d05194909c9dcf78458f73b0b0b5ce255b04e045900eb423643d06a9f3b8bfa886f1cf7e36c71b5fe68438749b77b0beaa515ca59bad223275858e16a82d45730c6972c177acf89a4bbb9696634caa504205b565c4955a3154c82b326a4d527cc6d844c69fd4ca238ca9e12dd6291279d74da61204a317ccd37f0bfdf81eeb68633ec2b58", 0xad, 0x2}, {&(0x7f00000002c0)="5d4e5663b2a4889bac83a0f4dfe6ed8fb210d2405dfd0716c373171cb96355a56daa0fab5d06382efd3cd77672049f303a6e2bdd6850e55ab38a7c222cf16759f81fb2e4afb8487bbfb845ed7c2a4d963dcc0dd969c872a7307840a8d47e7600d3fa7b661c8eeb054db0688995b98ba7f6c8bd36fd95c89009268469e425ca12cd787a7ddd1c7095b133f9c85fd354a38df98f32f15c1ccafc3dbf4aa7294ea838e9bda76985b6eed27e988bdbab0f11acec6d42343fb51f9208ba67b9c47cc7776829284a78a4fec55c8dad549a08b6a36e882e8635be7f2bbf889286c2eae69007ad", 0xe3, 0xffffffffffffffff}], 0x8, &(0x7f0000000440)={[{@debug}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x1}}, {@noauto_da_alloc}, {@delalloc}, {@nojournal_checksum}, {@dioread_lock}], [{@euid_gt={'euid>', r1}}, {@permit_directio}]}) [ 58.254969][ T4712] loop2: detected capacity change from 0 to 264192 [ 58.262488][ T4712] EXT4-fs (loop2): Unrecognized mount option "h" or missing value [ 58.277870][ T4720] loop3: detected capacity change from 0 to 65608 [ 58.280038][ T4720] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 115646289543168)! [ 58.281911][ T4720] EXT4-fs (loop3): group descriptors corrupted! [ 58.347642][ T4733] loop5: detected capacity change from 0 to 1024 [ 58.486762][ T4743] FAT-fs (loop0): bogus number of reserved sectors [ 58.487813][ T4743] FAT-fs (loop0): Can't find a valid FAT filesystem 16:10:21 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200001, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:21 executing program 2: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0}, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000000300)=@nfc_llcp={0x27, 0x0, 0x2, 0x4, 0x3f, 0x3, "237569efdf3f33ca5f8c782a165113ae4a2e34476cfec8fedba8f7957ab388b502d33fc3f1426befd5252ac6a804cb80ad95b51aea1b8f985b19c221b1394b", 0x2}, 0x80, &(0x7f0000001380)=[{&(0x7f00000013c0)="139e144a6f8ad55ec54e0fb5209a590b9250c5dab6058be745729af029031ac5aa3f9d00fdc1c3d8fe1bd23f9520079d6dcc25718105fdbef54900edab101b28fa407bcd551eaf8b3f6e4566ba98e74cac941f305517badbf39dd2e0", 0x5c}, {&(0x7f0000000200)="a896c03c3a17c7bd785c2aa29394c51b33480e97c4aade03ac5ec84b8d4640c1979f6f9d81b402580449d67e0fef84818cc3f4fa1049f2fe7f680455c46fa6e1b00e32a9ab0d82a013dd4c97cebaa5e6cf17a94191d7e5c4293b4792de47e88f9767c961ceaa931a7add0e7371169266eb6f77e05794007181e47c230f1ec5b8b15176e3b276a601c24652ff14aece1ca56a5e64ce97625ee057604a8ede82d583d51e14c177687b8f270c62ec", 0xad}, {&(0x7f0000000180)="a879efb6a0377dc8f63bce3d53da444b4751caadaca6b2a717da5310f32297f02d4f2ef52974d81c77a10132c0aea38d97642892607600a831ccfa8ab0dde883baf126828f2cb2d63ed5ec7329b06e795a15229d5fa53a058384deb0834e667146ae6966aecfa577216dec0628e1ddf7d9c85235d32970ef5d", 0x79}, {&(0x7f0000000380)="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", 0x1000}], 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"/511], 0x1d8}, 0x4000041) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x500c2, 0x0) pipe2$9p(&(0x7f0000000100), 0x400) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) write$P9_RLERRORu(r0, &(0x7f0000000140)={0xd, 0x7, 0x1, {{}, 0x1f}}, 0xd) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_open_dev$evdev(&(0x7f00000000c0), 0x3, 0x822b81) write$char_usb(r2, &(0x7f0000000040)="e2", 0x35000) [ 58.572171][ T4733] EXT4-fs warning (device loop5): ext4_enable_quotas:6479: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 58.575055][ T4733] EXT4-fs (loop5): mount failed 16:10:21 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000a80)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df90f6da7f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1e4f86691eb3c042d18fc63e879ef6c7bb8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94", 0xc5}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000)=0x398, 0x4) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000200)="8c5fd9d6f802fc3cb126151fc9eec80edaad313c447ff1eb6b4928d879db54c30353658b38ad466500a105b30459a7b3d3000d70f9697b719908411956bbee8938356964a4e2d34b8e69f332b42d7723e524dc6e3e377e638c5475d1c30c3054b10bd4ad473419832f07ba612cdeb73789a05ec363f1ee45dc8879ef6e5442e14db5fe0fc480148470eee2534234d0f201b972eb53bedf8c", 0x98}], 0x1, 0x3) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) [ 58.634174][ T4758] loop3: detected capacity change from 0 to 65608 [ 58.636235][ T4758] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 115646289543168)! [ 58.638433][ T4758] EXT4-fs (loop3): group descriptors corrupted! [ 58.659545][ T4733] loop5: detected capacity change from 0 to 1024 [ 58.667033][ T4733] EXT4-fs warning (device loop5): ext4_enable_quotas:6479: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 58.669771][ T4733] EXT4-fs (loop5): mount failed 16:10:21 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200001, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:21 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[], 0x208e24b) ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, &(0x7f00000004c0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) syz_mount_image$vfat(&(0x7f0000000100), 0x0, 0x100000, 0x2, &(0x7f0000000300)=[{0x0}, {&(0x7f0000000180)="5950f4", 0x3, 0xfff}], 0x0, &(0x7f0000000340)={[], [{@obj_type={'obj_type', 0x3d, 'memory.current\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x5, 0x31, 0x0, 0x0, 0x0, 0x62], 0x2d, [], 0x2d, [0x63, 0x31, 0x66], 0x2d, [0x38, 0x64, 0x33], 0x2d, [0x62, 0x39, 0x66, 0x39, 0x62, 0x62, 0x39, 0x39]}}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}]}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x0, 0x0, 0x0, "006d10ffd600"}) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000540)) perf_event_open(&(0x7f0000001340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) 16:10:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000600)='./file0\x00', 0x80000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000005c0)="000000000000000000000000def361b116dd4bb681391964ccf077da010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000100)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d0f4655fd2f4655fd2f4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000012700)="111fc0d9", 0x4, 0xc000}], 0x0, &(0x7f0000013b00)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0xff, 0x4, &(0x7f00000003c0)=[{&(0x7f00000000c0)="ffbfbae468b3faa7b0657308f770a787227026227c2287b0eaf0a274b94731d0824871e4", 0x24, 0x8f}, {&(0x7f0000000640)="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", 0x1000, 0x1}, {&(0x7f0000000140)="0512c1fadaf826eec26ee1fa6df2781ed7edf40b71f13b5e5f86c6e70b222e752449b98dcb1646819d05194909c9dcf78458f73b0b0b5ce255b04e045900eb423643d06a9f3b8bfa886f1cf7e36c71b5fe68438749b77b0beaa515ca59bad223275858e16a82d45730c6972c177acf89a4bbb9696634caa504205b565c4955a3154c82b326a4d527cc6d844c69fd4ca238ca9e12dd6291279d74da61204a317ccd37f0bfdf81eeb68633ec2b58", 0xad, 0x2}, {&(0x7f00000002c0)="5d4e5663b2a4889bac83a0f4dfe6ed8fb210d2405dfd0716c373171cb96355a56daa0fab5d06382efd3cd77672049f303a6e2bdd6850e55ab38a7c222cf16759f81fb2e4afb8487bbfb845ed7c2a4d963dcc0dd969c872a7307840a8d47e7600d3fa7b661c8eeb054db0688995b98ba7f6c8bd36fd95c89009268469e425ca12cd787a7ddd1c7095b133f9c85fd354a38df98f32f15c1ccafc3dbf4aa7294ea838e9bda76985b6eed27e988bdbab0f11acec6d42343fb51f9208ba67b9c47cc7776829284a78a4fec55c8dad549a08b6a36e882e8635be7f2bbf889286c2eae69007ad", 0xe3, 0xffffffffffffffff}], 0x8, &(0x7f0000000440)={[{@debug}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x1}}, {@noauto_da_alloc}, {@delalloc}, {@nojournal_checksum}, {@dioread_lock}], [{@euid_gt={'euid>', r1}}, {@permit_directio}]}) [ 58.690844][ T4772] loop5: detected capacity change from 0 to 16383 [ 58.707153][ T4772] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 58.723823][ T4781] loop3: detected capacity change from 0 to 65608 [ 58.737543][ T4781] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 115646289543168)! [ 58.739353][ T4781] EXT4-fs (loop3): group descriptors corrupted! 16:10:22 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200001, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 58.779062][ T4788] loop5: detected capacity change from 0 to 1024 16:10:22 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200001, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:22 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='cgroup\x00') r1 = creat(&(0x7f0000000180)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) fcntl$getflags(r2, 0x408) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x2810, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@debug={'debug', 0x3d, 0xfffffffffffffff7}}, {@cache_loose}], [{@subj_role={'subj_role', 0x3d, '$@,,,(^}/):-(\''}}, {@audit}]}}) set_mempolicy(0x3, &(0x7f00000001c0)=0x3f, 0x3) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/112, 0x70}], 0x2) 16:10:22 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200001, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 58.821852][ T4788] EXT4-fs warning (device loop5): ext4_enable_quotas:6479: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 58.824329][ T4788] EXT4-fs (loop5): mount failed [ 58.825168][ T4798] loop3: detected capacity change from 0 to 65608 [ 58.828970][ T4798] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 115646289543168)! [ 58.831525][ T4798] EXT4-fs (loop3): group descriptors corrupted! [ 58.853320][ T4783] loop4: detected capacity change from 0 to 2048 [ 58.900328][ T4815] loop3: detected capacity change from 0 to 65608 [ 58.902508][ T4815] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 115646289543168)! [ 58.904188][ T4815] EXT4-fs (loop3): group descriptors corrupted! 16:10:22 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = gettid() process_vm_writev(r3, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0x11fffff90}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0x7ffff000}], 0x6, 0x0) process_vm_readv(r3, &(0x7f00000001c0), 0x0, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/74, 0x4a}, {&(0x7f0000000480)=""/93, 0x5d}, {&(0x7f0000000500)=""/145, 0x91}, {&(0x7f00000005c0)=""/161, 0xa1}], 0x4, 0x0) syz_mount_image$vfat(&(0x7f0000000440), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000500)=ANY=[]) r4 = perf_event_open(&(0x7f0000000680)={0x0, 0x80, 0x7f, 0x5, 0x40, 0x6, 0x0, 0x7f, 0xd0000, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_config_ext, 0x10000, 0x3, 0x0, 0x5, 0x3, 0xfffffc95}, r3, 0x0, 0xffffffffffffffff, 0x3) r5 = fcntl$getown(r2, 0x9) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x5, 0x4f, 0x9b, 0x0, 0x6, 0x40000, 0xd, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f00000002c0), 0x8}, 0x840, 0x7ff, 0x6, 0x2, 0x1, 0x58, 0x40, 0x0, 0x3, 0x0, 0x904d}, r5, 0x4, r4, 0x2) open(&(0x7f00000001c0)='./file0\x00', 0x4000, 0x106) 16:10:22 executing program 5: r0 = perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r1 = syz_open_dev$tty1(0xc, 0x4, 0x3) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b5b0700674b7c6341526ded00000080400000000000000000000000f20000000000000000000000000000000000a1488e231f4b8db6c48c1d845bb0d6e0a3ec6875738cb30a01f30e3991610b17780670eb485f9fab296ccac4b17ee9af59f357ff9ad1fef6ad14d3d3e7cbf3b920a8a563de89793e54a435a3b7674a1e682de30000000000"], 0x40) ptrace$getregset(0x4204, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) ioctl$FICLONE(r1, 0x40049409, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x1) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0xc) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x304) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000000500)=[{{&(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000040)=""/46, 0x2e}, {&(0x7f0000000380)=""/224, 0xe0}, {&(0x7f0000000140)=""/28, 0x1c}, {&(0x7f0000000480)=""/93, 0x5d}, {&(0x7f0000000640)=""/108, 0x6c}], 0x5, &(0x7f0000000200)=""/8, 0x8}, 0x7}], 0x1, 0x0, &(0x7f0000000780)={r3, r4+60000000}) r5 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r5) r6 = socket$inet6(0xa, 0x80003, 0x6) sendmmsg(r6, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) 16:10:22 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200001, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 59.191085][ T4743] FAT-fs (loop0): bogus number of reserved sectors [ 59.192536][ T4743] FAT-fs (loop0): Can't find a valid FAT filesystem [ 59.222820][ T4832] loop3: detected capacity change from 0 to 65608 [ 59.225467][ T4832] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 115646289543168)! [ 59.227373][ T4832] EXT4-fs (loop3): group descriptors corrupted! [ 59.283905][ C1] hrtimer: interrupt took 17318 ns [ 59.505745][ T4855] FAT-fs (loop0): bogus number of reserved sectors [ 59.506972][ T4855] FAT-fs (loop0): Can't find a valid FAT filesystem 16:10:22 executing program 2: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001580)={0x0, 0x0, 0x0}, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000000300)=@nfc_llcp={0x27, 0x0, 0x2, 0x4, 0x3f, 0x3, "237569efdf3f33ca5f8c782a165113ae4a2e34476cfec8fedba8f7957ab388b502d33fc3f1426befd5252ac6a804cb80ad95b51aea1b8f985b19c221b1394b", 0x2}, 0x80, &(0x7f0000001380)=[{&(0x7f00000013c0)="139e144a6f8ad55ec54e0fb5209a590b9250c5dab6058be745729af029031ac5aa3f9d00fdc1c3d8fe1bd23f9520079d6dcc25718105fdbef54900edab101b28fa407bcd551eaf8b3f6e4566ba98e74cac941f305517badbf39dd2e0", 0x5c}, {&(0x7f0000000200)="a896c03c3a17c7bd785c2aa29394c51b33480e97c4aade03ac5ec84b8d4640c1979f6f9d81b402580449d67e0fef84818cc3f4fa1049f2fe7f680455c46fa6e1b00e32a9ab0d82a013dd4c97cebaa5e6cf17a94191d7e5c4293b4792de47e88f9767c961ceaa931a7add0e7371169266eb6f77e05794007181e47c230f1ec5b8b15176e3b276a601c24652ff14aece1ca56a5e64ce97625ee057604a8ede82d583d51e14c177687b8f270c62ec", 0xad}, {&(0x7f0000000180)="a879efb6a0377dc8f63bce3d53da444b4751caadaca6b2a717da5310f32297f02d4f2ef52974d81c77a10132c0aea38d97642892607600a831ccfa8ab0dde883baf126828f2cb2d63ed5ec7329b06e795a15229d5fa53a058384deb0834e667146ae6966aecfa577216dec0628e1ddf7d9c85235d32970ef5d", 0x79}, {&(0x7f0000000380)="dbb54a9a3df77f39f257e871350a82b2fb404e49007a69b3663ff977d59b2a834cd8245e604f4fa01d2cd463e698e40ee192ea34f3dce7d1c92bcb1389e6138ea4e1ab27d3e2d6734b7043502ef609861a4962c46a7032e86420d7dadb38aea84317c95d9215b187f10d23b148645d3b34b9d81e1a40aeba9d4f4a455e2405b0b994d59a3aad46478b3e523bfc923496ece16bb86ed37cf226bcfd761d9d2784e81ead3d60afdfe2f5f9fd93101565c7249d4be67f48ae647ebf04d5751cb9a75ec7d5258374bf06632e9e083a96b90089adc96585657b956c49825b089ae88b87731ff94eb8db71ad15c5d45e8f172e765e046bfc2df4db009ff8a992e7182ba328df9ebbb1c66d0753bf91f6faab49d34d365097fbedc93ae002f88d5e04c32ec8966cf88cb9d8f9ccf9925f2248bea37c2d3b193b42ed73fd94e4118e2ea44b1ba9b1f16b3911735dbf902ebd2e2226688c8a2b7f419ebfd9b68411c69579249cfd651d6fba096674105c5c67fca2a35360bb5b127db6ddb67dc993f97290e4dfc75bbe2e1efb516b0af02c2d3baef14a6bba5f63e88dda6a863aca93f9fef7bb8cffd2e8b18b6597d290dd090d9f6540b2aeafe1945b060518c24cc167dcaad613f1e8418f0164936ed2f11a87180b2d5f388463cc2050f20d20ddbd6bd8154a2431e0158c87f858cdc4cbb014d84128ab9dc145f4aaae00ef0920a5e1e2dc2205b713140748ebf4c19099bf364721cd5df68bbb326bd43301621f8e5fd3db34c3f141bd7e7cf6edb641cd79d12d749c42f0821a2a187d33d17d173dd2cb0d09ed73ea83a1f1bc1874b652fd9456862913837944a10c3be44c1dcdab6b09d77002c982abb933f6a74beb8f947890ba72e5fedf8723204860ebe5f786eb487bc7b2c10aabb39be3b219636277085422ce13ba38a5ffe8271c7f93d640bcdf909c723e9d35d733fe1ebab430d41a1447597ff76f05d115ac3c72aec98cb150b62e9d45c36069866929b66127a9fd9c9583f42e3297fc2c50aed8ccf6f6ca40ade1c79ae5caab575fa32d09b3115358ba810392045d07b344f6cfeb62f235fdf6ef650b4da127eaa3ac93ff1f856c057f27098500c1798507f0c937ac5366940ff6f3e16b4bc2969a733c3bf8d88fe981a4994956bc53eac67849bedbb60559a1949591a95d8bd72d4208300d2f6c49291275eaa1df5ea291b5c2069d6b29387f66c8ce3440b2a860fa75431878f43e570ec09ac56f74f414f9a0d84a9358a65951dedd8b995f1ced42f34b073f458ec5a903ccfc4d98269878962bf1911c536fcc7f052671b77345e6adad510462e3481c279ebedfd4970db4a3cc7ac64e3eb045bf9d662a0e3789bc99ce15c52f54a417eaf9574116463ce6f34a5a9a39e17c5cdeb35c51924d985a9f05fa32a5bb8b189c27fece5885c1e5def89cad104b134680d57bb5e86c4b1787adf570929a3da99e14ede1fc2defbc6edfc1876117dc9319f1c690c2dd1976c2bb51336c72c16f2f7745376c1288a79419f964b1a533a5d57a5ee3444c43943d146fef8f47814d3157d69d073ad71d4c28d6ee11486b2fca88ffa8274a9652465bc5d3b24a05dd5c538a67ac86dc615c95d2774cd0731b00025843eb6ae1ca3a6e511bc1cc439c4160f8b5b1dc50bfc00b89da0b5397b31ced4f9d3f553f0d2ee92985e8a37c834ff94ac77ef25792047a59bc0e3a534be6a9497713ca3e58a03260f35708b095439f24894a579875a19055010eaa1c57d8f5a40adcf9f9564a55c162ee5cb0901716585c3ab96a17ee7545b7123658fd57395cd60256a37b9a0fcdb7c157a5933ef0db4ccb94a9bdc55039a6c049c9dbee617556686557a61d9688be24f69ad1c14c88c3bc138cf243b9b21c73195389091441f08ecbb6b5b0472b4dbc6c263738d9d76596894213809f07a4ec8636e7597ef8fd88abe66a1d6cae43f4917075b4ca4a782e2f3a608af2af2c67c241f8bec79f4cfd47fa189d556e6261ce740c6456bfac2eb2e32a88152557756361d82debbe848ddf1f58efcd3af52335650c9dbecdae3fd00b0113cb5452bd67094452843afc70deeccdd61cf34efb654914e5ab18bd6b27c3df30eac5b99ab1598f73ce3883a6389a8bc1a9d09a8fd4532023d5433d3075728f823be6deb65e2930963d880fd080a017c53f7aa79a5a537f9b1519316d0f0b464714d51bf5719c6431a41aea845551428bdb1668fb6561b3d445a38b9da44b4af07730c2a0a05379841e9d1b10556e2bf73deb58d8fe32f0b007e299754fb194ae4df53b98d0b3a60db48fc0d2e2a0c9c07510993e2a2fd5fb4760f42b7767554adef40f5ad1258a677b5a0d5647a5fd1bdc261c9f2931706f04ff0b5f85ee8e3297b91f0795734986c33a03f87246203ff705b49ef6b192300389c6be64fc6c81c5bc4c3e8f642f959d66f4f8d623515dd99e079cc3456698dcece7834d404962a894401e6e8049163eef04284cf1fd4d82068786dd4d9bef6c84ea60f6f75a974a84dced2787700e727282926f82a079abc1ce8133e1792ae00507022813a4911ffc88e2eda53929e58d2cfbac67ab79a8072d24a507e004552e65421ccaf2d2e0dc251218bc3aa979507f8596fb96a0b1da1e1f51306a90dd7ad8d57a6d5ca13cf5fd8e30fc8a2a0ddde5f019cb4ba37b04b6933e63f196e8015b557b9f651af91bd1e308051e36719ec85a821d84ebd29d1806f5a2e6d6f03e1720e239e9b6cef89935f3b23b85b1f48dd7153b9fd65de4768c2eccac235e29d18d3b85c6c0469cf23bd5de0a1128011171a5cf19d92f09b0deaf0418fae01595233336ad430c0606c9ddbb032e3729e92e7d66dd9ed00af50e927be5a0d5ea1db60c777a1373d97beae7b67a87aef011ca804fe728d240a7115334252edb20b2529d71966ccdfd7f368b7833fd64dc76e6eef6e9c1856df8ee2b028be541a3f853bf8b98963e61a2de7d347baf3dd9d59ddca88b9ca37b6bfa6638df0fecb681f4f7267dd18690917c4881c6a818ed4a587591339c1be48f57e1b0989f433e4af4fb6012607996fa2830a39596b1d285b0a6bd2b413162173644bbd964d9fc3b6da6cd0efc1c953eb8596e2705740b4e6d8e0e3027a126d09868e36342684b6add88aaeaedcb987d463fd4d960b31efbb32d04453bd0e0db1c6aaada52711d2c89d9fb19f8cd3f6381033a6c9355ed6cdcc93152896928a52ffb4e2b072d43886f1d0c987457f0128a82dc02a9dad9e38ffd2cb672192778729b79e67d1074af76c7ecd0ade41e7f377683cac295cf198976eece700ad49a427bf11010e94b60c32638599255c68c676e7519c9d446cb4545bcd91b9cc6e77f2b1924e733273acc94373fd6207f699381d64652826e48f177989f28935511c45ec1aba7ae1fef736b1a235299a4c67dfd1bd97d2c6f3af65ca7d9bb68a6baa02f10a7eac41614a27a99900c1d56752ff37e6552b45982d2683c6dc0d73bb58fe9c4fe047f4ce0c9dbebaf6d1c9fb50195f20d70204d3b83a9d44d65f2812cbcaa306bc1610e747652931f3f57a1c3e32189e04bf03a78afa75ee7ec96e5455924ea105cd16c0e4f16b2e72082035e98e236d3dcfcbb1a9eabbde2f559cd7d40562f0060d2ac671e15c4ecfd0e0b634d50a68a0f7f22e65446e1c5ffb694fd2f3c8f7daad82af34dbf2331da76119e78fe7f1f4839d37add2a03d62a9c4ad51fe25416efb3f2fcd7bdbfd04cf518b0cf36a6a1d3d845f2ba1b7b5f1116c891bcc7a705217235c1e5620d046d26128c9d3c92bf10832405de6954dba9c09192f27f88001b2025c3f982f43d181c0a8438d5abbfe4c499b3f14b063633878950db67d38d5109364e7af9e50df45068b7fe10b06d17f2caa5565b0e88cb51abf796b22e9250af6b4137e4bc34c6fceda95c5f3fc71c94e7be1a347ed450a16ed8079ffbedba482ca71e7db55b0382d49e9fc74bef856720da9d5d47d98946539bc77b45793b276699a34895abad8ed714bc15308fb47ecd5f94235a00bddde928cdf72af8fc2dacacc04f60d9923e1a160169a823d2984507bd7e11ad9b031b4099c629874d8bc24297e9c2782d1aafd557fce4fdf0c99782fa047432e9746d8b4c481c24b24787bbb9a6eb28433096ff0840916a9af18bbe38d4307d0f42c055088e4da3a95ce4e82c16c2e6306f4cf901689951d561ec6a08b65b10dade048ab052fa92f30cfe6548288bdd57b3f11cd2b2ad250fc05127c512990ea04a622d16bfbc571b37e13e10707f61216f1828f4b28cacbfbfea629edebd779c6db78dd96d062a8b33a98a39b4c48af2a6169dcb85044ea213cafe105aea75323e37638864c6506fd148e9b5880db4f528fb5531ba88b6998863ea427896fb9d2eba93bfed81f1f1c2f244b2284299575ea0cd4956d875e837a55b531e364c6f7884733aec7a04f53fa7941e706632309e62b322d099068308a661ee55ccb7d2fb97f02c86fc45d09c30b697bef07140f4d7badcf3d32ca3d52edc029a6cebdfd82ec53b97bd3b43c5e5d87d5c050bf420e0385387ae95dc7dd6c21230ecec837b446cdc557e8805c75ec427c886a805f38fd3c056f4cd6b38feb981c4889df41f45aee479b7cf9744823789d3160634b3d7ff6aa97fccdb403cc0a7654b2821b3010aa87cb2a7cce483e3e4921bd693a7f1f062842cebef25e79ad540eaf8127cf7f1049e125657d86145f8f668dfc69bf6357338d1dd423a779e45c311d805a12092075f4cd96504ca9acefeac5df88bd816f2ffb49e86d9810d7830fd923bc636a86c444493be15dfc4d809793acf4317243b86dcff6c151944f2654aef78833a292f6849d42ee9a249aa83007945aa1054055c16b0c39efcc5d9f2bfae4e2a1ca5b207ecd05a4f81ee2b6274ff29f9ef302ee4ba90d488cca3578f09a10e0f617afe7d0efb219fbf6eacd4a81a0633509c68c0536f519c4958c89bfa701c727edc1cdd7aa615f2f4b7606cedccce8a1f4dee75e452c02302ba0bba512549f508df8db74c2928bf2868d6694c7c986eac027341ce8708b94f8b9a40a3f6b59831a1435c1720f7ee8b2fc3601d41ab0399caa3b2c42216a8ff27589104092928c80cf52f8fec142478870fc42432481eca1444930b0b99506668798c7549cab018b183f92a40d12f63bac13dbbef395164022d7193e6a68913ef1ec37fac7807a79f8801d64cd1b4ffcecdff1a401874d86ce4b81ee25d91d4e4c2407f9ea8ff3dd042864e0873b6e2aeed1b8c170ceff766fc8b7dd50700abd50c62afe478ae6c291ca8e8afd07b1dea13bdc1394071c3844a98839203c701adc3788c7b169e237d236405230c8253e117b90d3b65f32d5bcff0091d7b43cef752cc58cca5fc4f5be5acb12717a6fb801611c54546292d5c663b4d29a6ff813b99c355d0f8dcda8858f1cad44f667e765420e8a8e9446bf1f7372a8258f6a70df34cfe1161f0b17d445b815b6798e089fb6f9839bd012733b675fc6b2c51e41fed5bec46e549287291f73ad8f01c334bfb956209f0bba17b35b0e41966b8ca39faac35cd6b314268a140c7eabe08ce0be687a345476e3d1ad859de188648534492ded820e13807e0cb309184e7272ca2e36e9d7729801630cff725d4e1f4c45bdeeaaec7dd439764ab401e3beae7c484de869c7e288fd2a7aff9a855c5eabf0f505dac3abd7a9bf3ec946cb17ca511ab31c4f1d22527f328d93915c9c108472cd3d7675b658199e062bbc0646cfc32fa59c6cc82c5942d7e3f9f", 0x1000}], 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"/511], 0x1d8}, 0x4000041) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x500c2, 0x0) pipe2$9p(&(0x7f0000000100), 0x400) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) write$P9_RLERRORu(r0, &(0x7f0000000140)={0xd, 0x7, 0x1, {{}, 0x1f}}, 0xd) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_open_dev$evdev(&(0x7f00000000c0), 0x3, 0x822b81) write$char_usb(r2, &(0x7f0000000040)="e2", 0x35000) 16:10:22 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[], 0x208e24b) ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, &(0x7f00000004c0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) syz_mount_image$vfat(&(0x7f0000000100), 0x0, 0x100000, 0x2, &(0x7f0000000300)=[{0x0}, {&(0x7f0000000180)="5950f4", 0x3, 0xfff}], 0x0, &(0x7f0000000340)={[], [{@obj_type={'obj_type', 0x3d, 'memory.current\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x5, 0x31, 0x0, 0x0, 0x0, 0x62], 0x2d, [], 0x2d, [0x63, 0x31, 0x66], 0x2d, [0x38, 0x64, 0x33], 0x2d, [0x62, 0x39, 0x66, 0x39, 0x62, 0x62, 0x39, 0x39]}}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}]}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x0, 0x0, 0x0, "006d10ffd600"}) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000540)) perf_event_open(&(0x7f0000001340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) 16:10:22 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200001, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:22 executing program 5: r0 = perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r1 = syz_open_dev$tty1(0xc, 0x4, 0x3) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b5b0700674b7c6341526ded00000080400000000000000000000000f20000000000000000000000000000000000a1488e231f4b8db6c48c1d845bb0d6e0a3ec6875738cb30a01f30e3991610b17780670eb485f9fab296ccac4b17ee9af59f357ff9ad1fef6ad14d3d3e7cbf3b920a8a563de89793e54a435a3b7674a1e682de30000000000"], 0x40) ptrace$getregset(0x4204, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) ioctl$FICLONE(r1, 0x40049409, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x1) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0xc) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x304) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000000500)=[{{&(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000040)=""/46, 0x2e}, {&(0x7f0000000380)=""/224, 0xe0}, {&(0x7f0000000140)=""/28, 0x1c}, {&(0x7f0000000480)=""/93, 0x5d}, {&(0x7f0000000640)=""/108, 0x6c}], 0x5, &(0x7f0000000200)=""/8, 0x8}, 0x7}], 0x1, 0x0, &(0x7f0000000780)={r3, r4+60000000}) r5 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r5) r6 = socket$inet6(0xa, 0x80003, 0x6) sendmmsg(r6, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) 16:10:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000a80)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df90f6da7f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1e4f86691eb3c042d18fc63e879ef6c7bb8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94", 0xc5}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000)=0x398, 0x4) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000200)="8c5fd9d6f802fc3cb126151fc9eec80edaad313c447ff1eb6b4928d879db54c30353658b38ad466500a105b30459a7b3d3000d70f9697b719908411956bbee8938356964a4e2d34b8e69f332b42d7723e524dc6e3e377e638c5475d1c30c3054b10bd4ad473419832f07ba612cdeb73789a05ec363f1ee45dc8879ef6e5442e14db5fe0fc480148470eee2534234d0f201b972eb53bedf8c", 0x98}], 0x1, 0x3) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) 16:10:22 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200001, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 59.635606][ T4873] loop3: detected capacity change from 0 to 65608 [ 59.638712][ T4873] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 115646289543168)! [ 59.640590][ T4873] EXT4-fs (loop3): group descriptors corrupted! [ 59.698606][ T4886] loop3: detected capacity change from 0 to 65608 [ 59.701137][ T4886] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 115646289543168)! [ 59.702953][ T4886] EXT4-fs (loop3): group descriptors corrupted! 