0)='./file0/bus\x00', &(0x7f0000000180)='sysfs\x00', 0x1008, 0x0) (async, rerun: 64) r1 = open$dir(&(0x7f0000000080)='./file0/bus\x00', 0x0, 0x0) (rerun: 64) getdents(r1, &(0x7f0000000280)=""/4096, 0x1000) getdents64(r1, 0x0, 0x0) [ 637.586661][T14582] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 637.596556][T14582] EXT4-fs (loop4): group descriptors corrupted! [ 637.612124][T14595] loop5: detected capacity change from 0 to 512 01:19:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000f", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d8f4655fd8f4655fd8f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d8f4655fd8f4655fd8f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) 01:19:33 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000080)={0xff, {{0x2, 0x4e22, @rand_addr=0x64010100}}, {{0x2, 0x4e23, @broadcast}}}, 0x7f) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup(r1) r3 = accept4$x25(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000200)=0x12, 0x80800) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000240)={0x0, 0x4, 0xfc000000000000, 0xffffffff}) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRESHEX=r1, @ANYRESDEC=r2, @ANYRESDEC=r1], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0x244}], 0x2c, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) (async) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) (async) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000080)={0xff, {{0x2, 0x4e22, @rand_addr=0x64010100}}, {{0x2, 0x4e23, @broadcast}}}, 0x7f) (async) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) (async) sendto$