16:10:22 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200001, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:22 executing program 5: r0 = perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r1 = syz_open_dev$tty1(0xc, 0x4, 0x3) write$binfmt_elf64(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b5b0700674b7c6341526ded00000080400000000000000000000000f20000000000000000000000000000000000a1488e231f4b8db6c48c1d845bb0d6e0a3ec6875738cb30a01f30e3991610b17780670eb485f9fab296ccac4b17ee9af59f357ff9ad1fef6ad14d3d3e7cbf3b920a8a563de89793e54a435a3b7674a1e682de30000000000"], 0x40) ptrace$getregset(0x4204, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) ioctl$FICLONE(r1, 0x40049409, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x1) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0xc) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x304) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000000500)=[{{&(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000040)=""/46, 0x2e}, {&(0x7f0000000380)=""/224, 0xe0}, {&(0x7f0000000140)=""/28, 0x1c}, {&(0x7f0000000480)=""/93, 0x5d}, {&(0x7f0000000640)=""/108, 0x6c}], 0x5, &(0x7f0000000200)=""/8, 0x8}, 0x7}], 0x1, 0x0, &(0x7f0000000780)={r3, r4+60000000}) r5 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r5) r6 = socket$inet6(0xa, 0x80003, 0x6) sendmmsg(r6, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) [ 59.743405][ T4874] loop4: detected capacity change from 0 to 2048 [ 59.780100][ T4902] loop3: detected capacity change from 0 to 65608 [ 59.807271][ T4902] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 115646289543168)! [ 59.809117][ T4902] EXT4-fs (loop3): group descriptors corrupted! 16:10:23 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200001, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 59.899188][ T4917] loop3: detected capacity change from 0 to 65608 [ 59.903156][ T4917] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 115646289543168)! [ 59.905176][ T4917] EXT4-fs (loop3): group descriptors corrupted! 16:10:23 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = gettid() process_vm_writev(r3, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0x11fffff90}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0x7ffff000}], 0x6, 0x0) process_vm_readv(r3, &(0x7f00000001c0), 0x0, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/74, 0x4a}, {&(0x7f0000000480)=""/93, 0x5d}, {&(0x7f0000000500)=""/145, 0x91}, {&(0x7f00000005c0)=""/161, 0xa1}], 0x4, 0x0) syz_mount_image$vfat(&(0x7f0000000440), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000500)=ANY=[]) r4 = perf_event_open(&(0x7f0000000680)={0x0, 0x80, 0x7f, 0x5, 0x40, 0x6, 0x0, 0x7f, 0xd0000, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_config_ext, 0x10000, 0x3, 0x0, 0x5, 0x3, 0xfffffc95}, r3, 0x0, 0xffffffffffffffff, 0x3) r5 = fcntl$getown(r2, 0x9) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x5, 0x4f, 0x9b, 0x0, 0x6, 0x40000, 0xd, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f00000002c0), 0x8}, 0x840, 0x7ff, 0x6, 0x2, 0x1, 0x58, 0x40, 0x0, 0x3, 0x0, 0x904d}, r5, 0x4, r4, 0x2) open(&(0x7f00000001c0)='./file0\x00', 0x4000, 0x106) 16:10:23 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x3ff, 0x9) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x80a00800, &(0x7f0000000100)="29fa9acccda6c0f0b94e028c8e22e16746fdfbc5f76a5f36d90dc187424f9475d0b73abf2d3edd202b59f5efd4fc17cc673e3c60dc51565059575e0116c3e609fb962f3c39a6732b45842db0f9556f69d5283c491e4236c96e4111692563000d4235bd6a7ce2cd913b22be72b029c2c759fa09", &(0x7f0000000040), &(0x7f0000000180), &(0x7f00000001c0)) exit_group(0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) write$rfkill(r0, &(0x7f0000000000)={0x5, 0x6, 0x0, 0x1, 0x1}, 0x8) 16:10:23 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = gettid() process_vm_writev(r3, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0x11fffff90}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0x7ffff000}], 0x6, 0x0) process_vm_readv(r3, &(0x7f00000001c0), 0x0, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/74, 0x4a}, {&(0x7f0000000480)=""/93, 0x5d}, {&(0x7f0000000500)=""/145, 0x91}, {&(0x7f00000005c0)=""/161, 0xa1}], 0x4, 0x0) syz_mount_image$vfat(&(0x7f0000000440), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000500)=ANY=[]) r4 = perf_event_open(&(0x7f0000000680)={0x0, 0x80, 0x7f, 0x5, 0x40, 0x6, 0x0, 0x7f, 0xd0000, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_config_ext, 0x10000, 0x3, 0x0, 0x5, 0x3, 0xfffffc95}, r3, 0x0, 0xffffffffffffffff, 0x3) r5 = fcntl$getown(r2, 0x9) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x5, 0x4f, 0x9b, 0x0, 0x6, 0x40000, 0xd, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f00000002c0), 0x8}, 0x840, 0x7ff, 0x6, 0x2, 0x1, 0x58, 0x40, 0x0, 0x3, 0x0, 0x904d}, r5, 0x4, r4, 0x2) open(&(0x7f00000001c0)='./file0\x00', 0x4000, 0x106) [ 60.799235][ T4942] FAT-fs (loop5): bogus number of reserved sectors [ 60.800953][ T4942] FAT-fs (loop5): Can't find a valid FAT filesystem 16:10:24 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e21, 0x2, @dev={0xfe, 0x80, '\x00', 0xe}, 0x401}, 0x1c) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x12000, 0x0) mmap(&(0x7f0000355000/0x1000)=nil, 0x1000, 0x9, 0x80010, r1, 0x54ab9000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) renameat(r3, &(0x7f0000000180)='./file0\x00', r1, &(0x7f0000000200)='./file0\x00') r4 = syz_open_dev$ptys(0xc, 0x3, 0x1) ioctl$TIOCMBIS(r4, 0x5416, &(0x7f0000000100)=0x17) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001140), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000000)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0108006046a14942ba8002000000080003"], 0x3c}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendfile(r5, r2, 0x0, 0x100000002) 16:10:24 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200001, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:24 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) pipe(0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='net/netlink\x00') preadv(r2, &(0x7f0000001600)=[{&(0x7f0000000300)=""/82, 0x52}], 0x1, 0x0, 0x0) preadv(r2, &(0x7f0000000400)=[{&(0x7f0000000000)=""/129, 0x81}], 0x1, 0x6, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) lseek(r4, 0x0, 0x4) write$cgroup_subtree(r1, 0x0, 0x0) 16:10:24 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000a80)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df90f6da7f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1e4f86691eb3c042d18fc63e879ef6c7bb8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94", 0xc5}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000)=0x398, 0x4) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000200)="8c5fd9d6f802fc3cb126151fc9eec80edaad313c447ff1eb6b4928d879db54c30353658b38ad466500a105b30459a7b3d3000d70f9697b719908411956bbee8938356964a4e2d34b8e69f332b42d7723e524dc6e3e377e638c5475d1c30c3054b10bd4ad473419832f07ba612cdeb73789a05ec363f1ee45dc8879ef6e5442e14db5fe0fc480148470eee2534234d0f201b972eb53bedf8c", 0x98}], 0x1, 0x3) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) 16:10:24 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200001, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 60.893315][ T4959] loop3: detected capacity change from 0 to 65608 [ 60.896268][ T4959] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 115646289543168)! [ 60.898341][ T4959] EXT4-fs (loop3): group descriptors corrupted! 16:10:24 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200001, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:24 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) pipe(0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='net/netlink\x00') preadv(r2, &(0x7f0000001600)=[{&(0x7f0000000300)=""/82, 0x52}], 0x1, 0x0, 0x0) preadv(r2, &(0x7f0000000400)=[{&(0x7f0000000000)=""/129, 0x81}], 0x1, 0x6, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) lseek(r4, 0x0, 0x4) write$cgroup_subtree(r1, 0x0, 0x0) [ 60.944406][ T4967] loop3: detected capacity change from 0 to 65608 [ 60.947363][ T4967] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 115646289543168)! [ 60.949415][ T4967] EXT4-fs (loop3): group descriptors corrupted! 16:10:24 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) pipe(0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='net/netlink\x00') preadv(r2, &(0x7f0000001600)=[{&(0x7f0000000300)=""/82, 0x52}], 0x1, 0x0, 0x0) preadv(r2, &(0x7f0000000400)=[{&(0x7f0000000000)=""/129, 0x81}], 0x1, 0x6, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) lseek(r4, 0x0, 0x4) write$cgroup_subtree(r1, 0x0, 0x0) 16:10:24 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000680)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000001900)=""/4096, 0x1000}, {&(0x7f0000000000)=""/29, 0x1d}, {0xfffffffffffffffd}, {&(0x7f0000000200)=""/202, 0xca}, {&(0x7f0000000300)=""/242, 0xf2}, {&(0x7f0000000400)=""/196, 0xc4}, {&(0x7f0000000100)=""/8, 0x8}, {&(0x7f0000000500)=""/140, 0x8c}, {&(0x7f00000005c0)=""/152, 0x98}], 0xa, 0xd9f, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) fcntl$getflags(r3, 0x408) vmsplice(r3, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec"}], 0x1, 0x0) close(r2) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x17f) sendmsg$NL80211_CMD_JOIN_MESH(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) write(0xffffffffffffffff, &(0x7f0000000180)="1c0000004a005f0214f9f424000904000a", 0xfffffffffffffc70) splice(r1, 0x0, r2, 0x0, 0xfffd, 0x0) 16:10:24 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200001, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x2de1, &(0x7f0000000440), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000000380)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x8000, 0x85) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_READV=@pass_iovec={0x1, 0x2, 0x0, @fd_index=0x4, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x302, 0x0, 0x0, 0x0, 0x0) r3 = syz_io_uring_setup(0x2abc, &(0x7f0000000080)={0x0, 0x0, 0x2}, &(0x7f0000000000/0x11000)=nil, &(0x7f0000002000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) setregid(0x0, 0x0) io_uring_enter(r3, 0x0, 0x45c5, 0x3, 0x0, 0x0) [ 61.050548][ T4978] loop3: detected capacity change from 0 to 65608 [ 61.062490][ T4978] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 115646289543168)! [ 61.064533][ T4978] EXT4-fs (loop3): group descriptors corrupted! 16:10:24 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200001, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:24 executing program 2: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="4b0900080000003be56cca"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0xfffffffffffffdf3}, {&(0x7f00000193c0)=""/102385, 0xffffffffffffffaf}], 0x3, 0x0, 0x1d, 0x0) tkill(r0, 0x28) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) rt_sigqueueinfo(r0, 0x24, &(0x7f0000000000)={0x19, 0x0, 0x9a9}) ptrace$cont(0x9, r0, 0x0, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) wait4(r1, 0x0, 0x1, &(0x7f0000000240)) 16:10:24 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000040)='nr0\x00', 0x10) r0 = socket$inet6(0xa, 0x3, 0x8) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) r1 = dup(0xffffffffffffffff) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x20, 0xfd, 0x78, 0x2, 0x4, 0x2, 0x3, 0x0, 0x20a, 0x40, 0x2c0, 0xdf, 0x7f5b, 0x38, 0x1, 0x6, 0x5, 0xff8}, [{0x6, 0x80000001, 0x2b, 0x80, 0x7fffffff, 0x80, 0x5, 0x4}, {0x4, 0xfffffe9c, 0x800, 0x5, 0x8001, 0x824, 0xb7, 0xfffffffffffffcb4}], "b1022505318934c87e7723954af885645ed6164055f60cc7a87954a3b49e59972739e4f359eebe2530b687e88d57c58cdec80a7b63f000182d6aaceb91cf86b0747d7c1012058f011624a358e23ef06a24", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xb01) r2 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000ec0)) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r2, 0x890c, &(0x7f0000000240)={@empty, @ipv4={'\x00', '\xff\xff', @multicast1}, @initdev={0xfe, 0x88, '\x00', 0x8, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24c20082, r5}) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(0xffffffffffffffff, 0x4014f50b, &(0x7f0000000080)={0x0, 0x8, 0x7fffffff}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xfda6) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000001c0)={@local, @private1, @remote, 0x0, 0x0, 0x0, 0x0, 0x9, 0x20c301e2, r6}) sendmmsg(r0, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x3d1) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000000)='./file0\x00', 0x407fffffff, 0x4, &(0x7f0000000180)=[{&(0x7f0000000040), 0x0, 0x9}, {&(0x7f00000000c0)="cd84636dcb5a777dec3ce6689cb2a04d2ef1ac45d68ac665e1844445c0c22072c3f1e137e8f26b070306c024a80843b8a327d75da41acc38ef183afb8f3a42efad59d0f4c1430c6fe23c6d2a8945abb37992247f69f037b5f78d3a3aff58773fa8baa00056003cf516c5939e31005c67fbd4e605d96e3a5b3206dc00b83c877df1359f5d34922297a3e195156066cd4db1dbb821f8ec58cce0b388815d317367a3e1e6", 0xa3}, {&(0x7f0000000240)="4b3ee1a7c81dfa80b6e66d53d51d58550739b9bde539e91ac019b1628c05b799b24f916288737f1aacb29cfe24ad9f0f4030178fa9f652db203c014885206c3dfe849384", 0x44, 0xff}, {&(0x7f00000002c0)="f9b396a9a144bca0ccf6df192ee1342a126354b570b2cb68703c065f0b4252cb93426632de17eacabec51aba8274ae0e9c6c70170819d92afbd21cbccaf17aff3701633f3f44edaacb86a19a04ac84454efabe7c63e1dec11e1f91b936bd5ce304b212452b70b865385ddc6b9aeedb59eb50c8e3cff2f78dbf21ee1d3f1e2cc577b7feed41b4cdc037ffb89b3a29d3d7903e58147a5c6ae9cd68f03115e24e42f3485d5e48ab12124ba4", 0xaa, 0x7}], 0x0, &(0x7f0000000000)=ANY=[]) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000200)='./file0\x00', 0x0) 16:10:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x2de1, &(0x7f0000000440), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000000380)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x8000, 0x85) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_READV=@pass_iovec={0x1, 0x2, 0x0, @fd_index=0x4, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x302, 0x0, 0x0, 0x0, 0x0) r3 = syz_io_uring_setup(0x2abc, &(0x7f0000000080)={0x0, 0x0, 0x2}, &(0x7f0000000000/0x11000)=nil, &(0x7f0000002000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) setregid(0x0, 0x0) io_uring_enter(r3, 0x0, 0x45c5, 0x3, 0x0, 0x0) [ 61.259894][ T5011] loop4: detected capacity change from 0 to 264192 [ 61.261725][ T5011] FAT-fs (loop4): Unrecognized mount option "./file0" or missing value 16:10:24 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000a80)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df90f6da7f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1e4f86691eb3c042d18fc63e879ef6c7bb8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94", 0xc5}], 0x1}, 0x8000) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000)=0x398, 0x4) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2d5}], 0x1}, 0x0) 16:10:24 executing program 5: unshare(0x4a060480) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket(0x11, 0x800000003, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) setsockopt(r1, 0x3cce, 0x2, &(0x7f0000000180)="9ef856d438c244e754fc02bf31138ffc96624bc20a408e6d93ef0629d4ee632fb9356b653799b960b8b1bafe422e4185681914beb69345685943dbd4c3ebaebbbecab1846131343370eb30ed3d1c74326fba62a002b1159717cd88b0f08f15a3bfd6a794456e1c74f910862b6662a62d25f9fcbc183cfc35fe6bad94050fd5aebc9a694562f07746480b31ea49e75e1c1db93618d2116dca459a701eba15ce248d1cc9b930023464468b6979a02db21b7d05d5aae0b02175dcc90cf500", 0xbd) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000400)={r5, 0x3, 0x6, @broadcast}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 16:10:24 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200001, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:24 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') r1 = open(&(0x7f0000000080)='./file0\x00', 0x4142, 0x0) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000380)=""/199, 0xc7}, {&(0x7f0000000280)=""/185, 0xb9}, {&(0x7f0000000480)=""/187, 0xbb}, {&(0x7f0000000540)=""/198, 0xc6}, {&(0x7f0000000140)=""/84, 0x54}], 0x5, 0x5, 0x5207800) r3 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x208721) truncate(&(0x7f0000000340)='./file0\x00', 0x81) write$binfmt_script(r3, &(0x7f0000000380)=ANY=[], 0xab) sendfile(r3, r2, 0x0, 0xa198) r4 = dup2(r1, r0) fcntl$addseals(r4, 0x409, 0x2) 16:10:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x2de1, &(0x7f0000000440), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000000380)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x8000, 0x85) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_READV=@pass_iovec={0x1, 0x2, 0x0, @fd_index=0x4, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x302, 0x0, 0x0, 0x0, 0x0) r3 = syz_io_uring_setup(0x2abc, &(0x7f0000000080)={0x0, 0x0, 0x2}, &(0x7f0000000000/0x11000)=nil, &(0x7f0000002000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) setregid(0x0, 0x0) io_uring_enter(r3, 0x0, 0x45c5, 0x3, 0x0, 0x0) 16:10:24 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000100)=0x10000) r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, &(0x7f00000001c0), 0x2, &(0x7f0000000380)=ANY=[@ANYRESDEC, @ANYRESHEX, @ANYRESOCT]) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000400)={r1, 0x3, 0x6, @broadcast}, 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000140)={r1, 0x3, 0x6, @dev}, 0x10) r2 = socket(0x11, 0x800000003, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000400)={r4, 0x3, 0xfffffffffffffecb, @broadcast}, 0x10) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000140)={r4, 0x3, 0x6, @dev}, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f0000000400)={0x120, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, [@ETHTOOL_A_PAUSE_RX={0x5, 0x3, 0x1}, @ETHTOOL_A_PAUSE_RX={0x5}, @ETHTOOL_A_PAUSE_RX={0x5, 0x3, 0x1}, @ETHTOOL_A_PAUSE_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PAUSE_HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x5}]}, @ETHTOOL_A_PAUSE_AUTONEG={0x5, 0x2, 0x1}, @ETHTOOL_A_PAUSE_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}]}, @ETHTOOL_A_PAUSE_RX={0x5, 0x3, 0x1}, @ETHTOOL_A_PAUSE_RX={0x5}, @ETHTOOL_A_PAUSE_HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}]}]}, 0x120}, 0x1, 0x0, 0x0, 0x4000000}, 0x20008014) r5 = syz_open_dev$loop(&(0x7f0000000000), 0x7ac, 0x10000) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) r7 = socket$inet_tcp(0x2, 0x1, 0x0) r8 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/attr/current\x00', 0x2, 0x0) r9 = socket$inet6_icmp(0xa, 0x2, 0x3a) ppoll(&(0x7f00000002c0)=[{r6, 0x200}, {r0, 0x282}, {r7, 0x80}, {r8, 0x100b}, {r9, 0x190}], 0x5, &(0x7f0000000300)={0x0, 0x3938700}, &(0x7f0000000340)={[0x2]}, 0x8) ioctl$BTRFS_IOC_ADD_DEV(r5, 0x5000940a, 0x0) [ 61.727278][ T5034] loop2: detected capacity change from 0 to 4096 [ 61.739817][ T5034] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 61.749535][ T5046] loop4: detected capacity change from 0 to 264192 [ 61.752450][ T5046] FAT-fs (loop4): Unrecognized mount option "184467440737095516150xffffffffffffffff01777777777777777777777" or missing value [ 61.765539][ T5046] device lo entered promiscuous mode [ 61.772983][ T5035] device lo entered promiscuous mode 16:10:25 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200001, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 61.779261][ T5046] device lo left promiscuous mode 16:10:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000240)=[{&(0x7f0000000d80)="390000001300034700bb65e1c3e4ffff06000800010000005600000025000000190004000500fc63a29850010000d19e0e1879d632911f7c04", 0x39}], 0x1) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) inotify_init1(0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000140)={'ip6_vti0\x00', 0x0, 0x29, 0x28, 0x81, 0x20, 0x1, @empty, @private1, 0x700, 0x20, 0x0, 0x9}}) bind$packet(r3, &(0x7f0000000080)={0x11, 0xd, r4, 0x1, 0x9, 0x6, @multicast}, 0x14) 16:10:25 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000a80)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df90f6da7f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1e4f86691eb3c042d18fc63e879ef6c7bb8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94", 0xc5}], 0x1}, 0x8000) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2d5}], 0x1}, 0x0) [ 61.831781][ T5069] device lo entered promiscuous mode [ 61.841881][ T5064] loop3: detected capacity change from 0 to 65608 [ 61.848934][ T5064] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 115646289543168)! [ 61.850822][ T5064] EXT4-fs (loop3): group descriptors corrupted! 16:10:25 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200001, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:25 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)={0x30, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @pid}, @nested={0x10, 0x2e, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x30}], 0x1}, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x3, 0xa8, 0x20, 0x1, 0x0, 0x100000001, 0x84, 0x3b75bdd0adef79e, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1000, 0x2, @perf_config_ext={0x8, 0x46}, 0x52ea, 0x9, 0x2, 0x5, 0xd6b, 0x1000, 0x40, 0x0, 0x897c, 0x0, 0xf84}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x2) ioctl$FIOCLEX(r1, 0x5451) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000080)={0x0, 0xffffffab, 0x0, 0x2c00}, 0x0) sendmsg$netlink(r2, 0xffffffffffffffff, 0x68004) 16:10:25 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') r1 = open(&(0x7f0000000080)='./file0\x00', 0x4142, 0x0) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000380)=""/199, 0xc7}, {&(0x7f0000000280)=""/185, 0xb9}, {&(0x7f0000000480)=""/187, 0xbb}, {&(0x7f0000000540)=""/198, 0xc6}, {&(0x7f0000000140)=""/84, 0x54}], 0x5, 0x5, 0x5207800) r3 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x208721) truncate(&(0x7f0000000340)='./file0\x00', 0x81) write$binfmt_script(r3, &(0x7f0000000380)=ANY=[], 0xab) sendfile(r3, r2, 0x0, 0xa198) r4 = dup2(r1, r0) fcntl$addseals(r4, 0x409, 0x2) 16:10:25 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d09a0e63c9476288b671afdbd53a5994e137381f62021d1951b627b8dda57a5d17d744648c81c5703ed8146ab1b0171f89091b1dd3238d03dbb686df460963245dedf2013ee555af99499e44ad420dbf65fd46fbc99a1274429e2d5783751815828ec8cb3553110cca66460215353d19f6d8bbd8fb264eddea60b18e16c31aa5e200000491634ac2fd10e2cd30bcd7fede24263a7fff16e53ea293f3551b7147c33a44ea437fb1515c3e8d4f162fdebf8ebe11ae6fcd9372c8d8f19556ae091fe94215ae9434da412f6fa4cb6561e5f78ff9707844ee5d573fb294437722d9a06dfa61748c32c73d759933a8dd344c947d3efdbe90d0eb049df5fbb0c19f6785264b619c530d97395d44b04f7e2a280d658c7871ad373b792678c49227999651ef3b2ee1bc2b8f3035db376e8e09aa3837233c8713065a8ad131d24f6c42a3220d0e07c3d3e95d59a5dd10c09716b5f874ecf53aadfa5050ff40f2c3c4a629b6445e5836100afff5a8977583653b40ca316f8f11416e5c1bd5499636ddae25fc4970b37209cf5c0bf8e432160c258d14223baa52798e09858645773dd97e68a9531072713cff077b2e73e03ed4f145e9199c126a7f235e5674a3c7f5c7129ac7c1a3319590249b6d34ef6c3d8b94c6fc7cdcbddb053243053f7bc1f230d3bc7dfc4359e33992d0a3946b914a093287a76ac4a249b5b86cc75476466e409553355fefab75e9268a8751ffc9481fcff1f49c475699595b315e2147eebe8b7291600c6b1cf7c8f24d587b9464a67e5ccec17820e711b98f4f7d5053642068a3fff704c3fe35ba862b53e2622d6e8b4a4c815fb2ea90ef63e141209dd29254e5ab5bde9c6857b3cb184586049e7741b2d8b5b1a19e99e1834a25959155720c1c0ef84d9d3c42e1ba282847d476cef0228b1422aba08e5f3c1cd279bbd1c5303c2e9c16a0da4f88f770fca118b09e92b51a33970e32ade0c74eee1b31a420d7914c9d75db25855ae32798edc1b47e0f0f88429b2b60ae63", 0x2d5}], 0x1}, 0x0) 16:10:25 executing program 0: set_mempolicy(0x1, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) lseek(r0, 0x6, 0x1) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x101203, 0x0) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0x0, 0x20, 0x9, 0x0, 0x3, 0x3, 0x400, 0xe2, 0x40, 0x246, 0x1f, 0x9, 0x38, 0x2, 0x7, 0x7e, 0x1}, [{0x5, 0x1, 0x9, 0x0, 0x529, 0x1ff, 0x6, 0xc407}, {0x3, 0x2974, 0x589408cd, 0x1000, 0x2, 0x6, 0x3, 0xffffffffffffbf04}], "8dea59ed777a793eb2db3fb23b968d5b9756465606d6c9b854bede55285158440b9f5b85e9afd5e62e8415644209ed353af074dde1150a315f1b3e202bd43d46ab667947291ec81d766de3c711cf36a5d95d76b72dc76a095cb2294625043943318e5e9dbd9c39bca27be9f01872a9d99f8ba217d7bb609c50f9e45e3f74c23621470e3469fdd3d8ab588531cf0169d4e3ada8fcc09dbcca4f5f53e8d764e9f565bd620b39dd0ff274946060b609892230a06c61d58e7fc9a01fd3a282df920a5e0c7d58ad5481c371", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x779) set_mempolicy(0x1, &(0x7f0000000080)=0x101, 0x0) set_mempolicy(0x8000, &(0x7f0000000040)=0x4b3, 0x9) 16:10:25 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200001, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 61.944919][ T5034] syz-executor.2 (5034) used greatest stack depth: 10112 bytes left [ 61.959944][ T5083] loop3: detected capacity change from 0 to 65608 [ 61.960500][ T5089] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 61.963039][ T5083] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 115646289543168)! [ 61.964553][ T5089] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 61.964724][ T5083] EXT4-fs (loop3): group descriptors corrupted! [ 61.970220][ T5091] netlink: 'syz-executor.5': attribute type 46 has an invalid length. [ 61.973262][ T5089] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 61.989234][ T5091] netlink: 'syz-executor.5': attribute type 46 has an invalid length. 16:10:25 executing program 4: socket$inet6(0xa, 0x80003, 0x7) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_create1(0x0) r1 = socket$unix(0x1, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000240)) r2 = syz_io_uring_setup(0x3ede, &(0x7f0000000240)={0x0, 0xc0f0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(0xffffffffffffffff, 0x4014f50b, &(0x7f0000000040)={0x0, 0x3}) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x5}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r2, 0x2ff, 0x0, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 16:10:25 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="3a02dd0400011107510a2bacbb315d77a1200df76b4f8cc91b0ab3a7f1a2ed6901ecf3566d34b13e14d79073e38bfdc5ac491794b5f845a5778132e841bbbc43ba17747b"], 0x38}}, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r4, &(0x7f0000000080)={0x0, 0xffffffab, 0x0, 0x2c00}, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, 0x0, 0x1, 0x5, 0x0, 0x0, {0x1, 0x0, 0x2}, [@CTA_LABELS={0x8, 0x16, 0x1, 0x0, [0x9]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8}, 0x12000) sendfile(r3, r2, 0x0, 0x100000300) openat$cgroup_ro(r0, &(0x7f0000000140)='cgroup.controllers\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) preadv(r5, &(0x7f0000000280), 0x18, 0xd9f, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs={0x1, 0x0, 0x4e22}, 0x6e) [ 62.021381][ T5102] loop2: detected capacity change from 0 to 4096 [ 62.057970][ T5102] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 16:10:25 executing program 0: keyctl$restrict_keyring(0xe, 0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000080)='trusted\x00', &(0x7f00000000c0)='^*%,*\b!\\\x00') r1 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000280)={'fscrypt:', @desc3}, &(0x7f00000002c0)={0x0, "ae718b5da2d610df280edab6c0cac73c4307bb475243571b950e17dd309482b0d071abb67f62fff1ddfacd974ea263387d357c7f2c4a1b726b0e23b24415e776", 0x37}, 0x48, r0) add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r1) keyctl$restrict_keyring(0x1d, 0xfffffffffffffffc, &(0x7f0000000100)='keyring\x00', &(0x7f0000000140)='trusted\x00') pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$SNAPSHOT_FREE(r2, 0x3305) keyctl$unlink(0x9, r0, 0xfffffffffffffffc) 16:10:25 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2d5}], 0x1}, 0x0) 16:10:25 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.memory_pressure\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r0, 0x0) ftruncate(r0, 0x8001) r1 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_int(r1, 0x107, 0x0, 0x0, &(0x7f00000004c0)) [ 62.111394][ T5119] loop3: detected capacity change from 0 to 65608 [ 62.129013][ T5119] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 115646289543168)! [ 62.130801][ T5119] EXT4-fs (loop3): group descriptors corrupted! 16:10:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x10000}, {&(0x7f0000000040)="02d9f9fca7fb4fc1000000033795d3a782391cbdffca380000000400000019000f000300040000000000000000993a2b713008527234ec0877f1f5b30d17ce9206d3f850ae3cca56117bfc5b1f0d6c1b0de0f8857f26ce8237271bf0484c9db3c0ad5e85e3270d0526f36fe248b3ad4b94d070000000000000", 0x79, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d}, {0x0, 0x0, 0x1}], 0x0, &(0x7f00000000c0)=ANY=[]) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 16:10:25 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="30a76f1f26869e40ab3685"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) gettid() r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x32) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000040)=[{&(0x7f0000000440)=""/143, 0x8f}], 0x1, 0x0, 0x0, 0x0) tkill(r0, 0x33) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = gettid() rt_sigqueueinfo(r2, 0xa, &(0x7f00000002c0)) 16:10:25 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200001, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 62.217901][ T5140] loop4: detected capacity change from 0 to 4096 [ 62.219830][ T5140] EXT4-fs (loop4): unsupported descriptor size 0 16:10:25 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d09a0e63c9476288b671afdbd53a5994e137381f62021d1951b627b8dda57a5d17d744648c81c5703ed8146ab1b0171f89091b1dd3238d03dbb686df460963245dedf2013ee555af99499e44ad420dbf65fd46fbc99a1274429e2d5783751815828ec8cb3553110cca66460215353d19f6d8bbd8fb264eddea60b18e16c31aa5e200000491634ac2fd10e2cd30bcd7fede24263a7fff16e53ea293f3551b7147c33a44ea437fb1515c3e8d4f162fdebf8ebe11ae6fcd9372c8d8f19556ae091fe94215ae9434da412f6fa4cb6561e5f78ff9707844ee5d573fb294437722d9a06dfa61748c32c73d759933a8dd344c947d3efdbe90d0eb049df5fbb0c19f6785264b619c530d97395d44b04f7e2a280d658c7871ad373b792678c49227999651ef3b2ee1bc2b8f3035db376e8e09aa3837233c8713065a8ad131d24f6c42a3220d0e07c3d3e95d59a5dd10c09716b5f874ecf53aadfa5050ff40f2c3c4a629b6445e5836100afff5a8977583653b40ca316f8f11416e5c1bd5499636ddae25fc4970b37209cf5c0bf8e432160c258d14223baa52798e09858645773dd97e68a9531072713cff077b2e73e03ed4f145e9199c126a7f235e5674a3c7f5c7129ac7c1a3319590249b6d34ef6c3d8b94c6fc7cdcbddb053243053f7bc1f230d3bc7dfc4359e33992d0a3946b914a093287a76ac4a249b5b86cc75476466e409553355fefab75e9268a8751ffc9481fcff1f49c475699595b315e2147eebe8b7291600c6b1cf7c8f24d587b9464a67e5ccec17820e711b98f4f7d5053642068a3fff704c3fe35ba862b53e2622d6e8b4a4c815fb2ea90ef63e141209dd29254e5ab5bde9c6857b3cb184586049e7741b2d8b5b1a19e99e1834a25959155720c1c0ef84d9d3c42e1ba282847d476cef0228b1422aba08e5f3c1cd279bbd1c5303c2e9c16a0da4f88f770fca118b09e92b51a33970e32ade0c74eee1b31a420d7914c9d75db25855ae32798edc1b47e0f0f88429b2b60ae63", 0x2d5}], 0x1}, 0x0) 16:10:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r5 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) keyctl$chown(0x4, r5, r6, r2) r7 = io_uring_setup(0x633a, &(0x7f0000000040)) r8 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r8, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg$inet6(r8, &(0x7f0000002840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r9 = dup3(r8, r7, 0x0) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) fcntl$getflags(r10, 0x408) preadv(r10, &(0x7f0000000780)=[{&(0x7f00000002c0)=""/215, 0xd7}, {&(0x7f0000000140)=""/93, 0x5d}, {&(0x7f00000003c0)=""/135, 0x87}, {&(0x7f0000000480)=""/79, 0x4f}, {&(0x7f0000000500)=""/89, 0x59}, {&(0x7f0000000200)=""/12, 0xc}, {&(0x7f0000000a80)=""/4096, 0x1000}, {&(0x7f0000000580)=""/38, 0x26}, {&(0x7f00000005c0)=""/168, 0xa8}, {&(0x7f0000000680)=""/239, 0xef}], 0xa, 0xfffffffb, 0x1000) recvmmsg(r9, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}], 0x600, 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(r9, 0x2, r4) 16:10:25 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fffff7c}]}) r1 = eventfd2(0x2, 0x80002) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000180)={0x0, 0x0, r1, 0x8}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000880)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="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"], 0xe8}}, 0x0) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000300), 0xc, &(0x7f0000000340)={&(0x7f00000003c0)={0x450, 0x0, 0x400, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x54, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}]}, @TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NODE={0x1ac, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0x39, 0x3, "bccab7407e7fb2de37c0615bd677a77749ef495109f1c56f71de602790719a40aa6e675ac93a89acc6d225113323b7e45f815b5baf"}, @TIPC_NLA_NODE_KEY={0x41, 0x4, {'gcm(aes)\x00', 0x19, "dd273b6f3e181b129cfa609789e8d3d6f9a005f9cf370537a3"}}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1ff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ID={0x31, 0x3, "2c677a425c51052043f0e39e14dfc93a8a6219531dfab89dac73dd420d968df1bdb92a61a12392e7722acdfe6d"}, @TIPC_NLA_NODE_ID={0x9d, 0x3, "3bea3c2dbca608965d44ddeea99f833a269521ea9103933e6444895674f85ff51bf16535731d8577781aab8ae66cef60da1b5d3d30d424d7e7726c5cabea0e6fc499db7b19cffb2c56e80bf3e9bde7c59a6567a312b9039872eaebf549eba589e4cfb8f867c56bf97adb04339c37a55311e1c3d30a0d4aab2fdd955ecf6eb516c19ccf8867634e6de0386cb887624a342531050876f5eadc15"}, @TIPC_NLA_NODE_KEY={0x40, 0x4, {'gcm(aes)\x00', 0x18, "da6b59be30cf541b335c80f057029f072ec69aa04a98dbe8"}}]}, @TIPC_NLA_MEDIA={0x1c, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_MEDIA={0x14, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_NET={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x80000001}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}]}, @TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1f}]}, @TIPC_NLA_LINK={0x58, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x82}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}]}]}, @TIPC_NLA_NODE={0x178, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_KEY={0x41, 0x4, {'gcm(aes)\x00', 0x19, "f698a85893ea7647117ba9dad7d67fa8753070bcc46c973efb"}}, @TIPC_NLA_NODE_ID={0x3d, 0x3, "b483878eab2becfa8c3e1cb27f874c43b18c7e15f4376fc8e0cae60369c56ad1cb62838c2757c461e297a5c14b4ab9e6ab41ef5bddcae84a21"}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_NODE_KEY={0x47, 0x4, {'gcm(aes)\x00', 0x1f, "6b9f752524063f4af8d0f6b4c70ab132dec662c2b61fdad955ee4b4edc3402"}}, @TIPC_NLA_NODE_KEY={0x41, 0x4, {'gcm(aes)\x00', 0x19, "d54e2d472ab1f16ce25543bfd847f4c5737dc241cf61ea8f32"}}, @TIPC_NLA_NODE_ID={0x4b, 0x3, "bc241173fa2a6e2058186bc42c5cd635722a253c6e74deab82cc38edef473a61320c400b558521fd329d5f53d4163727ea4cf5efab03568443dea723881d30e61db2d760f5ca42"}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x450}, 0x1, 0x0, 0x0, 0x4024000}, 0x40) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) read$eventfd(r4, &(0x7f00000000c0), 0x8) tkill(r3, 0x31) 16:10:25 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x3ff, 0x9) clone(0x2000a1047fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) [ 62.272656][ T5148] loop3: detected capacity change from 0 to 65608 [ 62.275111][ T5148] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 115646289543168)! [ 62.276867][ T5148] EXT4-fs (loop3): group descriptors corrupted! 16:10:25 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200001, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:25 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socket$inet(0x10, 0x80003, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20880, 0x46) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000500)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="41030000", @ANYRES16=0x0, @ANYBLOB="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"], 0x334}, 0x1, 0x0, 0x0, 0x41}, 0x44000) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000080)={0x0, 0xffffffab, 0x0, 0x2c00}, 0x0) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)}, 0x4008800) 16:10:25 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) r1 = accept4$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4}, &(0x7f0000000080)=0x1c, 0x80000) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x7c1, @private2, 0x2}, 0x1c) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:25 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x1d, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000e0f4655fe0f4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303330363131363700"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000ab7a0e3e026c4410ac9856e86774ba11010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000ddf4655fddf4655fddf4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fe0f4655fe0f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x1500}, {&(0x7f0000010e00)="20000000c8946f1dc8946f1d00000000ddf4655f00"/32, 0x20, 0x1580}, {&(0x7f0000010f00)="8081000000300404ddf4655fddf4655fddf4655f00000000000001002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000ddf4655f00"/160, 0xa0, 0x1a00}, {&(0x7f0000011000)="c0410000002c0000ddf4655fddf4655fddf4655f00000000000002002000000000000800000000000af301000400000000000000000000000b00000020000000", 0x40, 0x1e00}, {&(0x7f0000011100)="20000000000000000000000000000000ddf4655f000000000000000000000000000002ea00"/64, 0x40, 0x1e80}, {&(0x7f0000011200)="ed4100003c000000e0f4655fe0f4655fe0f4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c65310000000000000000000000000000000000000000000000000000004d5f6b7100000000000000000000000000000000000000000000000020000000c8946f1dc8946f1dc8946f1de0f4655fc8946f1d0000000000000000000002ea04070000000000000000000000000000646174610000000000000000", 0xc0, 0x1f00}, {&(0x7f0000011300)="ed8100001a040000e0f4655fe0f4655fe0f4655f00000000000001002000000000000800010000000af30100040000000000000000000000020000005000000000000000000000000000000000000000000000000000000000000000000000000000000048dad3ce00000000000000000000000000000000000000000000000020000000c8946f1dc8946f1dc8946f1de0f4655fc8946f1d0000000000000000", 0xa0, 0x2000}, {&(0x7f0000011400)="ffa1000026000000e0f4655fe0f4655fe0f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3230333036313136372f66696c65302f66696c653000000000000000000000000000000000000000000000c7982f7500000000000000000000000000000000000000000000000020000000c8946f1dc8946f1dc8946f1de0f4655fc8946f1d0000000000000000", 0xa0, 0x2100}, {&(0x7f0000011500)="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", 0x1a0, 0x2200}, {&(0x7f0000011700)="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", 0x100, 0x2400}, {&(0x7f0000011800)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009403090166696c652e636f6c64000000", 0x80, 0x4000}, {&(0x7f0000011900)="0b0000000c0001022e000000020000000c0002022e2e000000000000e8030000", 0x20, 0x8000}, {&(0x7f0000011a00)="00000000000400"/32, 0x20, 0x8400}, {&(0x7f0000011b00)="00000000000400"/32, 0x20, 0x8800}, {&(0x7f0000011c00)="00000000000400"/32, 0x20, 0x8c00}, {&(0x7f0000011d00)="00000000000400"/32, 0x20, 0x9000}, {&(0x7f0000011e00)="00000000000400"/32, 0x20, 0x9400}, {&(0x7f0000011f00)="00000000000400"/32, 0x20, 0x9800}, {&(0x7f0000012000)="00000000000400"/32, 0x20, 0x9c00}, {&(0x7f0000012100)="00000000000400"/32, 0x20, 0xa000}, {&(0x7f0000012200)="00000000000400"/32, 0x20, 0xa400}, {&(0x7f0000012300)="00000000000400"/32, 0x20, 0xa800}, {&(0x7f0000012400)="504d4d00504d4dffe0f4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033310075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/128, 0x80, 0x10000}, {&(0x7f0000012500)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x14000}], 0x0, &(0x7f0000012a00)) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4000, 0x90) [ 62.371447][ T5174] loop3: detected capacity change from 0 to 65608 [ 62.375290][ T5174] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 115646289543168)! [ 62.377141][ T5174] EXT4-fs (loop3): group descriptors corrupted! 16:10:25 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200001, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 62.416950][ T5185] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 62.418329][ T5185] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 62.419743][ T5185] A link change request failed with some changes committed already. Interface sit0 may have been left with an inconsistent configuration, please check. [ 62.445495][ T5190] loop4: detected capacity change from 0 to 1024 [ 62.467137][ T5196] loop3: detected capacity change from 0 to 65608 [ 62.469260][ T5196] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 115646289543168)! [ 62.471147][ T5196] EXT4-fs (loop3): group descriptors corrupted! 16:10:25 executing program 2: r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f00000000c0)='./file0\x00') mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)=0x20000008) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) renameat2(r1, &(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f00000004c0)='./file0/file0/file0\x00', 0x6) rmdir(&(0x7f00000003c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) fcntl$getflags(r3, 0x408) ioctl$F2FS_IOC_FLUSH_DEVICE(r3, 0x4008f50a, &(0x7f00000002c0)={0x0, 0xfffffffd}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r5 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0xa0000, 0x0) write$binfmt_script(r5, &(0x7f0000000280)={'#! ', './file0/file0', [], 0xa, "d91e3981890edbd7e5876d6db08d6906f803482e50878a1b870c415082149314ae152e14244ce295b826c8"}, 0x3c) symlinkat(&(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r4, &(0x7f0000000140)='./file0/file0/file0\x00') renameat2(r4, &(0x7f0000000100)='./file0/file0\x00', r0, &(0x7f0000000000)='./file0\x00', 0x0) 16:10:25 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) r1 = accept4$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4}, &(0x7f0000000080)=0x1c, 0x80000) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x7c1, @private2, 0x2}, 0x1c) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:25 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200001, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 62.488561][ T5190] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 62.522982][ T5208] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 62.524327][ T5208] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 62.525760][ T5208] A link change request failed with some changes committed already. Interface sit0 may have been left with an inconsistent configuration, please check. [ 62.532605][ T5209] loop3: detected capacity change from 0 to 65608 [ 62.550234][ T5209] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 115646289543168)! [ 62.551967][ T5209] EXT4-fs (loop3): group descriptors corrupted! 16:10:26 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2d5}], 0x1}, 0x0) 16:10:26 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x2c, 0x0, 0x3) r4 = openat$bsg(0xffffffffffffff9c, 0x0, 0x0, 0x0) setreuid(0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000900)) setreuid(0x0, 0x0) sendmsg$TIPC_NL_SOCK_GET(r4, &(0x7f00000007c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4008000}, 0x4040000) r5 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) sched_setattr(0x0, 0x0, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendfile(r5, r6, 0x0, 0x401ffc000) 16:10:26 executing program 2: openat$autofs(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) 16:10:26 executing program 0: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./bus\x00', 0x0) io_setup(0x202, &(0x7f0000000200)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f0000000140)={0x15, 0x0, 0x0, 0x1, 0x1, r2}]) open(&(0x7f0000000000)='./bus\x00', 0x10e40, 0x100) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) io_setup(0x800, &(0x7f0000000180)) io_setup(0x28, &(0x7f0000000300)=0x0) io_getevents(r5, 0x6a35, 0x0, &(0x7f0000000480), &(0x7f00000002c0)={0x77359400}) write$binfmt_script(r4, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1a, 0x28011, r4, 0x835f6000) fcntl$setstatus(r1, 0x4, 0x4400) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0xffff5444, &(0x7f0000000340)=0x0) preadv(r1, &(0x7f0000000400)=[{&(0x7f0000000580)=""/4096, 0x1000}], 0x1, 0x0, 0x0) r7 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040), 0x301000, 0x0) close(r4) ioctl$PTP_SYS_OFFSET_PRECISE(r7, 0xc0403d08, &(0x7f0000000080)) io_submit(r6, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0xf04a00, 0x300, 0x4, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 16:10:26 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) r1 = accept4$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4}, &(0x7f0000000080)=0x1c, 0x80000) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x7c1, @private2, 0x2}, 0x1c) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:26 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200001, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:26 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200001, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:26 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) r1 = accept4$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4}, &(0x7f0000000080)=0x1c, 0x80000) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x7c1, @private2, 0x2}, 0x1c) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:26 executing program 2: pipe2$9p(&(0x7f0000000440), 0x1800) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000cc0)={&(0x7f0000000000), 0xc, &(0x7f0000000c40)=[{&(0x7f0000000140)={0x28, 0x1d, 0x1, 0x0, 0x0, "", [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @pid}]}, @nested={0x4}, @typed={0x8, 0x0, 0x0, 0x0, @pid}]}, 0x28}, {&(0x7f0000001d80)={0x24, 0x2d, 0x1, 0x0, 0x0, "", [@generic="27f2d52ac200eac2849700abe39605121d"]}, 0x24}], 0x2}, 0x0) ioctl$INCFS_IOC_CREATE_FILE(r0, 0xc058671e, &(0x7f00000000c0)={{'\x00', 0x3}, {0xe6}, 0x9e, 0x0, 0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)="284dbd75f7413eca2f916ba3e619a9f74b79e5ce6f932940fbe4d755fcbb32dc66a935bd96e4782cddbfbbfef577a53d5691b8107e8d1837a0f60d7d38d35693987689f57fc7760afb37c9b273e7b1a185af7158a766d9bdad859eb40e848e0efe3c5d358558307d137a65477e75fcee12f4b96d9060b6f754668f756bf2dc7409e07eabdfe72e6012206b33a1294f762532595c3d2a0926b8307ca731a3810fdfb6aad080400f3f78c4f7d042fcc1e7631b92d62acc45fe3e7ee1838ea1503a626accf24fb8676778d5a37ac768437a7a4e28880b2f194a1a91cf5bc931a2f44b573f5347e3b62f477410d7d18df28e31f090a61a557d", 0xf7, 0x0, &(0x7f0000000280)={0x2, 0x127, {0x0, 0xc, 0xee, "c7565ea82482f98b5687243b86f792c61133e522a678fe8071794b6beae00802d72f74e0565f2f5d7960300113a610a3c3a246d88e400234321af706a030956dfca4a02e7938b87be353c8e5d0a71e2624128eb46dce40b2321b09434fa1f0e536fd376998a52d0023ddc1488bc49e5d89199c47d83cf717e26bbe15c0b650904875f4aad44b88710a0d66edd49e6d17eb08da63b34d96c4d179296c1582c7d51b12335b20397692e38a299c197d2de11e599229860362d0bb2d1f45e1c29f6bd58543ea8b41e7b1809568add161d0b275b8c98982f8d25fb6d1f3a77561255988f845c16ca507b9f83bc2865006", 0x2c, "407db6224d7be7854b7eb3b2bf91265cb833d556146532a44a855ef915ae1ceaf4ecc1461a4bccd69ccf9929"}, 0x72, "4d87f09cd8685d1ebe44440be555dc2ccf5ed4d209259ec6f41cb802bf7b6e540c9d81e0ccbb9044467136d42f8f5d8bbeb757728a8e8a834ffda51cccd35ddaee43134c5f4b29640f7f7c61ad75e736ba9adc82771c37073957401ec1999d8780d039efc3d2046e207044c02a7a13b52df6"}, 0x1a5}) r1 = io_uring_setup(0x633a, &(0x7f0000000040)) r2 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000002840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r3 = dup3(r2, r1, 0x0) recvmmsg(r3, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}], 0x600, 0x2, 0x0) linkat(r3, &(0x7f0000000480)='./file0\x00', 0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x0) [ 63.274141][ T5229] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 63.276146][ T5229] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 63.277694][ T5229] A link change request failed with some changes committed already. Interface sit0 may have been left with an inconsistent configuration, please check. [ 63.285688][ T5231] loop3: detected capacity change from 0 to 65608 [ 63.290750][ T5231] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 115646289543168)! [ 63.292912][ T5231] EXT4-fs (loop3): group descriptors corrupted! [ 63.347268][ T5240] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 63.349331][ T5240] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 63.351067][ T5240] A link change request failed with some changes committed already. Interface sit0 may have been left with an inconsistent configuration, please check. 16:10:26 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) accept4$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4}, &(0x7f0000000080)=0x1c, 0x80000) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 63.476494][ T5252] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 63.477897][ T5252] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 63.479716][ T5252] A link change request failed with some changes committed already. Interface sit0 may have been left with an inconsistent configuration, please check. 16:10:26 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:26 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 63.588422][ T5259] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 63.590174][ T5259] A link change request failed with some changes committed already. Interface sit0 may have been left with an inconsistent configuration, please check. [ 63.595794][ T5257] loop3: detected capacity change from 0 to 65608 [ 63.599700][ T5257] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 115646289543168)! [ 63.601612][ T5257] EXT4-fs (loop3): group descriptors corrupted! [ 63.639106][ T5265] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 63.640698][ T5265] A link change request failed with some changes committed already. Interface sit0 may have been left with an inconsistent configuration, please check. 16:10:27 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2d5}], 0x1}, 0x0) 16:10:27 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200001, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:27 executing program 0: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./bus\x00', 0x0) io_setup(0x202, &(0x7f0000000200)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f0000000140)={0x15, 0x0, 0x0, 0x1, 0x1, r2}]) open(&(0x7f0000000000)='./bus\x00', 0x10e40, 0x100) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) io_setup(0x800, &(0x7f0000000180)) io_setup(0x28, &(0x7f0000000300)=0x0) io_getevents(r5, 0x6a35, 0x0, &(0x7f0000000480), &(0x7f00000002c0)={0x77359400}) write$binfmt_script(r4, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1a, 0x28011, r4, 0x835f6000) fcntl$setstatus(r1, 0x4, 0x4400) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0xffff5444, &(0x7f0000000340)=0x0) preadv(r1, &(0x7f0000000400)=[{&(0x7f0000000580)=""/4096, 0x1000}], 0x1, 0x0, 0x0) r7 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040), 0x301000, 0x0) close(r4) ioctl$PTP_SYS_OFFSET_PRECISE(r7, 0xc0403d08, &(0x7f0000000080)) io_submit(r6, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0xf04a00, 0x300, 0x4, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 16:10:27 executing program 2: pipe2$9p(&(0x7f0000000440), 0x1800) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000cc0)={&(0x7f0000000000), 0xc, &(0x7f0000000c40)=[{&(0x7f0000000140)={0x28, 0x1d, 0x1, 0x0, 0x0, "", [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @pid}]}, @nested={0x4}, @typed={0x8, 0x0, 0x0, 0x0, @pid}]}, 0x28}, {&(0x7f0000001d80)={0x24, 0x2d, 0x1, 0x0, 0x0, "", [@generic="27f2d52ac200eac2849700abe39605121d"]}, 0x24}], 0x2}, 0x0) ioctl$INCFS_IOC_CREATE_FILE(r0, 0xc058671e, &(0x7f00000000c0)={{'\x00', 0x3}, {0xe6}, 0x9e, 0x0, 0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)="284dbd75f7413eca2f916ba3e619a9f74b79e5ce6f932940fbe4d755fcbb32dc66a935bd96e4782cddbfbbfef577a53d5691b8107e8d1837a0f60d7d38d35693987689f57fc7760afb37c9b273e7b1a185af7158a766d9bdad859eb40e848e0efe3c5d358558307d137a65477e75fcee12f4b96d9060b6f754668f756bf2dc7409e07eabdfe72e6012206b33a1294f762532595c3d2a0926b8307ca731a3810fdfb6aad080400f3f78c4f7d042fcc1e7631b92d62acc45fe3e7ee1838ea1503a626accf24fb8676778d5a37ac768437a7a4e28880b2f194a1a91cf5bc931a2f44b573f5347e3b62f477410d7d18df28e31f090a61a557d", 0xf7, 0x0, &(0x7f0000000280)={0x2, 0x127, {0x0, 0xc, 0xee, "c7565ea82482f98b5687243b86f792c61133e522a678fe8071794b6beae00802d72f74e0565f2f5d7960300113a610a3c3a246d88e400234321af706a030956dfca4a02e7938b87be353c8e5d0a71e2624128eb46dce40b2321b09434fa1f0e536fd376998a52d0023ddc1488bc49e5d89199c47d83cf717e26bbe15c0b650904875f4aad44b88710a0d66edd49e6d17eb08da63b34d96c4d179296c1582c7d51b12335b20397692e38a299c197d2de11e599229860362d0bb2d1f45e1c29f6bd58543ea8b41e7b1809568add161d0b275b8c98982f8d25fb6d1f3a77561255988f845c16ca507b9f83bc2865006", 0x2c, "407db6224d7be7854b7eb3b2bf91265cb833d556146532a44a855ef915ae1ceaf4ecc1461a4bccd69ccf9929"}, 0x72, "4d87f09cd8685d1ebe44440be555dc2ccf5ed4d209259ec6f41cb802bf7b6e540c9d81e0ccbb9044467136d42f8f5d8bbeb757728a8e8a834ffda51cccd35ddaee43134c5f4b29640f7f7c61ad75e736ba9adc82771c37073957401ec1999d8780d039efc3d2046e207044c02a7a13b52df6"}, 0x1a5}) r1 = io_uring_setup(0x633a, &(0x7f0000000040)) r2 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000002840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r3 = dup3(r2, r1, 0x0) recvmmsg(r3, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}], 0x600, 0x2, 0x0) linkat(r3, &(0x7f0000000480)='./file0\x00', 0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x0) 16:10:27 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:27 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x2c, 0x0, 0x3) r4 = openat$bsg(0xffffffffffffff9c, 0x0, 0x0, 0x0) setreuid(0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000900)) setreuid(0x0, 0x0) sendmsg$TIPC_NL_SOCK_GET(r4, &(0x7f00000007c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4008000}, 0x4040000) r5 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) sched_setattr(0x0, 0x0, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendfile(r5, r6, 0x0, 0x401ffc000) 16:10:27 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:27 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200001, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 64.144926][ T5276] loop3: detected capacity change from 0 to 65608 [ 64.147858][ T5276] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 115646289543168)! [ 64.149879][ T5276] EXT4-fs (loop3): group descriptors corrupted! [ 64.164092][ T5285] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. 16:10:27 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 64.199128][ T5293] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. 16:10:27 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 64.257119][ T5298] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. 16:10:27 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 64.323590][ T5302] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1555 sclass=netlink_route_socket pid=5302 comm=syz-executor.5 16:10:27 executing program 2: pipe2$9p(&(0x7f0000000440), 0x1800) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000cc0)={&(0x7f0000000000), 0xc, &(0x7f0000000c40)=[{&(0x7f0000000140)={0x28, 0x1d, 0x1, 0x0, 0x0, "", [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @pid}]}, @nested={0x4}, @typed={0x8, 0x0, 0x0, 0x0, @pid}]}, 0x28}, {&(0x7f0000001d80)={0x24, 0x2d, 0x1, 0x0, 0x0, "", [@generic="27f2d52ac200eac2849700abe39605121d"]}, 0x24}], 0x2}, 0x0) ioctl$INCFS_IOC_CREATE_FILE(r0, 0xc058671e, &(0x7f00000000c0)={{'\x00', 0x3}, {0xe6}, 0x9e, 0x0, 0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)="284dbd75f7413eca2f916ba3e619a9f74b79e5ce6f932940fbe4d755fcbb32dc66a935bd96e4782cddbfbbfef577a53d5691b8107e8d1837a0f60d7d38d35693987689f57fc7760afb37c9b273e7b1a185af7158a766d9bdad859eb40e848e0efe3c5d358558307d137a65477e75fcee12f4b96d9060b6f754668f756bf2dc7409e07eabdfe72e6012206b33a1294f762532595c3d2a0926b8307ca731a3810fdfb6aad080400f3f78c4f7d042fcc1e7631b92d62acc45fe3e7ee1838ea1503a626accf24fb8676778d5a37ac768437a7a4e28880b2f194a1a91cf5bc931a2f44b573f5347e3b62f477410d7d18df28e31f090a61a557d", 0xf7, 0x0, &(0x7f0000000280)={0x2, 0x127, {0x0, 0xc, 0xee, "c7565ea82482f98b5687243b86f792c61133e522a678fe8071794b6beae00802d72f74e0565f2f5d7960300113a610a3c3a246d88e400234321af706a030956dfca4a02e7938b87be353c8e5d0a71e2624128eb46dce40b2321b09434fa1f0e536fd376998a52d0023ddc1488bc49e5d89199c47d83cf717e26bbe15c0b650904875f4aad44b88710a0d66edd49e6d17eb08da63b34d96c4d179296c1582c7d51b12335b20397692e38a299c197d2de11e599229860362d0bb2d1f45e1c29f6bd58543ea8b41e7b1809568add161d0b275b8c98982f8d25fb6d1f3a77561255988f845c16ca507b9f83bc2865006", 0x2c, "407db6224d7be7854b7eb3b2bf91265cb833d556146532a44a855ef915ae1ceaf4ecc1461a4bccd69ccf9929"}, 0x72, "4d87f09cd8685d1ebe44440be555dc2ccf5ed4d209259ec6f41cb802bf7b6e540c9d81e0ccbb9044467136d42f8f5d8bbeb757728a8e8a834ffda51cccd35ddaee43134c5f4b29640f7f7c61ad75e736ba9adc82771c37073957401ec1999d8780d039efc3d2046e207044c02a7a13b52df6"}, 0x1a5}) r1 = io_uring_setup(0x633a, &(0x7f0000000040)) r2 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000002840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r3 = dup3(r2, r1, 0x0) recvmmsg(r3, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}], 0x600, 0x2, 0x0) linkat(r3, &(0x7f0000000480)='./file0\x00', 0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x0) [ 64.475646][ T5306] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1555 sclass=netlink_route_socket pid=5306 comm=syz-executor.5 [ 64.496500][ T5308] loop3: detected capacity change from 0 to 65608 [ 64.498788][ T5308] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 115646289543168)! [ 64.500632][ T5308] EXT4-fs (loop3): group descriptors corrupted! 16:10:28 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2d5}], 0x1}, 0x0) 16:10:28 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:28 executing program 2: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) accept4$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4}, &(0x7f0000000080)=0x1c, 0x80000) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:28 executing program 0: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./bus\x00', 0x0) io_setup(0x202, &(0x7f0000000200)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f0000000140)={0x15, 0x0, 0x0, 0x1, 0x1, r2}]) open(&(0x7f0000000000)='./bus\x00', 0x10e40, 0x100) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) io_setup(0x800, &(0x7f0000000180)) io_setup(0x28, &(0x7f0000000300)=0x0) io_getevents(r5, 0x6a35, 0x0, &(0x7f0000000480), &(0x7f00000002c0)={0x77359400}) write$binfmt_script(r4, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1a, 0x28011, r4, 0x835f6000) fcntl$setstatus(r1, 0x4, 0x4400) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0xffff5444, &(0x7f0000000340)=0x0) preadv(r1, &(0x7f0000000400)=[{&(0x7f0000000580)=""/4096, 0x1000}], 0x1, 0x0, 0x0) r7 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040), 0x301000, 0x0) close(r4) ioctl$PTP_SYS_OFFSET_PRECISE(r7, 0xc0403d08, &(0x7f0000000080)) io_submit(r6, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0xf04a00, 0x300, 0x4, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 16:10:28 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200001, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:28 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x2c, 0x0, 0x3) r4 = openat$bsg(0xffffffffffffff9c, 0x0, 0x0, 0x0) setreuid(0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000900)) setreuid(0x0, 0x0) sendmsg$TIPC_NL_SOCK_GET(r4, &(0x7f00000007c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4008000}, 0x4040000) r5 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) sched_setattr(0x0, 0x0, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendfile(r5, r6, 0x0, 0x401ffc000) 16:10:28 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d09a0e63c9476288b671afdbd53a5994e137381f62021d1951b627b8dda57a5d17d744648c81c5703ed8146ab1b0171f89091b1dd3238d03dbb686df460963245dedf2013ee555af99499e44ad420dbf65fd46fbc99a1274429e2d5783751815828ec8cb3553110cca66460215353d19f6d8bbd8fb264eddea60b18e16c31aa5e200000491634ac2fd10e2cd30bcd7fede24263a7fff16e53ea293f3551b7147c33a44ea437fb1515c3e8d4f162fdebf8ebe11ae6fcd9372c8d8f19556ae091fe94215ae9434da412f6fa4cb6561e5f78ff9707844ee5d573fb294437722d9a06dfa61748c32c73d759933a8dd344c947d3efdbe90d0eb049df5fbb0c19f6785264b619c530d97395d44b04f7e2a280d658c7871ad373b792678c49227999651ef3b2ee1bc2b8f3035db376e8e09aa3837233c8713065a8ad131d24f6c42a3220d0e07c3d3e95d59a5dd10c09716b5f874ecf53aadfa5050ff40f2c3c4a629b6445e5836100afff5a8977583653b40ca316f8f11416e5c1bd5499636ddae25fc4970b37209cf5c0bf8e432160c258d14223baa52798e09858645773dd97e68a9531072713cff077b2e73e03ed4f145e9199c126a7f235e5674a3c7f5c7129ac7c1a3319590249b6d34ef6c3d8b94c6fc7cdcbddb053243053f7bc1f230d3bc7dfc4359e33992d0a3946b914a093287a76ac4a249b5b86cc75476466e409553355fefab75e9268a8751ffc9481fcff1f49c475699595b315e2147eebe8b7291600c6b1cf7c8f24d587b9464a67e5ccec17820e711b98f4f7d5053642068a3fff704c3fe35ba862b53e2622d6e8b4a4c815fb2ea90ef63e141209dd29254e5ab5bde9c6857b3cb184586049e7741b2d8b5b1a19e99e1834a25959155720c1c0ef84d9d3c42e1ba282847d476cef0228b1422aba08e5f3c1cd279bbd1c5303c2e9c16a0da4f88f770fca118b09e92b51a33970e32ade0c74eee1b31a420d7914c9d75db25855ae32798edc1b47e0f0f88429b2b60ae63", 0x2d5}], 0x1}, 0x0) 16:10:28 executing program 2: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) accept4$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4}, &(0x7f0000000080)=0x1c, 0x80000) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:28 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 65.033768][ T5325] loop3: detected capacity change from 0 to 65608 [ 65.037339][ T5330] A link change request failed with some changes committed already. Interface sit0 may have been left with an inconsistent configuration, please check. [ 65.045129][ T5325] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 115646289543168)! [ 65.046961][ T5325] EXT4-fs (loop3): group descriptors corrupted! [ 65.049773][ T5331] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1555 sclass=netlink_route_socket pid=5331 comm=syz-executor.5 16:10:28 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:28 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200001, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:28 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 65.239287][ T5344] A link change request failed with some changes committed already. Interface sit0 may have been left with an inconsistent configuration, please check. 16:10:28 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2d5}], 0x1}, 0x0) 16:10:28 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d09a0e63c9476288b671afdbd53a5994e137381f62021d1951b627b8dda57a5d17d744648c81c5703ed8146ab1b0171f89091b1dd3238d03dbb686df460963245dedf2013ee555af99499e44ad420dbf65fd46fbc99a1274429e2d5783751815828ec8cb3553110cca66460215353d19f6d8bbd8fb264eddea60b18e16c31aa5e200000491634ac2fd10e2cd30bcd7fede24263a7fff16e53ea293f3551b7147c33a44ea437fb1515c3e8d4f162fdebf8ebe11ae6fcd9372c8d8f19556ae091fe94215ae9434da412f6fa4cb6561e5f78ff9707844ee5d573fb294437722d9a06dfa61748c32c73d759933a8dd344c947d3efdbe90d0eb049df5fbb0c19f6785264b619c530d97395d44b04f7e2a280d658c7871ad373b792678c49227999651ef3b2ee1bc2b8f3035db376e8e09aa3837233c8713065a8ad131d24f6c42a3220d0e07c3d3e95d59a5dd10c09716b5f874ecf53aadfa5050ff40f2c3c4a629b6445e5836100afff5a8977583653b40ca316f8f11416e5c1bd5499636ddae25fc4970b37209cf5c0bf8e432160c258d14223baa52798e09858645773dd97e68a9531072713cff077b2e73e03ed4f145e9199c126a7f235e5674a3c7f5c7129ac7c1a3319590249b6d34ef6c3d8b94c6fc7cdcbddb053243053f7bc1f230d3bc7dfc4359e33992d0a3946b914a093287a76ac4a249b5b86cc75476466e409553355fefab75e9268a8751ffc9481fcff1f49c475699595b315e2147eebe8b7291600c6b1cf7c8f24d587b9464a67e5ccec17820e711b98f4f7d5053642068a3fff704c3fe35ba862b53e2622d6e8b4a4c815fb2ea90ef63e141209dd29254e5ab5bde9c6857b3cb184586049e7741b2d8b5b1a19e99e1834a25959155720c1c0ef84d9d3c42e1ba282847d476cef0228b1422aba08e5f3c1cd279bbd1c5303c2e9c16a0da4f88f770fca118b09e92b51a33970e32ade0c74eee1b31a420d7914c9d75db25855ae32798edc1b47e0f0f88429b2b60ae63", 0x2d5}], 0x1}, 0x0) 16:10:28 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200001, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 65.370730][ T5354] loop3: detected capacity change from 0 to 65608 [ 65.385933][ T5354] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 115646289543168)! [ 65.387814][ T5354] EXT4-fs (loop3): group descriptors corrupted! 16:10:28 executing program 0: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) accept4$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4}, &(0x7f0000000080)=0x1c, 0x80000) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:28 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 65.463214][ T5372] loop3: detected capacity change from 0 to 65608 [ 65.465252][ T5372] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 115646289543168)! [ 65.467353][ T5372] EXT4-fs (loop3): group descriptors corrupted! [ 65.483873][ T5379] A link change request failed with some changes committed already. Interface sit0 may have been left with an inconsistent configuration, please check. 16:10:29 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x2c, 0x0, 0x3) r4 = openat$bsg(0xffffffffffffff9c, 0x0, 0x0, 0x0) setreuid(0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000900)) setreuid(0x0, 0x0) sendmsg$TIPC_NL_SOCK_GET(r4, &(0x7f00000007c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4008000}, 0x4040000) r5 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) sched_setattr(0x0, 0x0, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendfile(r5, r6, 0x0, 0x401ffc000) 16:10:29 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2d5}], 0x1}, 0x0) 16:10:29 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:29 executing program 0: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:29 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200001, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:29 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200001, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:29 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) fcntl$getflags(r1, 0x408) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) fcntl$getflags(r2, 0x408) dup2(r1, r2) fcntl$setstatus(r0, 0x4, 0x6000) io_setup(0x202, &(0x7f00000003c0)=0x0) r4 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000040)) ftruncate(r4, 0x2008000) write(r4, &(0x7f0000000400)="86", 0x1) io_submit(r3, 0x3b, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x16000}]) 16:10:29 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:29 executing program 5: sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 65.942991][ T5395] loop3: detected capacity change from 0 to 65608 [ 65.945512][ T5395] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 115646289543168)! [ 65.946193][ T5398] loop2: detected capacity change from 0 to 65608 [ 65.947306][ T5395] EXT4-fs (loop3): group descriptors corrupted! [ 65.951792][ T5398] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 115646289543168)! [ 65.953560][ T5398] EXT4-fs (loop2): group descriptors corrupted! 16:10:29 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2d5}], 0x1}, 0x0) 16:10:29 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2d5}], 0x1}, 0x0) 16:10:29 executing program 5: sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:30 executing program 4: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) fcntl$getflags(r1, 0x408) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) fcntl$getflags(r2, 0x408) dup2(r1, r2) fcntl$setstatus(r0, 0x4, 0x6000) io_setup(0x202, &(0x7f00000003c0)=0x0) r4 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000040)) ftruncate(r4, 0x2008000) write(r4, &(0x7f0000000400)="86", 0x1) io_submit(r3, 0x3b, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x16000}]) 16:10:30 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200001, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:30 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2d5}], 0x1}, 0x0) 16:10:30 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x200001, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:30 executing program 5: sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:30 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) fcntl$getflags(r1, 0x408) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) fcntl$getflags(r2, 0x408) dup2(r1, r2) fcntl$setstatus(r0, 0x4, 0x6000) io_setup(0x202, &(0x7f00000003c0)=0x0) r4 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000040)) ftruncate(r4, 0x2008000) write(r4, &(0x7f0000000400)="86", 0x1) io_submit(r3, 0x3b, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x16000}]) 16:10:30 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200001, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:30 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:30 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x200001, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:30 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 66.813353][ T5446] loop2: detected capacity change from 0 to 65608 [ 66.822453][ T5450] loop3: detected capacity change from 0 to 65608 [ 66.825735][ T5446] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 115646289543168)! [ 66.827750][ T5446] EXT4-fs (loop2): group descriptors corrupted! 16:10:30 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2d5}], 0x1}, 0x0) 16:10:30 executing program 4: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) fcntl$getflags(r1, 0x408) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) fcntl$getflags(r2, 0x408) dup2(r1, r2) fcntl$setstatus(r0, 0x4, 0x6000) io_setup(0x202, &(0x7f00000003c0)=0x0) r4 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000040)) ftruncate(r4, 0x2008000) write(r4, &(0x7f0000000400)="86", 0x1) io_submit(r3, 0x3b, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x16000}]) 16:10:30 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:30 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200001, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:30 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200001, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 66.915411][ T5473] loop2: detected capacity change from 0 to 65608 [ 66.931011][ T5473] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 115646289543168)! [ 66.932927][ T5473] EXT4-fs (loop2): group descriptors corrupted! 16:10:30 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, 0x0}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:30 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, 0x0}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2d5}], 0x1}, 0x0) [ 66.966502][ T5480] loop3: detected capacity change from 0 to 65608 16:10:30 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, 0x0}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:30 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2d5}], 0x1}, 0x0) 16:10:30 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x200001, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:30 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2d5}], 0x1}, 0x0) 16:10:30 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={0x0, 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:30 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200001, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 67.061254][ T5504] loop2: detected capacity change from 0 to 65608 [ 67.063694][ T5504] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 115646289543168)! [ 67.065493][ T5504] EXT4-fs (loop2): group descriptors corrupted! 16:10:30 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={0x0, 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x200001, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:30 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.memory_pressure\x00', 0x275a, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x1, 0x2010, r0, 0x0) ftruncate(r0, 0x8001) r1 = socket$packet(0x11, 0x3, 0x300) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) fcntl$getflags(r2, 0x408) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x8, 0x5, 0xff, 0x1}]}, 0x10) r3 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendfile(r2, r3, &(0x7f0000000040)=0xdab9, 0x5) getsockopt$packet_int(r1, 0x107, 0xf, 0x0, &(0x7f00000004c0)) ioctl$CHAR_RAW_PBSZGET(r0, 0x127b, &(0x7f0000000000)) 16:10:30 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={0x0, 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 67.138954][ T5525] loop2: detected capacity change from 0 to 65608 [ 67.140057][ T5527] loop3: detected capacity change from 0 to 65608 [ 67.149823][ T5525] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 115646289543168)! [ 67.151763][ T5525] EXT4-fs (loop2): group descriptors corrupted! 16:10:30 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200001, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:30 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x200001, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:30 executing program 1: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2d5}], 0x1}, 0x0) 16:10:30 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x4e22, 0x8, @ipv4={'\x00', '\xff\xff', @private=0xa010100}, 0x8f}, {0xa, 0x4e20, 0x1, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010101}, 0x7}, 0x2, [0xa4, 0x5, 0x8, 0x7, 0x2, 0x2, 0x8]}, 0x5c) splice(r0, &(0x7f00000000c0)=0x9, r0, &(0x7f0000000100)=0x2, 0x3f, 0x2) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000080)={0x0, 0xffffffab, 0x0, 0x2c00}, 0x0) setsockopt$inet6_int(r1, 0x29, 0x0, &(0x7f0000000080)=0x2, 0x4) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240), 0x200, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x40806685, &(0x7f0000000300)={0x1, 0x0, 0x1000, 0x0, &(0x7f0000000280), 0xd, 0x0, &(0x7f00000002c0)="8bc8a9620e38247b856511cc53"}) sendmmsg$inet6(r0, &(0x7f0000000140)=[{{&(0x7f0000000000)={0xa, 0x4e22, 0x0, @empty}, 0x1c, 0x0}}, {{&(0x7f0000000040)={0xa, 0x4e22, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7ae4}, 0x1c, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="24000000000000002900000032000000ff05000000000000f40000000000000185babf633f079a26f797262eb5e7056937cb8422c8df608e2a21942e3332b4785fd6905edddda65e107ca617da9ab6c2f4594532fde752394b0277505bcbcbd9829a313938fd831d00d2af4101bbcdb8d4de8315f75921916c0a22e09532437775543bbcea2d1db0c065125618ca372560d7099d2ff3c765dc4b3148f442d2816ea39fe9d8e0769ec696f82db8f1ccafbcb7126d45dc8bba98423d873188d22ab0f914af45858fb725c04c4dd7c44343d8a25e941b169664db88ea6e930181953d433dbca2fb8518debfbfc9fa5f8b", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x28}}], 0x0, 0x0) 16:10:30 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 67.224543][ T5535] loop4: detected capacity change from 0 to 65608 16:10:30 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x28011, r0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100)=@v1={0x2, "525cbd8ebe478402f6103fb068"}, 0xe, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, &(0x7f0000000980)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)={0x20, r4, 0x1, 0x0, 0x0, {0x14}, [@ETHTOOL_A_DEBUG_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}]}]}, 0x20}}, 0x0) sendfile(r3, r2, 0x0, 0x7ffff000) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) fcntl$getflags(r5, 0x408) preadv(r5, &(0x7f0000000740)=[{&(0x7f0000000200)=""/186, 0xba}, {&(0x7f0000000400)=""/226, 0xe2}, {&(0x7f00000009c0)=""/4096, 0x1000}, {&(0x7f0000000500)=""/240, 0xf0}, {&(0x7f0000000300)=""/161, 0xa1}, {&(0x7f0000000140)=""/84, 0x54}, {&(0x7f0000000600)=""/59, 0x3b}, {&(0x7f00000019c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/214, 0xd6}], 0x9, 0x9, 0x5) 16:10:30 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:30 executing program 0: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000080)={0x0, 0xffffffab, 0x0, 0x2c00}, 0x0) r2 = accept4$unix(0xffffffffffffffff, &(0x7f0000000540), &(0x7f00000005c0)=0x6e, 0x80000) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r3, &(0x7f0000000080)={0x0, 0xffffffab, 0x0, 0x2c00}, 0x0) bind(r2, &(0x7f0000000600)=@pppol2tpv3in6={0x18, 0x1, {0x0, r3, 0x3, 0x4, 0x1, 0x4, {0xa, 0x4e20, 0xfffffffa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x101}}}, 0x80) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000440)={'syztnl1\x00', 0x0, 0x29, 0x7, 0x1f, 0x7ff, 0xc, @remote, @private2={0xfc, 0x2, '\x00', 0x1}, 0x20, 0x57, 0x80000000, 0x80000001}}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000004c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private2, @mcast2, 0x3, 0x0, 0x2, 0x100, 0x6, 0x4000110, r4}) write(r0, &(0x7f0000000140)='/', 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x12, r0, 0x0) r5 = socket(0x20000000000000a, 0x2, 0x0) getsockopt$inet6_buf(r5, 0x11, 0x67, 0x0, &(0x7f0000000080)) preadv(r0, &(0x7f00000003c0)=[{&(0x7f0000000180)=""/148, 0x94}, {&(0x7f0000000240)=""/174, 0xae}, {&(0x7f0000000000)=""/71, 0x47}, {&(0x7f00000000c0)=""/3, 0x3}, {&(0x7f0000000300)=""/154, 0x9a}], 0x5, 0x1d, 0x929e) 16:10:30 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x200001, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 67.294398][ T5559] loop2: detected capacity change from 0 to 65608 [ 67.296980][ T5559] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 115646289543168)! [ 67.299388][ T5559] EXT4-fs (loop2): group descriptors corrupted! [ 67.315975][ T5563] loop3: detected capacity change from 0 to 65608 16:10:30 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x200001, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:30 executing program 1: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d09a0e63c9476288b671afdbd53a5994e137381f62021d1951b627b8dda57a5d17d744648c81c5703ed8146ab1b0171f89091b1dd3238d03dbb686df460963245dedf2013ee555af99499e44ad420dbf65fd46fbc99a1274429e2d5783751815828ec8cb3553110cca66460215353d19f6d8bbd8fb264eddea60b18e16c31aa5e200000491634ac2fd10e2cd30bcd7fede24263a7fff16e53ea293f3551b7147c33a44ea437fb1515c3e8d4f162fdebf8ebe11ae6fcd9372c8d8f19556ae091fe94215ae9434da412f6fa4cb6561e5f78ff9707844ee5d573fb294437722d9a06dfa61748c32c73d759933a8dd344c947d3efdbe90d0eb049df5fbb0c19f6785264b619c530d97395d44b04f7e2a280d658c7871ad373b792678c49227999651ef3b2ee1bc2b8f3035db376e8e09aa3837233c8713065a8ad131d24f6c42a3220d0e07c3d3e95d59a5dd10c09716b5f874ecf53aadfa5050ff40f2c3c4a629b6445e5836100afff5a8977583653b40ca316f8f11416e5c1bd5499636ddae25fc4970b37209cf5c0bf8e432160c258d14223baa52798e09858645773dd97e68a9531072713cff077b2e73e03ed4f145e9199c126a7f235e5674a3c7f5c7129ac7c1a3319590249b6d34ef6c3d8b94c6fc7cdcbddb053243053f7bc1f230d3bc7dfc4359e33992d0a3946b914a093287a76ac4a249b5b86cc75476466e409553355fefab75e9268a8751ffc9481fcff1f49c475699595b315e2147eebe8b7291600c6b1cf7c8f24d587b9464a67e5ccec17820e711b98f4f7d5053642068a3fff704c3fe35ba862b53e2622d6e8b4a4c815fb2ea90ef63e141209dd29254e5ab5bde9c6857b3cb184586049e7741b2d8b5b1a19e99e1834a25959155720c1c0ef84d9d3c42e1ba282847d476cef0228b1422aba08e5f3c1cd279bbd1c5303c2e9c16a0da4f88f770fca118b09e92b51a33970e32ade0c74eee1b31a420d7914c9d75db25855ae32798edc1b47e0f0f88429b2b60ae63", 0x2d5}], 0x1}, 0x0) 16:10:30 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 67.385622][ T5587] loop2: detected capacity change from 0 to 65608 16:10:30 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x200001, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:30 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x80000, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x7, &(0x7f0000000080)=0x10001, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000240)=[@mss={0x2, 0x10001}], 0x1) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000200)) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000100)={'raw\x00', 0x0, [0x0, 0x0, 0x2, 0x0, 0x8]}, &(0x7f0000000180)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, 0x0, &(0x7f00000001c0)) [ 67.411727][ T5581] loop3: detected capacity change from 0 to 65608 16:10:30 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x200001, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:30 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:30 executing program 1: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d09a0e63c9476288b671afdbd53a5994e137381f62021d1951b627b8dda57a5d17d744648c81c5703ed8146ab1b0171f89091b1dd3238d03dbb686df460963245dedf2013ee555af99499e44ad420dbf65fd46fbc99a1274429e2d5783751815828ec8cb3553110cca66460215353d19f6d8bbd8fb264eddea60b18e16c31aa5e200000491634ac2fd10e2cd30bcd7fede24263a7fff16e53ea293f3551b7147c33a44ea437fb1515c3e8d4f162fdebf8ebe11ae6fcd9372c8d8f19556ae091fe94215ae9434da412f6fa4cb6561e5f78ff9707844ee5d573fb294437722d9a06dfa61748c32c73d759933a8dd344c947d3efdbe90d0eb049df5fbb0c19f6785264b619c530d97395d44b04f7e2a280d658c7871ad373b792678c49227999651ef3b2ee1bc2b8f3035db376e8e09aa3837233c8713065a8ad131d24f6c42a3220d0e07c3d3e95d59a5dd10c09716b5f874ecf53aadfa5050ff40f2c3c4a629b6445e5836100afff5a8977583653b40ca316f8f11416e5c1bd5499636ddae25fc4970b37209cf5c0bf8e432160c258d14223baa52798e09858645773dd97e68a9531072713cff077b2e73e03ed4f145e9199c126a7f235e5674a3c7f5c7129ac7c1a3319590249b6d34ef6c3d8b94c6fc7cdcbddb053243053f7bc1f230d3bc7dfc4359e33992d0a3946b914a093287a76ac4a249b5b86cc75476466e409553355fefab75e9268a8751ffc9481fcff1f49c475699595b315e2147eebe8b7291600c6b1cf7c8f24d587b9464a67e5ccec17820e711b98f4f7d5053642068a3fff704c3fe35ba862b53e2622d6e8b4a4c815fb2ea90ef63e141209dd29254e5ab5bde9c6857b3cb184586049e7741b2d8b5b1a19e99e1834a25959155720c1c0ef84d9d3c42e1ba282847d476cef0228b1422aba08e5f3c1cd279bbd1c5303c2e9c16a0da4f88f770fca118b09e92b51a33970e32ade0c74eee1b31a420d7914c9d75db25855ae32798edc1b47e0f0f88429b2b60ae63", 0x2d5}], 0x1}, 0x0) [ 67.472462][ T5606] loop3: detected capacity change from 0 to 65608 [ 67.503281][ T5614] __nla_validate_parse: 23 callbacks suppressed [ 67.503292][ T5614] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.5'. 16:10:30 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x800, 0x0, 0x0, 0x0, 0xff, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x2b, 0xe, 0x0, 0x0) 16:10:30 executing program 0: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb3c906d6b66616166617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='nonumtail']) mkdir(&(0x7f0000000040)='./file0\x00', 0x24) 16:10:30 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:30 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 67.532911][ T5619] loop2: detected capacity change from 0 to 65608 16:10:30 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 67.560218][ T5629] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.5'. 16:10:30 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x200001, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:30 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:30 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2d5}], 0x1}, 0x0) [ 67.591404][ T5635] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.5'. [ 67.610516][ T5636] loop3: detected capacity change from 0 to 65608 16:10:30 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0x7, 0x8000) r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000000)={{0x77359400}}, &(0x7f0000000080)) 16:10:30 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 67.640330][ T5636] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 115646289543168)! [ 67.642169][ T5636] EXT4-fs (loop3): group descriptors corrupted! [ 67.643943][ T5644] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.5'. 16:10:30 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x3}, 0x0) r0 = getpid() r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x5, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x1}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x3, 0x28, 0x5, 0x1ff, 0xfffffffffffffff9, 0x7, 0x3, 0x7, 0x7fff}, 0x0) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ftruncate(0xffffffffffffffff, 0x4) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x7c, 0x5, 0x3, 0x4, 0x0, 0xfffffffe, 0x20800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x80, 0x7}, 0x3040, 0x400, 0xfffffffd, 0x4, 0x1, 0x8, 0x0, 0x0, 0x10000800, 0x0, 0x5}, 0x0, 0x5, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) sendfile(r4, r4, &(0x7f0000000000)=0x7, 0x3) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000240)={0x0, 0x3, 0x0, 0x0, 0x40, "00000000000000000000000000ddc1517600"}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x2) 16:10:30 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 67.677524][ T5651] loop2: detected capacity change from 0 to 65608 16:10:30 executing program 4: r0 = syz_io_uring_setup(0x6ad4, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_FADVISE={0x18, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000180)=@IORING_OP_POLL_REMOVE={0x7, 0x2}, 0xfff) open(&(0x7f0000000000)='./bus\x00', 0x103842, 0x0) r3 = open(&(0x7f0000000280)='./bus\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r3, 0x0, &(0x7f0000000500)=[{&(0x7f0000000100)=""/20, 0x14}], 0x3a}, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000000)="d3", 0x1}], 0x1, 0x0, 0xc2c) io_uring_enter(r0, 0x2b66, 0x0, 0x0, 0x0, 0x5e) 16:10:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x200001, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:30 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d09a0e63c9476288b671afdbd53a5994e137381f62021d1951b627b8dda57a5d17d744648c81c5703ed8146ab1b0171f89091b1dd3238d03dbb686df460963245dedf2013ee555af99499e44ad420dbf65fd46fbc99a1274429e2d5783751815828ec8cb3553110cca66460215353d19f6d8bbd8fb264eddea60b18e16c31aa5e200000491634ac2fd10e2cd30bcd7fede24263a7fff16e53ea293f3551b7147c33a44ea437fb1515c3e8d4f162fdebf8ebe11ae6fcd9372c8d8f19556ae091fe94215ae9434da412f6fa4cb6561e5f78ff9707844ee5d573fb294437722d9a06dfa61748c32c73d759933a8dd344c947d3efdbe90d0eb049df5fbb0c19f6785264b619c530d97395d44b04f7e2a280d658c7871ad373b792678c49227999651ef3b2ee1bc2b8f3035db376e8e09aa3837233c8713065a8ad131d24f6c42a3220d0e07c3d3e95d59a5dd10c09716b5f874ecf53aadfa5050ff40f2c3c4a629b6445e5836100afff5a8977583653b40ca316f8f11416e5c1bd5499636ddae25fc4970b37209cf5c0bf8e432160c258d14223baa52798e09858645773dd97e68a9531072713cff077b2e73e03ed4f145e9199c126a7f235e5674a3c7f5c7129ac7c1a3319590249b6d34ef6c3d8b94c6fc7cdcbddb053243053f7bc1f230d3bc7dfc4359e33992d0a3946b914a093287a76ac4a249b5b86cc75476466e409553355fefab75e9268a8751ffc9481fcff1f49c475699595b315e2147eebe8b7291600c6b1cf7c8f24d587b9464a67e5ccec17820e711b98f4f7d5053642068a3fff704c3fe35ba862b53e2622d6e8b4a4c815fb2ea90ef63e141209dd29254e5ab5bde9c6857b3cb184586049e7741b2d8b5b1a19e99e1834a25959155720c1c0ef84d9d3c42e1ba282847d476cef0228b1422aba08e5f3c1cd279bbd1c5303c2e9c16a0da4f88f770fca118b09e92b51a33970e32ade0c74eee1b31a420d7914c9d75db25855ae32798edc1b47e0f0f88429b2b60ae63", 0x2d5}], 0x1}, 0x0) [ 67.735025][ T5663] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.5'. 16:10:30 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00"/36], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x200001, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:31 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x40000, 0x0) mmap(&(0x7f000009a000/0x1000)=nil, 0x1000, 0x72dbab8261daca77, 0x8010, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) fcntl$getflags(r1, 0x408) preadv(r1, &(0x7f0000001580)=[{&(0x7f0000000080)=""/62, 0x3e}, {&(0x7f0000000180)=""/169, 0xa9}, {&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/186, 0xba}, {&(0x7f0000001300)=""/236, 0xec}, {&(0x7f0000001400)=""/114, 0x72}, {&(0x7f0000001480)=""/249, 0xf9}], 0x7, 0x7b, 0x7) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r2, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x1e, &(0x7f0000000140)="c4c691019919da078a0098d1e0a593b040f7629100f06ee04fa4ea57ff22"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0xb}], 0x2, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x17) r4 = gettid() ptrace$cont(0x9, 0x0, 0x0, 0x0) ptrace$getsig(0x4202, 0x0, 0x9, &(0x7f0000001600)) ioctl$BTRFS_IOC_INO_PATHS(r0, 0xc0389423, &(0x7f00000016c0)={0x3, 0x18, [0x7, 0x41, 0x7, 0xb], &(0x7f0000001680)=[0x0, 0x0, 0x0]}) tkill(r4, 0x34) 16:10:31 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[]) [ 67.756217][ T5666] loop3: detected capacity change from 0 to 65608 [ 67.763149][ T5666] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 115646289543168)! [ 67.764772][ T5666] EXT4-fs (loop3): group descriptors corrupted! [ 67.780754][ T5683] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.5'. [ 67.782555][ T5678] loop2: detected capacity change from 0 to 65608 16:10:31 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00"/36], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:31 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000100)='net_prio.prioidx\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f00000000c0)='cpuset.effective_cpus\x00', 0x7a05, 0x1700) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3}) pwrite64(r3, &(0x7f0000000600)="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", 0x200, 0x1200) sendfile(r1, r0, 0x0, 0x8000000000004) [ 67.838196][ T5695] loop2: detected capacity change from 0 to 65608 16:10:31 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2d5}], 0x1}, 0x0) [ 67.862695][ T5705] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.5'. [ 67.877119][ T5707] PM: suspend entry (deep) [ 67.909642][ T5707] Filesystems sync: 0.031 seconds [ 67.910792][ T5707] Freezing user space processes ... (elapsed 0.113 seconds) done. [ 68.025254][ T5707] OOM killer disabled. [ 68.026030][ T5707] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 68.028630][ T5707] printk: Suspending console(s) (use no_console_suspend to debug) [ 68.067693][ T882] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 68.578143][ T5707] ACPI: Preparing to enter system sleep state S3 [ 68.578233][ T5707] PM: Saving platform NVS memory [ 68.578237][ T5707] Disabling non-boot CPUs ... [ 68.581642][ T5707] smpboot: CPU 1 is now offline [ 68.585169][ T5707] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 68.585224][ T5707] ACPI: Low-level resume complete [ 68.585300][ T5707] PM: Restoring platform NVS memory [ 68.585309][ T5707] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 68.595333][ T5707] Enabling non-boot CPUs ... [ 68.595498][ T5707] x86: Booting SMP configuration: [ 68.595502][ T5707] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 68.595677][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 68.596597][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 68.597900][ T5707] CPU1 is up [ 68.598065][ T5707] ACPI: Waking up from system sleep state S3 [ 68.692698][ T5707] OOM killer enabled. [ 68.693316][ T5707] Restarting tasks ... [ 68.700367][ T1037] synth uevent: /devices/virtual/block/loop5: failed to send uevent [ 68.702535][ T1037] block loop5: uevent: failed to send synthetic uevent [ 68.714920][ T1037] synth uevent: /devices/virtual/block/loop1: failed to send uevent [ 68.715049][ T5707] done. [ 68.716338][ T1037] block loop1: uevent: failed to send synthetic uevent [ 68.718710][ T5707] PM: suspend exit [ 68.727815][ T5684] PM: suspend entry (deep) [ 68.732046][ T5684] Filesystems sync: 0.003 seconds [ 68.733046][ T5684] Freezing user space processes ... (elapsed 0.000 seconds) done. [ 68.735518][ T5684] OOM killer disabled. [ 68.736398][ T5684] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 68.738819][ T5684] printk: Suspending console(s) (use no_console_suspend to debug) 16:10:32 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x3}, 0x0) r0 = getpid() r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x5, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x1}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x3, 0x28, 0x5, 0x1ff, 0xfffffffffffffff9, 0x7, 0x3, 0x7, 0x7fff}, 0x0) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ftruncate(0xffffffffffffffff, 0x4) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x7c, 0x5, 0x3, 0x4, 0x0, 0xfffffffe, 0x20800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x80, 0x7}, 0x3040, 0x400, 0xfffffffd, 0x4, 0x1, 0x8, 0x0, 0x0, 0x10000800, 0x0, 0x5}, 0x0, 0x5, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) sendfile(r4, r4, &(0x7f0000000000)=0x7, 0x3) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000240)={0x0, 0x3, 0x0, 0x0, 0x40, "00000000000000000000000000ddc1517600"}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x2) [ 68.880059][ T1770] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 69.379319][ T5684] ACPI: Preparing to enter system sleep state S3 [ 69.379384][ T5684] PM: Saving platform NVS memory [ 69.379388][ T5684] Disabling non-boot CPUs ... [ 69.381620][ T5684] smpboot: CPU 1 is now offline [ 69.384406][ T5684] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 69.384462][ T5684] ACPI: Low-level resume complete [ 69.384539][ T5684] PM: Restoring platform NVS memory [ 69.384548][ T5684] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 69.393150][ T5684] Enabling non-boot CPUs ... [ 69.393271][ T5684] x86: Booting SMP configuration: [ 69.393274][ T5684] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 69.393428][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 69.394508][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 69.396096][ T5684] CPU1 is up [ 69.396283][ T5684] ACPI: Waking up from system sleep state S3 [ 69.479699][ T5684] OOM killer enabled. [ 69.480302][ T5684] Restarting tasks ... done. [ 69.500139][ T5684] PM: suspend exit 16:10:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x200001, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:32 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:32 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00"/36], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:32 executing program 4: ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @multicast2}, {0x2, 0x0, @multicast1}}) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f0000491000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f00003ad000/0x1000)=nil) r0 = syz_io_uring_setup(0x14e0, &(0x7f0000000040), &(0x7f0000340000/0x4000)=nil, &(0x7f00005bf000/0x2000)=nil, 0x0, 0x0) syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f000023d000/0x2000)=nil, &(0x7f0000000540), 0x0) syz_io_uring_setup(0x3418, &(0x7f0000000400), &(0x7f0000ffe000/0x1000)=nil, &(0x7f00000c1000/0x1000)=nil, 0x0, 0x0) syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000500)=@IORING_OP_WRITE={0x17, 0x0, 0x2000, @fd_index, 0x0, 0x0}, 0x1) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_EPOLL_CTL=@mod={0x1d, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000280)=@IORING_OP_WRITEV={0x2, 0x2, 0x2007, @fd_index=0x5, 0xc14, &(0x7f00000000c0)=[{&(0x7f0000000180)="0db264d41da3dbc4d88371cc2387504324211f0d179c308c914d45548a1e6817cf613a72e2ebe6e587f43752e997975a8f36b258a014841acce9e9ee8aada760461ccb037de848211678461e", 0x4c}, {&(0x7f0000000200)="737b2f63a29eb4207d7b0fe801e4bae9500fb844f0acf36ee6af1bf19f1bec3927e0f8a9c68fd7b4467536a9927aa43445d60d99259e04104f42f497ecc0a2d817d490e929e8b38e4e16a0b36c253ff52eb693db94b8c8d41dda36924f48947132ea3c4eecf61e", 0x67}, {&(0x7f0000000340)="bb742fc96e4b1d750370a52a3b78fa6b067c3c8f18438082a148f79fdf668ee2bca7267146491c2d791f73f36a98c8f22325fe8808b57797579614ec0254e550575e5d6d5bdea3be7cf78ec6de6ac7dd3c7569694e7d1dcfb941775706641b0a0d3d412c6c6b37f02c", 0x69}, {&(0x7f0000000580)="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", 0x1000}], 0x4, 0x9, 0x1, {0x2, r3}}, 0x6) syz_io_uring_setup(0x528e, &(0x7f0000000100), &(0x7f00005c6000/0x4000)=nil, &(0x7f00006ef000/0x1000)=nil, &(0x7f0000000000), 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r4, 0x0) creat(0x0, 0x0) madvise(&(0x7f0000884000/0x1000)=nil, 0x1000, 0x0) 16:10:32 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2d5}], 0x1}, 0x0) 16:10:32 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001", 0x1b, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 69.536974][ T5724] loop2: detected capacity change from 0 to 65608 [ 69.540533][ T5727] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.5'. 16:10:32 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2d5}], 0x1}, 0x0) 16:10:32 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:32 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[]) [ 69.592528][ T5743] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.5'. [ 69.594161][ T5742] loop2: detected capacity change from 0 to 65608 [ 69.596490][ T5742] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 115646289543168)! [ 69.598286][ T5742] EXT4-fs (loop2): group descriptors corrupted! [ 69.649569][ T5755] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.5'. [ 69.698346][ T5763] PM: suspend entry (deep) [ 69.704958][ T5763] Filesystems sync: 0.005 seconds [ 69.708888][ T5763] Freezing user space processes ... (elapsed 0.118 seconds) done. [ 69.828754][ T5763] OOM killer disabled. [ 69.829327][ T5763] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 69.831744][ T5763] printk: Suspending console(s) (use no_console_suspend to debug) [ 69.911180][ T203] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 70.421896][ T5763] ACPI: Preparing to enter system sleep state S3 [ 70.422038][ T5763] PM: Saving platform NVS memory [ 70.422042][ T5763] Disabling non-boot CPUs ... [ 70.425436][ T5763] smpboot: CPU 1 is now offline [ 70.428712][ T5763] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 70.428767][ T5763] ACPI: Low-level resume complete [ 70.428838][ T5763] PM: Restoring platform NVS memory [ 70.428847][ T5763] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 70.438712][ T5763] Enabling non-boot CPUs ... [ 70.438956][ T5763] x86: Booting SMP configuration: [ 70.438960][ T5763] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 70.439170][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 70.440015][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 70.441489][ T5763] CPU1 is up [ 70.441670][ T5763] ACPI: Waking up from system sleep state S3 [ 70.533835][ T5763] OOM killer enabled. [ 70.534419][ T5763] Restarting tasks ... done. [ 70.536994][ T5763] PM: suspend exit 16:10:33 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x3}, 0x0) r0 = getpid() r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x5, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x1}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x3, 0x28, 0x5, 0x1ff, 0xfffffffffffffff9, 0x7, 0x3, 0x7, 0x7fff}, 0x0) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ftruncate(0xffffffffffffffff, 0x4) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x7c, 0x5, 0x3, 0x4, 0x0, 0xfffffffe, 0x20800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x80, 0x7}, 0x3040, 0x400, 0xfffffffd, 0x4, 0x1, 0x8, 0x0, 0x0, 0x10000800, 0x0, 0x5}, 0x0, 0x5, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) sendfile(r4, r4, &(0x7f0000000000)=0x7, 0x3) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000240)={0x0, 0x3, 0x0, 0x0, 0x40, "00000000000000000000000000ddc1517600"}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x2) 16:10:33 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:33 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2d5}], 0x1}, 0x0) 16:10:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:33 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:33 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:33 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2d5}], 0x1}, 0x0) 16:10:33 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[]) [ 70.616241][ T5776] loop3: detected capacity change from 0 to 16 [ 70.620111][ T5776] EXT4-fs (loop3): bad geometry: block count 512 exceeds size of device (2 blocks) 16:10:33 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:33 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:33 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 70.725343][ T5804] loop3: detected capacity change from 0 to 16 [ 70.733889][ T5804] EXT4-fs (loop3): bad geometry: block count 512 exceeds size of device (2 blocks) [ 70.753627][ T5811] PM: suspend entry (deep) [ 70.760558][ T5811] Filesystems sync: 0.006 seconds [ 70.765961][ T5811] Freezing user space processes ... (elapsed 0.127 seconds) done. [ 70.894970][ T5811] OOM killer disabled. [ 70.895747][ T5811] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 70.898621][ T5811] printk: Suspending console(s) (use no_console_suspend to debug) [ 71.143234][ T1770] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 71.651504][ T5811] ACPI: Preparing to enter system sleep state S3 [ 71.651584][ T5811] PM: Saving platform NVS memory [ 71.651589][ T5811] Disabling non-boot CPUs ... [ 71.654881][ T5811] smpboot: CPU 1 is now offline [ 71.659701][ T5811] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 71.659760][ T5811] ACPI: Low-level resume complete [ 71.659837][ T5811] PM: Restoring platform NVS memory [ 71.659846][ T5811] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 71.669556][ T5811] Enabling non-boot CPUs ... [ 71.669701][ T5811] x86: Booting SMP configuration: [ 71.669717][ T5811] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 71.669941][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 71.671000][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 71.672512][ T5811] CPU1 is up [ 71.672660][ T5811] ACPI: Waking up from system sleep state S3 [ 71.828348][ T5811] OOM killer enabled. 16:10:35 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x3}, 0x0) r0 = getpid() r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x5, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x1}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x3, 0x28, 0x5, 0x1ff, 0xfffffffffffffff9, 0x7, 0x3, 0x7, 0x7fff}, 0x0) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ftruncate(0xffffffffffffffff, 0x4) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x7c, 0x5, 0x3, 0x4, 0x0, 0xfffffffe, 0x20800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x80, 0x7}, 0x3040, 0x400, 0xfffffffd, 0x4, 0x1, 0x8, 0x0, 0x0, 0x10000800, 0x0, 0x5}, 0x0, 0x5, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) sendfile(r4, r4, &(0x7f0000000000)=0x7, 0x3) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000240)={0x0, 0x3, 0x0, 0x0, 0x40, "00000000000000000000000000ddc1517600"}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x2) 16:10:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:35 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:35 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2d5}], 0x1}, 0x0) 16:10:35 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:35 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 71.832302][ T5811] Restarting tasks ... [ 71.842818][ T1037] synth uevent: /devices/virtual/block/loop5: failed to send uevent [ 71.854960][ T1037] block loop5: uevent: failed to send synthetic uevent [ 71.863358][ T5811] done. [ 71.866172][ T5811] PM: suspend exit 16:10:35 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e0000001100"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:35 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 71.927013][ T5824] loop2: detected capacity change from 0 to 16 [ 71.937468][ T5824] EXT4-fs (loop2): bad geometry: block count 512 exceeds size of device (2 blocks) 16:10:35 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 71.975440][ T5834] loop3: detected capacity change from 0 to 16 [ 71.983197][ T5834] EXT4-fs (loop3): bad geometry: block count 512 exceeds size of device (2 blocks) 16:10:35 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:35 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e0000001100"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 72.056861][ T5850] loop3: detected capacity change from 0 to 65608 [ 72.085971][ T5850] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 115646289543168)! [ 72.097317][ T5850] EXT4-fs (loop3): group descriptors corrupted! [ 72.107422][ T5863] PM: suspend entry (deep) [ 72.118375][ T5862] loop2: detected capacity change from 0 to 16 [ 72.129968][ T5862] EXT4-fs (loop2): bad geometry: block count 512 exceeds size of device (2 blocks) [ 72.160073][ T5863] Filesystems sync: 0.048 seconds [ 72.169838][ T5863] Freezing user space processes ... (elapsed 0.112 seconds) done. [ 72.290678][ T5863] OOM killer disabled. [ 72.294758][ T5863] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 72.304231][ T5863] printk: Suspending console(s) (use no_console_suspend to debug) [ 72.406712][ T1770] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 72.919763][ T5863] ACPI: Preparing to enter system sleep state S3 [ 72.919836][ T5863] PM: Saving platform NVS memory [ 72.919840][ T5863] Disabling non-boot CPUs ... [ 72.923136][ T5863] smpboot: CPU 1 is now offline [ 72.926283][ T5863] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 72.926338][ T5863] ACPI: Low-level resume complete [ 72.926431][ T5863] PM: Restoring platform NVS memory [ 72.926440][ T5863] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 72.935858][ T5863] Enabling non-boot CPUs ... [ 72.936043][ T5863] x86: Booting SMP configuration: [ 72.936047][ T5863] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 72.936209][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 72.937293][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 72.938743][ T5863] CPU1 is up [ 72.938969][ T5863] ACPI: Waking up from system sleep state S3 [ 73.022462][ T5863] OOM killer enabled. [ 73.023130][ T5863] Restarting tasks ... done. [ 73.040171][ T5863] PM: suspend exit 16:10:36 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x3}, 0x0) r0 = getpid() r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x5, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x1}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x3, 0x28, 0x5, 0x1ff, 0xfffffffffffffff9, 0x7, 0x3, 0x7, 0x7fff}, 0x0) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ftruncate(0xffffffffffffffff, 0x4) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x7c, 0x5, 0x3, 0x4, 0x0, 0xfffffffe, 0x20800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x80, 0x7}, 0x3040, 0x400, 0xfffffffd, 0x4, 0x1, 0x8, 0x0, 0x0, 0x10000800, 0x0, 0x5}, 0x0, 0x5, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) sendfile(r4, r4, &(0x7f0000000000)=0x7, 0x3) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000240)={0x0, 0x3, 0x0, 0x0, 0x40, "00000000000000000000000000ddc1517600"}) syz_open_pts(0xffffffffffffffff, 0x0) 16:10:36 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d09a0e63c9476288b671afdbd53a5994e137381f62021d1951b627b8dda57a5d17d744648c81c5703ed8146ab1b0171f89091b1dd3238d03dbb686df460963245dedf2013ee555af99499e44ad420dbf65fd46fbc99a1274429e2d5783751815828ec8cb3553110cca66460215353d19f6d8bbd8fb264eddea60b18e16c31aa5e200000491634ac2fd10e2cd30bcd7fede24263a7fff16e53ea293f3551b7147c33a44ea437fb1515c3e8d4f162fdebf8ebe11ae6fcd9372c8d8f19556ae091fe94215ae9434da412f6fa4cb6561e5f78ff9707844ee5d573fb294437722d9a06dfa61748c32c73d759933a8dd344c947d3efdbe90d0eb049df5fbb0c19f6785264b619c530d97395d44b04f7e2a280d658c7871ad373b792678c49227999651ef3b2ee1bc2b8f3035db376e8e09aa3837233c8713065a8ad131d24f6c42a3220d0e07c3d3e95d59a5dd10c09716b5f874ecf53aadfa5050ff40f2c3c4a629b6445e5836100afff5a8977583653b40ca316f8f11416e5c1bd5499636ddae25fc4970b37209cf5c0bf8e432160c258d14223baa52798e09858645773dd97e68a9531072713cff077b2e73e03ed4f145e9199c126a7f235e5674a3c7f5c7129ac7c1a3319590249b6d34ef6c3d8b94c6fc7cdcbddb053243053f7bc1f230d3bc7dfc4359e33992d0a3946b914a093287a76ac4a249b5b86cc75476466e409553355fefab75e9268a8751ffc9481fcff1f49c475699595b315e2147eebe8b7291600c6b1cf7c8f24d587b9464a67e5ccec17820e711b98f4f7d5053642068a3fff704c3fe35ba862b53e2622d6e8b4a4c815fb2ea90ef63e141209dd29254e5ab5bde9c6857b3cb184586049e7741b2d8b5b1a19e99e1834a25959155720c1c0ef84d9d3c42e1ba282847d476cef0228b1422aba08e5f3c1cd279bbd1c5303c2e9c16a0da4f88f770fca118b09e92b51a33970e32ade0c74eee1b31a420d7914c9d75db25855ae32798edc1b47e0f0f88429b2b60ae63", 0x2d5}], 0x1}, 0x0) 16:10:36 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e0000001100"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:36 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:36 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:36 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 73.109348][ T5888] loop2: detected capacity change from 0 to 16 [ 73.113530][ T5887] __nla_validate_parse: 11 callbacks suppressed [ 73.113599][ T5887] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.4'. [ 73.122478][ T5888] EXT4-fs (loop2): bad geometry: block count 512 exceeds size of device (2 blocks) [ 73.124810][ T5897] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 73.126413][ T5892] loop3: detected capacity change from 0 to 16 [ 73.129515][ T5892] EXT4-fs (loop3): bad geometry: block count 512 exceeds size of device (2 blocks) 16:10:36 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 73.154068][ T5906] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1555 sclass=netlink_route_socket pid=5906 comm=syz-executor.4 16:10:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2d5}], 0x1}, 0x0) 16:10:36 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 73.191213][ T5912] netlink: 37 bytes leftover after parsing attributes in process `syz-executor.5'. [ 73.222306][ T5917] loop3: detected capacity change from 0 to 16 [ 73.225061][ T5917] EXT4-fs (loop3): bad geometry: block count 512 exceeds size of device (2 blocks) [ 73.226820][ T5920] loop2: detected capacity change from 0 to 65608 [ 73.230499][ T5920] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 115646289543168)! [ 73.232207][ T5920] EXT4-fs (loop2): group descriptors corrupted! [ 73.233405][ T5923] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1555 sclass=netlink_route_socket pid=5923 comm=syz-executor.4 [ 73.262626][ T5930] PM: suspend entry (deep) [ 73.301006][ T5930] Filesystems sync: 0.037 seconds [ 73.304158][ T5930] Freezing user space processes ... (elapsed 0.098 seconds) done. [ 73.404139][ T5930] OOM killer disabled. [ 73.404759][ T5930] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 73.407113][ T5930] printk: Suspending console(s) (use no_console_suspend to debug) 16:10:37 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x3}, 0x0) r0 = getpid() r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x5, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x1}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x3, 0x28, 0x5, 0x1ff, 0xfffffffffffffff9, 0x7, 0x3, 0x7, 0x7fff}, 0x0) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ftruncate(0xffffffffffffffff, 0x4) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x7c, 0x5, 0x3, 0x4, 0x0, 0xfffffffe, 0x20800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x80, 0x7}, 0x3040, 0x400, 0xfffffffd, 0x4, 0x1, 0x8, 0x0, 0x0, 0x10000800, 0x0, 0x5}, 0x0, 0x5, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) sendfile(r4, r4, &(0x7f0000000000)=0x7, 0x3) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000240)={0x0, 0x3, 0x0, 0x0, 0x40, "00000000000000000000000000ddc1517600"}) 16:10:37 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:37 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2d5}], 0x1}, 0x0) 16:10:37 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 73.458320][ T5713] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 73.970919][ T5930] ACPI: Preparing to enter system sleep state S3 [ 73.971071][ T5930] PM: Saving platform NVS memory [ 73.971075][ T5930] Disabling non-boot CPUs ... [ 73.975119][ T5930] smpboot: CPU 1 is now offline [ 73.978414][ T5930] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 73.978484][ T5930] ACPI: Low-level resume complete [ 73.978565][ T5930] PM: Restoring platform NVS memory [ 73.978573][ T5930] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 73.988315][ T5930] Enabling non-boot CPUs ... [ 73.988580][ T5930] x86: Booting SMP configuration: [ 73.988584][ T5930] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 73.988774][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 73.989728][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 73.991138][ T5930] CPU1 is up [ 73.991391][ T5930] ACPI: Waking up from system sleep state S3 [ 74.091697][ T5930] OOM killer enabled. [ 74.092512][ T5930] Restarting tasks ... [ 74.106231][ T1037] synth uevent: /devices/virtual/block/loop1: failed to send uevent [ 74.109210][ T1037] block loop1: uevent: failed to send synthetic uevent [ 74.111673][ T5930] done. [ 74.112314][ T5930] PM: suspend exit 16:10:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:37 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:37 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:37 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 74.164984][ T5955] netlink: 37 bytes leftover after parsing attributes in process `syz-executor.5'. [ 74.166212][ T5949] loop3: detected capacity change from 0 to 16 [ 74.167375][ T5951] loop2: detected capacity change from 0 to 16 [ 74.172242][ T5951] EXT4-fs (loop2): bad geometry: block count 512 exceeds size of device (2 blocks) [ 74.172931][ T5954] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1555 sclass=netlink_route_socket pid=5954 comm=syz-executor.4 [ 74.178005][ T5949] EXT4-fs (loop3): bad geometry: block count 512 exceeds size of device (2 blocks) 16:10:37 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 74.215187][ T5964] netlink: 37 bytes leftover after parsing attributes in process `syz-executor.5'. 16:10:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2d5}], 0x1}, 0x0) [ 74.264973][ T5972] loop3: detected capacity change from 0 to 65608 [ 74.267471][ T5973] loop2: detected capacity change from 0 to 16 [ 74.271403][ T5972] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 115646289543168)! [ 74.273490][ T5972] EXT4-fs (loop3): group descriptors corrupted! [ 74.276087][ T5973] EXT4-fs (loop2): bad geometry: block count 512 exceeds size of device (2 blocks) [ 74.280344][ T5982] netlink: 37 bytes leftover after parsing attributes in process `syz-executor.5'. [ 74.303556][ T5985] PM: suspend entry (deep) [ 74.323783][ T5985] Filesystems sync: 0.019 seconds [ 74.325046][ T5985] Freezing user space processes ... (elapsed 0.120 seconds) done. [ 74.447623][ T5985] OOM killer disabled. [ 74.448441][ T5985] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 74.451149][ T5985] printk: Suspending console(s) (use no_console_suspend to debug) 16:10:38 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:38 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:38 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:38 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x3}, 0x0) r0 = getpid() r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x5, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x1}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x3, 0x28, 0x5, 0x1ff, 0xfffffffffffffff9, 0x7, 0x3, 0x7, 0x7fff}, 0x0) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ftruncate(0xffffffffffffffff, 0x4) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x7c, 0x5, 0x3, 0x4, 0x0, 0xfffffffe, 0x20800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x80, 0x7}, 0x3040, 0x400, 0xfffffffd, 0x4, 0x1, 0x8, 0x0, 0x0, 0x10000800, 0x0, 0x5}, 0x0, 0x5, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) sendfile(r4, r4, &(0x7f0000000000)=0x7, 0x3) 16:10:38 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2d5}], 0x1}, 0x0) [ 74.540982][ T1368] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 75.048380][ T5985] ACPI: Preparing to enter system sleep state S3 [ 75.048498][ T5985] PM: Saving platform NVS memory [ 75.048502][ T5985] Disabling non-boot CPUs ... [ 75.052039][ T5985] smpboot: CPU 1 is now offline [ 75.055329][ T5985] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 75.055384][ T5985] ACPI: Low-level resume complete [ 75.055496][ T5985] PM: Restoring platform NVS memory [ 75.055504][ T5985] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 75.065661][ T5985] Enabling non-boot CPUs ... [ 75.065834][ T5985] x86: Booting SMP configuration: [ 75.065838][ T5985] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 75.066051][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 75.067148][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 75.068529][ T5985] CPU1 is up [ 75.068721][ T5985] ACPI: Waking up from system sleep state S3 [ 75.162521][ T5985] OOM killer enabled. [ 75.163200][ T5985] Restarting tasks ... [ 75.170556][ T1037] synth uevent: /devices/virtual/block/loop3: failed to send uevent [ 75.172642][ T1037] block loop3: uevent: failed to send synthetic uevent [ 75.190146][ T5985] done. [ 75.190956][ T5985] PM: suspend exit 16:10:38 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:38 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:38 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={0x0, 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:38 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 75.248804][ T6004] netlink: 37 bytes leftover after parsing attributes in process `syz-executor.5'. [ 75.256227][ T6006] loop2: detected capacity change from 0 to 16 [ 75.257624][ T6007] loop3: detected capacity change from 0 to 16 [ 75.261681][ T6006] EXT4-fs (loop2): bad geometry: block count 512 exceeds size of device (2 blocks) [ 75.273767][ T6007] EXT4-fs (loop3): bad geometry: block count 512 exceeds size of device (2 blocks) [ 75.284252][ T6020] netlink: 37 bytes leftover after parsing attributes in process `syz-executor.5'. 16:10:38 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:38 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d09a0e63c9476288b671afdbd53a5994e137381f62021d1951b627b8dda57a5d17d744648c81c5703ed8146ab1b0171f89091b1dd3238d03dbb686df460963245dedf2013ee555af99499e44ad420dbf65fd46fbc99a1274429e2d5783751815828ec8cb3553110cca66460215353d19f6d8bbd8fb264eddea60b18e16c31aa5e200000491634ac2fd10e2cd30bcd7fede24263a7fff16e53ea293f3551b7147c33a44ea437fb1515c3e8d4f162fdebf8ebe11ae6fcd9372c8d8f19556ae091fe94215ae9434da412f6fa4cb6561e5f78ff9707844ee5d573fb294437722d9a06dfa61748c32c73d759933a8dd344c947d3efdbe90d0eb049df5fbb0c19f6785264b619c530d97395d44b04f7e2a280d658c7871ad373b792678c49227999651ef3b2ee1bc2b8f3035db376e8e09aa3837233c8713065a8ad131d24f6c42a3220d0e07c3d3e95d59a5dd10c09716b5f874ecf53aadfa5050ff40f2c3c4a629b6445e5836100afff5a8977583653b40ca316f8f11416e5c1bd5499636ddae25fc4970b37209cf5c0bf8e432160c258d14223baa52798e09858645773dd97e68a9531072713cff077b2e73e03ed4f145e9199c126a7f235e5674a3c7f5c7129ac7c1a3319590249b6d34ef6c3d8b94c6fc7cdcbddb053243053f7bc1f230d3bc7dfc4359e33992d0a3946b914a093287a76ac4a249b5b86cc75476466e409553355fefab75e9268a8751ffc9481fcff1f49c475699595b315e2147eebe8b7291600c6b1cf7c8f24d587b9464a67e5ccec17820e711b98f4f7d5053642068a3fff704c3fe35ba862b53e2622d6e8b4a4c815fb2ea90ef63e141209dd29254e5ab5bde9c6857b3cb184586049e7741b2d8b5b1a19e99e1834a25959155720c1c0ef84d9d3c42e1ba282847d476cef0228b1422aba08e5f3c1cd279bbd1c5303c2e9c16a0da4f88f770fca118b09e92b51a33970e32ade0c74eee1b31a420d7914c9d75db25855ae32798edc1b47e0f0f88429b2b60ae63", 0x2d5}], 0x1}, 0x0) [ 75.346937][ T6032] netlink: 37 bytes leftover after parsing attributes in process `syz-executor.5'. [ 75.351789][ T6030] loop2: detected capacity change from 0 to 65608 [ 75.355265][ T6030] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 115646289543168)! [ 75.357268][ T6030] EXT4-fs (loop2): group descriptors corrupted! [ 75.378123][ T6040] PM: suspend entry (deep) [ 75.387100][ T6035] loop3: detected capacity change from 0 to 16 [ 75.388543][ T6038] netlink: 37 bytes leftover after parsing attributes in process `syz-executor.4'. [ 75.394159][ T6035] EXT4-fs (loop3): bad geometry: block count 512 exceeds size of device (2 blocks) [ 75.405491][ T6040] Filesystems sync: 0.026 seconds [ 75.406610][ T6040] Freezing user space processes ... (elapsed 0.127 seconds) done. [ 75.536000][ T6040] OOM killer disabled. [ 75.537021][ T6040] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 75.540067][ T6040] printk: Suspending console(s) (use no_console_suspend to debug) 16:10:39 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:39 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={0x0, 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 75.784184][ T1770] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 76.280498][ T6040] ACPI: Preparing to enter system sleep state S3 [ 76.280684][ T6040] PM: Saving platform NVS memory [ 76.280688][ T6040] Disabling non-boot CPUs ... [ 76.283885][ T6040] smpboot: CPU 1 is now offline [ 76.287160][ T6040] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 76.287265][ T6040] ACPI: Low-level resume complete [ 76.287378][ T6040] PM: Restoring platform NVS memory [ 76.287387][ T6040] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 76.301976][ T6040] Enabling non-boot CPUs ... [ 76.302104][ T6040] x86: Booting SMP configuration: [ 76.302107][ T6040] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 76.302277][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 76.303250][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 76.304609][ T6040] CPU1 is up [ 76.304894][ T6040] ACPI: Waking up from system sleep state S3 [ 76.394914][ T6040] OOM killer enabled. [ 76.395904][ T6040] Restarting tasks ... [ 76.405900][ T1037] synth uevent: /devices/virtual/block/loop2: failed to send uevent [ 76.408043][ T1037] block loop2: uevent: failed to send synthetic uevent [ 76.426063][ T6040] done. [ 76.427174][ T6040] PM: suspend exit 16:10:39 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x3}, 0x0) r0 = getpid() r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x5, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x1}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x3, 0x28, 0x5, 0x1ff, 0xfffffffffffffff9, 0x7, 0x3, 0x7, 0x7fff}, 0x0) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ftruncate(0xffffffffffffffff, 0x4) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x7c, 0x5, 0x3, 0x4, 0x0, 0xfffffffe, 0x20800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x80, 0x7}, 0x3040, 0x400, 0xfffffffd, 0x4, 0x1, 0x8, 0x0, 0x0, 0x10000800, 0x0, 0x5}, 0x0, 0x5, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) 16:10:39 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2d5}], 0x1}, 0x0) 16:10:39 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:39 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={0x0, 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:39 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 76.470013][ T6055] loop2: detected capacity change from 0 to 16 [ 76.475310][ T6055] EXT4-fs (loop2): bad geometry: block count 512 exceeds size of device (2 blocks) 16:10:39 executing program 4: sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:39 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:39 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 76.520335][ T6068] loop3: detected capacity change from 0 to 16 [ 76.527021][ T6068] EXT4-fs (loop3): bad geometry: block count 512 exceeds size of device (2 blocks) 16:10:39 executing program 4: sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 76.570703][ T6077] loop2: detected capacity change from 0 to 16 [ 76.575576][ T6077] EXT4-fs (loop2): bad geometry: block count 512 exceeds size of device (2 blocks) 16:10:39 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2d5}], 0x1}, 0x0) 16:10:39 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 76.620473][ T6088] loop3: detected capacity change from 0 to 65608 [ 76.624328][ T6088] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 76.626260][ T6088] EXT4-fs (loop3): group descriptors corrupted! 16:10:40 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x3}, 0x0) r0 = getpid() r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x5, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x1}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x3, 0x28, 0x5, 0x1ff, 0xfffffffffffffff9, 0x7, 0x3, 0x7, 0x7fff}, 0x0) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ftruncate(0xffffffffffffffff, 0x4) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x7c, 0x5, 0x3, 0x4, 0x0, 0xfffffffe, 0x20800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x80, 0x7}, 0x3040, 0x400, 0xfffffffd, 0x4, 0x1, 0x8, 0x0, 0x0, 0x10000800, 0x0, 0x5}, 0x0, 0x5, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) 16:10:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:40 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:40 executing program 4: sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:40 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:40 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2d5}], 0x1}, 0x0) 16:10:40 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:40 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 77.350550][ T6114] loop2: detected capacity change from 0 to 16 [ 77.356262][ T6114] EXT4-fs (loop2): bad geometry: block count 512 exceeds size of device (2 blocks) [ 77.367788][ T6121] loop3: detected capacity change from 0 to 65608 [ 77.377936][ T6121] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 77.379606][ T6121] EXT4-fs (loop3): group descriptors corrupted! 16:10:40 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:40 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:40 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d09a0e63c9476288b671afdbd53a5994e137381f62021d1951b627b8dda57a5d17d744648c81c5703ed8146ab1b0171f89091b1dd3238d03dbb686df460963245dedf2013ee555af99499e44ad420dbf65fd46fbc99a1274429e2d5783751815828ec8cb3553110cca66460215353d19f6d8bbd8fb264eddea60b18e16c31aa5e200000491634ac2fd10e2cd30bcd7fede24263a7fff16e53ea293f3551b7147c33a44ea437fb1515c3e8d4f162fdebf8ebe11ae6fcd9372c8d8f19556ae091fe94215ae9434da412f6fa4cb6561e5f78ff9707844ee5d573fb294437722d9a06dfa61748c32c73d759933a8dd344c947d3efdbe90d0eb049df5fbb0c19f6785264b619c530d97395d44b04f7e2a280d658c7871ad373b792678c49227999651ef3b2ee1bc2b8f3035db376e8e09aa3837233c8713065a8ad131d24f6c42a3220d0e07c3d3e95d59a5dd10c09716b5f874ecf53aadfa5050ff40f2c3c4a629b6445e5836100afff5a8977583653b40ca316f8f11416e5c1bd5499636ddae25fc4970b37209cf5c0bf8e432160c258d14223baa52798e09858645773dd97e68a9531072713cff077b2e73e03ed4f145e9199c126a7f235e5674a3c7f5c7129ac7c1a3319590249b6d34ef6c3d8b94c6fc7cdcbddb053243053f7bc1f230d3bc7dfc4359e33992d0a3946b914a093287a76ac4a249b5b86cc75476466e409553355fefab75e9268a8751ffc9481fcff1f49c475699595b315e2147eebe8b7291600c6b1cf7c8f24d587b9464a67e5ccec17820e711b98f4f7d5053642068a3fff704c3fe35ba862b53e2622d6e8b4a4c815fb2ea90ef63e141209dd29254e5ab5bde9c6857b3cb184586049e7741b2d8b5b1a19e99e1834a25959155720c1c0ef84d9d3c42e1ba282847d476cef0228b1422aba08e5f3c1cd279bbd1c5303c2e9c16a0da4f88f770fca118b09e92b51a33970e32ade0c74eee1b31a420d7914c9d75db25855ae32798edc1b47e0f0f88429b2b60ae63", 0x2d5}], 0x1}, 0x0) [ 77.444567][ T6137] loop2: detected capacity change from 0 to 65608 [ 77.449453][ T6137] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 77.451730][ T6137] EXT4-fs (loop2): group descriptors corrupted! [ 77.480412][ T6142] loop3: detected capacity change from 0 to 65608 [ 77.484300][ T6142] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 77.486096][ T6142] EXT4-fs (loop3): group descriptors corrupted! 16:10:41 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x3}, 0x0) r0 = getpid() r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x5, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x1}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x3, 0x28, 0x5, 0x1ff, 0xfffffffffffffff9, 0x7, 0x3, 0x7, 0x7fff}, 0x0) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ftruncate(0xffffffffffffffff, 0x4) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x7c, 0x5, 0x3, 0x4, 0x0, 0xfffffffe, 0x20800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x80, 0x7}, 0x3040, 0x400, 0xfffffffd, 0x4, 0x1, 0x8, 0x0, 0x0, 0x10000800, 0x0, 0x5}, 0x0, 0x5, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) 16:10:41 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {0x0, 0x0, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:41 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:41 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d09a0e63c9476288b671afdbd53a5994e137381f62021d1951b627b8dda57a5d17d744648c81c5703ed8146ab1b0171f89091b1dd3238d03dbb686df460963245dedf2013ee555af99499e44ad420dbf65fd46fbc99a1274429e2d5783751815828ec8cb3553110cca66460215353d19f6d8bbd8fb264eddea60b18e16c31aa5e200000491634ac2fd10e2cd30bcd7fede24263a7fff16e53ea293f3551b7147c33a44ea437fb1515c3e8d4f162fdebf8ebe11ae6fcd9372c8d8f19556ae091fe94215ae9434da412f6fa4cb6561e5f78ff9707844ee5d573fb294437722d9a06dfa61748c32c73d759933a8dd344c947d3efdbe90d0eb049df5fbb0c19f6785264b619c530d97395d44b04f7e2a280d658c7871ad373b792678c49227999651ef3b2ee1bc2b8f3035db376e8e09aa3837233c8713065a8ad131d24f6c42a3220d0e07c3d3e95d59a5dd10c09716b5f874ecf53aadfa5050ff40f2c3c4a629b6445e5836100afff5a8977583653b40ca316f8f11416e5c1bd5499636ddae25fc4970b37209cf5c0bf8e432160c258d14223baa52798e09858645773dd97e68a9531072713cff077b2e73e03ed4f145e9199c126a7f235e5674a3c7f5c7129ac7c1a3319590249b6d34ef6c3d8b94c6fc7cdcbddb053243053f7bc1f230d3bc7dfc4359e33992d0a3946b914a093287a76ac4a249b5b86cc75476466e409553355fefab75e9268a8751ffc9481fcff1f49c475699595b315e2147eebe8b7291600c6b1cf7c8f24d587b9464a67e5ccec17820e711b98f4f7d5053642068a3fff704c3fe35ba862b53e2622d6e8b4a4c815fb2ea90ef63e141209dd29254e5ab5bde9c6857b3cb184586049e7741b2d8b5b1a19e99e1834a25959155720c1c0ef84d9d3c42e1ba282847d476cef0228b1422aba08e5f3c1cd279bbd1c5303c2e9c16a0da4f88f770fca118b09e92b51a33970e32ade0c74eee1b31a420d7914c9d75db25855ae32798edc1b47e0f0f88429b2b60ae63", 0x2d5}], 0x1}, 0x0) 16:10:41 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c00000009060000000140000000000000000000"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:41 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c00000009060000000140000000000000000000"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 78.280786][ T6169] __nla_validate_parse: 13 callbacks suppressed [ 78.280802][ T6169] netlink: 37 bytes leftover after parsing attributes in process `syz-executor.5'. [ 78.294581][ T6173] loop2: detected capacity change from 0 to 65608 [ 78.294794][ T6177] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.4'. [ 78.297281][ T6173] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 78.299248][ T6173] EXT4-fs (loop2): group descriptors corrupted! [ 78.307743][ T6174] loop3: detected capacity change from 0 to 65608 [ 78.310658][ T6182] netlink: 37 bytes leftover after parsing attributes in process `syz-executor.5'. [ 78.317637][ T6174] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 78.319422][ T6174] EXT4-fs (loop3): group descriptors corrupted! 16:10:41 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {0x0, 0x0, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:41 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2d5}], 0x1}, 0x0) [ 78.380936][ T6195] netlink: 37 bytes leftover after parsing attributes in process `syz-executor.5'. [ 78.386664][ T6196] loop2: detected capacity change from 0 to 65608 [ 78.390803][ T6198] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.4'. [ 78.394943][ T6196] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 78.397059][ T6196] EXT4-fs (loop2): group descriptors corrupted! [ 78.421980][ T6203] loop3: detected capacity change from 0 to 65608 [ 78.438276][ T6203] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 78.441283][ T6203] EXT4-fs (loop3): group descriptors corrupted! 16:10:42 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c00000009060000000140000000000000000000"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:42 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x3}, 0x0) r0 = getpid() r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x5, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x1}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x3, 0x28, 0x5, 0x1ff, 0xfffffffffffffff9, 0x7, 0x3, 0x7, 0x7fff}, 0x0) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ftruncate(0xffffffffffffffff, 0x4) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x7c, 0x5, 0x3, 0x4, 0x0, 0xfffffffe, 0x20800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x80, 0x7}, 0x3040, 0x400, 0xfffffffd, 0x4, 0x1, 0x8, 0x0, 0x0, 0x10000800, 0x0, 0x5}, 0x0, 0x5, 0xffffffffffffffff, 0x0) sendfile(r4, r4, &(0x7f0000000000)=0x7, 0x3) 16:10:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {0x0, 0x0, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:42 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {0x0, 0x0, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:42 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2d5}], 0x1}, 0x0) 16:10:42 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, 0x0}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:42 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, 0x0}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:42 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, 0x0}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:42 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c0000000906000000014000000000000000000005000100070000001000"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 79.130896][ T6224] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.4'. [ 79.147125][ T6228] loop2: detected capacity change from 0 to 65608 [ 79.149039][ T6230] netlink: 37 bytes leftover after parsing attributes in process `syz-executor.5'. [ 79.151691][ T6228] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 79.153205][ T6228] EXT4-fs (loop2): group descriptors corrupted! [ 79.159555][ T6227] loop3: detected capacity change from 0 to 65608 [ 79.162465][ T6227] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 79.163983][ T6227] EXT4-fs (loop3): group descriptors corrupted! [ 79.168902][ T6241] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.4'. 16:10:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {0x0, 0x0, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:42 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={0x0, 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:42 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 79.191464][ T6244] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.4'. [ 79.203208][ T6248] netlink: 37 bytes leftover after parsing attributes in process `syz-executor.5'. 16:10:42 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c0000000906000000014000000000000000000005000100070000001000"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 79.256737][ T6256] loop2: detected capacity change from 0 to 65608 [ 79.262275][ T6256] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 79.264491][ T6256] EXT4-fs (loop2): group descriptors corrupted! [ 79.272933][ T6260] loop3: detected capacity change from 0 to 65608 [ 79.277579][ T6260] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 79.279156][ T6260] EXT4-fs (loop3): group descriptors corrupted! [ 79.295090][ T6267] PM: suspend entry (deep) [ 79.313257][ T6267] Filesystems sync: 0.017 seconds [ 79.314447][ T6267] Freezing user space processes ... (elapsed 0.114 seconds) done. [ 79.430247][ T6267] OOM killer disabled. [ 79.431048][ T6267] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 79.433489][ T6267] printk: Suspending console(s) (use no_console_suspend to debug) 16:10:43 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x3}, 0x0) r0 = getpid() r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x5, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x1}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x3, 0x28, 0x5, 0x1ff, 0xfffffffffffffff9, 0x7, 0x3, 0x7, 0x7fff}, 0x0) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ftruncate(0xffffffffffffffff, 0x4) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) sendfile(r4, r4, &(0x7f0000000000)=0x7, 0x3) 16:10:43 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x0, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2d5}], 0x1}, 0x0) 16:10:43 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={0x0, 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:43 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c0000000906000000014000000000000000000005000100070000001000"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {0x0, 0x0, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:43 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 79.472796][ T1770] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 79.980245][ T6267] ACPI: Preparing to enter system sleep state S3 [ 79.980337][ T6267] PM: Saving platform NVS memory [ 79.980341][ T6267] Disabling non-boot CPUs ... [ 79.983719][ T6267] smpboot: CPU 1 is now offline [ 79.986951][ T6267] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 79.987050][ T6267] ACPI: Low-level resume complete [ 79.987186][ T6267] PM: Restoring platform NVS memory [ 79.987194][ T6267] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 79.997110][ T6267] Enabling non-boot CPUs ... [ 79.997313][ T6267] x86: Booting SMP configuration: [ 79.997317][ T6267] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 79.997528][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 79.998493][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 79.999823][ T6267] CPU1 is up [ 79.999941][ T6267] ACPI: Waking up from system sleep state S3 [ 80.088640][ T6267] OOM killer enabled. [ 80.089535][ T6267] Restarting tasks ... [ 80.094303][ T1037] synth uevent: /devices/virtual/block/loop3: failed to send uevent [ 80.096554][ T1037] block loop3: uevent: failed to send synthetic uevent [ 80.110462][ T6267] done. [ 80.112550][ T6267] PM: suspend exit 16:10:43 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:43 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={0x0, 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 80.174836][ T6283] loop2: detected capacity change from 0 to 65608 [ 80.180864][ T6283] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 80.182212][ T6284] loop3: detected capacity change from 0 to 65608 [ 80.183039][ T6283] EXT4-fs (loop2): group descriptors corrupted! [ 80.214256][ T6284] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 80.216571][ T6284] EXT4-fs (loop3): group descriptors corrupted! [ 80.217622][ T6294] validate_nla: 5 callbacks suppressed [ 80.217632][ T6294] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 16:10:43 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:43 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x0, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2d5}], 0x1}, 0x0) 16:10:43 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 80.285962][ T6305] loop2: detected capacity change from 0 to 65608 [ 80.287694][ T6309] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 80.295783][ T6305] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 80.297596][ T6305] EXT4-fs (loop2): group descriptors corrupted! [ 80.301416][ T6311] PM: suspend entry (deep) [ 80.309646][ T6311] Filesystems sync: 0.007 seconds [ 80.316699][ T1037] synth uevent: /devices/virtual/block/loop5: failed to send uevent [ 80.318028][ T1037] block loop5: uevent: failed to send synthetic uevent [ 80.326579][ T6311] Freezing user space processes ... (elapsed 0.118 seconds) done. [ 80.447210][ T6311] OOM killer disabled. [ 80.448113][ T6311] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 80.451022][ T6311] printk: Suspending console(s) (use no_console_suspend to debug) [ 80.515357][ T1766] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 81.033626][ T6311] ACPI: Preparing to enter system sleep state S3 [ 81.033723][ T6311] PM: Saving platform NVS memory [ 81.033727][ T6311] Disabling non-boot CPUs ... [ 81.037003][ T6311] smpboot: CPU 1 is now offline [ 81.041982][ T6311] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 81.042038][ T6311] ACPI: Low-level resume complete [ 81.042159][ T6311] PM: Restoring platform NVS memory [ 81.042168][ T6311] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 81.053855][ T6311] Enabling non-boot CPUs ... [ 81.054056][ T6311] x86: Booting SMP configuration: [ 81.054059][ T6311] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 81.054277][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 81.055223][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 81.056765][ T6311] CPU1 is up [ 81.056984][ T6311] ACPI: Waking up from system sleep state S3 [ 81.156237][ T6311] OOM killer enabled. [ 81.157122][ T6311] Restarting tasks ... [ 81.158049][ T1037] synth uevent: /devices/virtual/block/loop1: failed to send uevent [ 81.159997][ T1037] block loop1: uevent: failed to send synthetic uevent [ 81.180779][ T6311] done. [ 81.181500][ T6311] PM: suspend exit 16:10:44 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x3}, 0x0) r0 = getpid() r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x5, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x1}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x3, 0x28, 0x5, 0x1ff, 0xfffffffffffffff9, 0x7, 0x3, 0x7, 0x7fff}, 0x0) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ftruncate(0xffffffffffffffff, 0x4) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r4, r4, &(0x7f0000000000)=0x7, 0x3) 16:10:44 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:44 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:44 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x0, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d09a0e63c9476288b671afdbd53a5994e137381f62021d1951b627b8dda57a5d17d744648c81c5703ed8146ab1b0171f89091b1dd3238d03dbb686df460963245dedf2013ee555af99499e44ad420dbf65fd46fbc99a1274429e2d5783751815828ec8cb3553110cca66460215353d19f6d8bbd8fb264eddea60b18e16c31aa5e200000491634ac2fd10e2cd30bcd7fede24263a7fff16e53ea293f3551b7147c33a44ea437fb1515c3e8d4f162fdebf8ebe11ae6fcd9372c8d8f19556ae091fe94215ae9434da412f6fa4cb6561e5f78ff9707844ee5d573fb294437722d9a06dfa61748c32c73d759933a8dd344c947d3efdbe90d0eb049df5fbb0c19f6785264b619c530d97395d44b04f7e2a280d658c7871ad373b792678c49227999651ef3b2ee1bc2b8f3035db376e8e09aa3837233c8713065a8ad131d24f6c42a3220d0e07c3d3e95d59a5dd10c09716b5f874ecf53aadfa5050ff40f2c3c4a629b6445e5836100afff5a8977583653b40ca316f8f11416e5c1bd5499636ddae25fc4970b37209cf5c0bf8e432160c258d14223baa52798e09858645773dd97e68a9531072713cff077b2e73e03ed4f145e9199c126a7f235e5674a3c7f5c7129ac7c1a3319590249b6d34ef6c3d8b94c6fc7cdcbddb053243053f7bc1f230d3bc7dfc4359e33992d0a3946b914a093287a76ac4a249b5b86cc75476466e409553355fefab75e9268a8751ffc9481fcff1f49c475699595b315e2147eebe8b7291600c6b1cf7c8f24d587b9464a67e5ccec17820e711b98f4f7d5053642068a3fff704c3fe35ba862b53e2622d6e8b4a4c815fb2ea90ef63e141209dd29254e5ab5bde9c6857b3cb184586049e7741b2d8b5b1a19e99e1834a25959155720c1c0ef84d9d3c42e1ba282847d476cef0228b1422aba08e5f3c1cd279bbd1c5303c2e9c16a0da4f88f770fca118b09e92b51a33970e32ade0c74eee1b31a420d7914c9d75db25855ae32798edc1b47e0f0f88429b2b60ae63", 0x2d5}], 0x1}, 0x0) 16:10:44 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b00", 0x10, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 81.201659][ T6316] loop3: detected capacity change from 0 to 65608 [ 81.204902][ T6316] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 81.206516][ T6316] EXT4-fs (loop3): group descriptors corrupted! 16:10:44 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b8008"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:44 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:44 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2d5}], 0x1}, 0x0) [ 81.247214][ T6336] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 81.262218][ T6340] loop2: detected capacity change from 0 to 65608 [ 81.265231][ T6340] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 81.266774][ T6340] EXT4-fs (loop2): group descriptors corrupted! [ 81.267472][ T6342] loop3: detected capacity change from 0 to 65608 [ 81.271599][ T6342] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 131072)! [ 81.274460][ T6342] EXT4-fs (loop3): group descriptors corrupted! [ 81.291533][ T6351] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 16:10:44 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:44 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b8008"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 81.365474][ T6365] PM: suspend entry (deep) [ 81.375449][ T6367] loop2: detected capacity change from 0 to 65608 [ 81.378125][ T6367] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 81.379925][ T6367] EXT4-fs (loop2): group descriptors corrupted! [ 81.381584][ T6366] loop3: detected capacity change from 0 to 65608 [ 81.381879][ T6370] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 81.386182][ T6366] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 81.387713][ T6366] EXT4-fs (loop3): group descriptors corrupted! [ 81.449784][ T6365] Filesystems sync: 0.082 seconds [ 81.450801][ T6365] Freezing user space processes ... (elapsed 0.095 seconds) done. [ 81.547584][ T6365] OOM killer disabled. [ 81.548411][ T6365] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 81.551439][ T6365] printk: Suspending console(s) (use no_console_suspend to debug) 16:10:45 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b8008"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:45 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2d5}], 0x1}, 0x0) 16:10:45 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x3}, 0x0) r0 = getpid() r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x5, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x1}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x3, 0x28, 0x5, 0x1ff, 0xfffffffffffffff9, 0x7, 0x3, 0x7, 0x7fff}, 0x0) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ftruncate(0xffffffffffffffff, 0x4) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x7, 0x3) 16:10:45 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b00", 0x10, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 81.599952][ T1768] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 82.112784][ T6365] ACPI: Preparing to enter system sleep state S3 [ 82.112855][ T6365] PM: Saving platform NVS memory [ 82.112904][ T6365] Disabling non-boot CPUs ... [ 82.116308][ T6365] smpboot: CPU 1 is now offline [ 82.119686][ T6365] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 82.119742][ T6365] ACPI: Low-level resume complete [ 82.119826][ T6365] PM: Restoring platform NVS memory [ 82.119835][ T6365] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 82.129017][ T6365] Enabling non-boot CPUs ... [ 82.129176][ T6365] x86: Booting SMP configuration: [ 82.129180][ T6365] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 82.129337][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 82.130368][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 82.132001][ T6365] CPU1 is up [ 82.132250][ T6365] ACPI: Waking up from system sleep state S3 [ 82.222686][ T6365] OOM killer enabled. [ 82.223253][ T6365] Restarting tasks ... done. [ 82.224651][ T6365] PM: suspend exit 16:10:45 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b800800"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:45 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 82.285529][ T6392] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 82.292311][ T6390] loop3: detected capacity change from 0 to 65608 [ 82.322881][ T6394] loop2: detected capacity change from 0 to 65608 [ 82.325454][ T6394] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 131072)! [ 82.327390][ T6394] EXT4-fs (loop2): group descriptors corrupted! [ 82.329936][ T6390] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 82.331471][ T6390] EXT4-fs (loop3): group descriptors corrupted! 16:10:45 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:45 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b800800"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2d5}], 0x1}, 0x0) [ 82.348540][ T6406] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 16:10:45 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:45 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:45 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b800800"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 82.404994][ T6414] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 82.418578][ T6419] loop2: detected capacity change from 0 to 65608 [ 82.421195][ T6419] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 82.422766][ T6419] EXT4-fs (loop2): group descriptors corrupted! [ 82.427155][ T6420] loop3: detected capacity change from 0 to 65608 [ 82.433462][ T6420] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 82.435105][ T6420] EXT4-fs (loop3): group descriptors corrupted! [ 82.506353][ T6438] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 16:10:46 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x3}, 0x0) r0 = getpid() r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x5, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x1}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x3, 0x28, 0x5, 0x1ff, 0xfffffffffffffff9, 0x7, 0x3, 0x7, 0x7fff}, 0x0) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ftruncate(0xffffffffffffffff, 0x4) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x7, 0x3) 16:10:46 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d09a0e63c9476288b671afdbd53a5994e137381f62021d1951b627b8dda57a5d17d744648c81c5703ed8146ab1b0171f89091b1dd3238d03dbb686df460963245dedf2013ee555af99499e44ad420dbf65fd46fbc99a1274429e2d5783751815828ec8cb3553110cca66460215353d19f6d8bbd8fb264eddea60b18e16c31aa5e200000491634ac2fd10e2cd30bcd7fede24263a7fff16e53ea293f3551b7147c33a44ea437fb1515c3e8d4f162fdebf8ebe11ae6fcd9372c8d8f19556ae091fe94215ae9434da412f6fa4cb6561e5f78ff9707844ee5d573fb294437722d9a06dfa61748c32c73d759933a8dd344c947d3efdbe90d0eb049df5fbb0c19f6785264b619c530d97395d44b04f7e2a280d658c7871ad373b792678c49227999651ef3b2ee1bc2b8f3035db376e8e09aa3837233c8713065a8ad131d24f6c42a3220d0e07c3d3e95d59a5dd10c09716b5f874ecf53aadfa5050ff40f2c3c4a629b6445e5836100afff5a8977583653b40ca316f8f11416e5c1bd5499636ddae25fc4970b37209cf5c0bf8e432160c258d14223baa52798e09858645773dd97e68a9531072713cff077b2e73e03ed4f145e9199c126a7f235e5674a3c7f5c7129ac7c1a3319590249b6d34ef6c3d8b94c6fc7cdcbddb053243053f7bc1f230d3bc7dfc4359e33992d0a3946b914a093287a76ac4a249b5b86cc75476466e409553355fefab75e9268a8751ffc9481fcff1f49c475699595b315e2147eebe8b7291600c6b1cf7c8f24d587b9464a67e5ccec17820e711b98f4f7d5053642068a3fff704c3fe35ba862b53e2622d6e8b4a4c815fb2ea90ef63e141209dd29254e5ab5bde9c6857b3cb184586049e7741b2d8b5b1a19e99e1834a25959155720c1c0ef84d9d3c42e1ba282847d476cef0228b1422aba08e5f3c1cd279bbd1c5303c2e9c16a0da4f88f770fca118b09e92b51a33970e32ade0c74eee1b31a420d7914c9d75db25855ae32798edc1b47e0f0f88429b2b60ae63", 0x2d5}], 0x1}, 0x0) 16:10:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:46 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="0200000003000018", 0x8, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:46 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:46 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:46 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:46 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 83.149036][ T6447] loop2: detected capacity change from 0 to 65608 [ 83.156073][ T6449] loop3: detected capacity change from 0 to 65608 [ 83.158921][ T6447] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 83.160462][ T6447] EXT4-fs (loop2): group descriptors corrupted! [ 83.161998][ T6449] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 131072)! [ 83.163847][ T6449] EXT4-fs (loop3): group descriptors corrupted! 16:10:46 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:46 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:46 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:46 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 83.265656][ T6479] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1555 sclass=netlink_route_socket pid=6479 comm=syz-executor.5 [ 83.281262][ T6481] loop3: detected capacity change from 0 to 65608 [ 83.284198][ T6481] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 83.287649][ T6481] EXT4-fs (loop3): group descriptors corrupted! 16:10:47 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x3}, 0x0) r0 = getpid() r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x5, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x1}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x3, 0x28, 0x5, 0x1ff, 0xfffffffffffffff9, 0x7, 0x3, 0x7, 0x7fff}, 0x0) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ftruncate(0xffffffffffffffff, 0x4) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x7, 0x3) 16:10:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:47 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a000000000000"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:47 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:47 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:47 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2d5}], 0x1}, 0x0) 16:10:47 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:47 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a000000000000"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 84.019747][ T6495] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1555 sclass=netlink_route_socket pid=6495 comm=syz-executor.5 [ 84.038428][ T6501] __nla_validate_parse: 26 callbacks suppressed [ 84.038443][ T6501] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.4'. [ 84.039180][ T6502] loop2: detected capacity change from 0 to 65608 [ 84.043999][ T6502] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 84.045951][ T6502] EXT4-fs (loop2): group descriptors corrupted! [ 84.059470][ T6503] loop3: detected capacity change from 0 to 65608 16:10:47 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a000000000000"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="0200000003000018", 0x8, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 84.069425][ T6503] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 84.071034][ T6503] EXT4-fs (loop3): group descriptors corrupted! [ 84.076022][ T6517] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1555 sclass=netlink_route_socket pid=6517 comm=syz-executor.5 [ 84.081151][ T6518] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.4'. 16:10:47 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:47 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 84.121165][ T6525] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.4'. [ 84.143002][ T6529] loop3: detected capacity change from 0 to 65608 [ 84.145219][ T6532] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1555 sclass=netlink_route_socket pid=6532 comm=syz-executor.5 [ 84.154638][ T6529] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 84.156569][ T6529] EXT4-fs (loop3): group descriptors corrupted! [ 84.169746][ T6535] loop2: detected capacity change from 0 to 65608 [ 84.172645][ T6535] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 131072)! [ 84.174407][ T6535] EXT4-fs (loop2): group descriptors corrupted! 16:10:48 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:48 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00"/37], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:48 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x3}, 0x0) r0 = getpid() r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x5, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x1}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x3, 0x28, 0x5, 0x1ff, 0xfffffffffffffff9, 0x7, 0x3, 0x7, 0x7fff}, 0x0) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ftruncate(0xffffffffffffffff, 0x4) r4 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r4, r4, &(0x7f0000000000)=0x7, 0x3) 16:10:48 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000", 0x4, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:48 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2d5}], 0x1}, 0x0) 16:10:48 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:48 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:48 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00"/37], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 84.908563][ T6552] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1555 sclass=netlink_route_socket pid=6552 comm=syz-executor.5 [ 84.918273][ T6551] loop2: detected capacity change from 0 to 65608 [ 84.919518][ T6557] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.4'. [ 84.922293][ T6551] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 84.923898][ T6551] EXT4-fs (loop2): group descriptors corrupted! [ 84.925972][ T6556] loop3: detected capacity change from 0 to 65608 [ 84.928839][ T6556] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 131072)! [ 84.930773][ T6556] EXT4-fs (loop3): group descriptors corrupted! 16:10:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 84.973887][ T6567] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1555 sclass=netlink_route_socket pid=6567 comm=syz-executor.5 [ 84.977309][ T6568] PM: suspend entry (deep) [ 84.990339][ T6568] Filesystems sync: 0.012 seconds [ 84.994847][ T6568] Freezing user space processes ... (elapsed 0.007 seconds) done. [ 85.004165][ T6568] OOM killer disabled. [ 85.005179][ T6568] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 85.007688][ T6568] printk: Suspending console(s) (use no_console_suspend to debug) 16:10:48 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d", 0xc, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 85.044461][ T6318] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 85.551442][ T6568] ACPI: Preparing to enter system sleep state S3 [ 85.551503][ T6568] PM: Saving platform NVS memory [ 85.551507][ T6568] Disabling non-boot CPUs ... [ 85.554718][ T6568] smpboot: CPU 1 is now offline [ 85.558138][ T6568] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 85.558197][ T6568] ACPI: Low-level resume complete [ 85.558273][ T6568] PM: Restoring platform NVS memory [ 85.558281][ T6568] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 85.568080][ T6568] Enabling non-boot CPUs ... [ 85.568282][ T6568] x86: Booting SMP configuration: [ 85.568285][ T6568] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 85.568465][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 85.569439][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 85.570958][ T6568] CPU1 is up [ 85.571226][ T6568] ACPI: Waking up from system sleep state S3 [ 85.674943][ T6568] OOM killer enabled. [ 85.675738][ T6568] Restarting tasks ... [ 85.681750][ T1037] synth uevent: /devices/virtual/block/loop2: failed to send uevent [ 85.684527][ T1037] block loop2: uevent: failed to send synthetic uevent [ 85.692243][ T6573] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.4'. [ 85.698148][ T6568] done. [ 85.698687][ T6568] PM: suspend exit [ 85.701709][ T6572] loop3: detected capacity change from 0 to 65608 [ 85.702674][ T6582] loop2: detected capacity change from 0 to 65608 16:10:48 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00"/37], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:48 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d", 0xc, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 85.708652][ T6582] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 85.711066][ T6582] EXT4-fs (loop2): group descriptors corrupted! [ 85.717239][ T6585] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 85.718871][ T6585] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 85.718959][ T6572] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 85.724490][ T6572] EXT4-fs (loop3): group descriptors corrupted! 16:10:48 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x3}, 0x0) r0 = getpid() r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x5, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x1}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x3, 0x28, 0x5, 0x1ff, 0xfffffffffffffff9, 0x7, 0x3, 0x7, 0x7fff}, 0x0) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) r4 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r4, r4, &(0x7f0000000000)=0x7, 0x3) 16:10:48 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:49 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00"/40], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:49 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, 0x0, 0x0) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2d5}], 0x1}, 0x0) [ 85.762607][ T6590] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.4'. 16:10:49 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d", 0xc, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:49 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00"/40], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 85.799319][ T6593] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 85.800690][ T6593] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 85.806877][ T6604] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.4'. [ 85.811488][ T6601] loop2: detected capacity change from 0 to 65608 [ 85.813909][ T6603] loop3: detected capacity change from 0 to 65608 [ 85.819061][ T6601] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 85.820857][ T6601] EXT4-fs (loop2): group descriptors corrupted! [ 85.822090][ T6603] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 85.823626][ T6603] EXT4-fs (loop3): group descriptors corrupted! [ 85.840616][ T6613] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 85.842081][ T6613] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. 16:10:49 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200", 0x12, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000", 0x4, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:49 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00"/40], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 85.854747][ T6616] PM: suspend entry (deep) [ 85.886149][ T6616] Filesystems sync: 0.030 seconds [ 85.887232][ T6616] Freezing user space processes ... (elapsed 0.003 seconds) done. [ 85.891421][ T6616] OOM killer disabled. [ 85.892373][ T6616] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 85.894953][ T6616] printk: Suspending console(s) (use no_console_suspend to debug) 16:10:49 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:49 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x3}, 0x0) r0 = getpid() r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x5, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x1}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x3, 0x28, 0x5, 0x1ff, 0xfffffffffffffff9, 0x7, 0x3, 0x7, 0x7fff}, 0x0) r4 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r4, r4, &(0x7f0000000000)=0x7, 0x3) [ 86.076999][ T203] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 86.576528][ T6616] ACPI: Preparing to enter system sleep state S3 [ 86.576623][ T6616] PM: Saving platform NVS memory [ 86.576627][ T6616] Disabling non-boot CPUs ... [ 86.578976][ T6616] smpboot: CPU 1 is now offline [ 86.582481][ T6616] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 86.582611][ T6616] ACPI: Low-level resume complete [ 86.582719][ T6616] PM: Restoring platform NVS memory [ 86.582728][ T6616] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 86.592835][ T6616] Enabling non-boot CPUs ... [ 86.592966][ T6616] x86: Booting SMP configuration: [ 86.592970][ T6616] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 86.593127][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 86.594076][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 86.595452][ T6616] CPU1 is up [ 86.595722][ T6616] ACPI: Waking up from system sleep state S3 [ 86.688355][ T6616] OOM killer enabled. [ 86.688899][ T6616] Restarting tasks ... [ 86.700825][ T1037] synth uevent: /devices/virtual/block/loop4: failed to send uevent [ 86.702744][ T1037] block loop4: uevent: failed to send synthetic uevent [ 86.706272][ T6616] done. [ 86.706954][ T6616] PM: suspend exit [ 86.713724][ T6625] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 86.715310][ T6626] loop2: detected capacity change from 0 to 65608 [ 86.717957][ T6626] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 131072)! [ 86.719770][ T6626] EXT4-fs (loop2): group descriptors corrupted! [ 86.721891][ T6630] loop3: detected capacity change from 0 to 65608 16:10:49 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:49 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200", 0x12, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 86.732426][ T6630] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 86.733943][ T6630] EXT4-fs (loop3): group descriptors corrupted! 16:10:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:50 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="0200", 0x2, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:50 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, 0x0, 0x0) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2d5}], 0x1}, 0x0) 16:10:50 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00"/40], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:50 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200", 0x12, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 86.788626][ T6646] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 86.796953][ T6647] loop2: detected capacity change from 0 to 65608 [ 86.799575][ T6647] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 86.801357][ T6647] EXT4-fs (loop2): group descriptors corrupted! [ 86.823851][ T6651] loop3: detected capacity change from 0 to 65608 16:10:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 86.854590][ T6651] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 131072)! [ 86.856955][ T6651] EXT4-fs (loop3): group descriptors corrupted! [ 86.859860][ T6653] PM: suspend entry (deep) [ 86.875836][ T6653] Filesystems sync: 0.014 seconds [ 86.880641][ T6653] Freezing user space processes ... (elapsed 0.023 seconds) done. [ 86.905273][ T6653] OOM killer disabled. [ 86.905923][ T6653] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 86.908455][ T6653] printk: Suspending console(s) (use no_console_suspend to debug) 16:10:51 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00"/40], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:51 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 87.319923][ T882] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 87.837914][ T6653] ACPI: Preparing to enter system sleep state S3 [ 87.838006][ T6653] PM: Saving platform NVS memory [ 87.838010][ T6653] Disabling non-boot CPUs ... [ 87.841416][ T6653] smpboot: CPU 1 is now offline [ 87.844629][ T6653] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 87.844708][ T6653] ACPI: Low-level resume complete [ 87.844822][ T6653] PM: Restoring platform NVS memory [ 87.844831][ T6653] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 87.855365][ T6653] Enabling non-boot CPUs ... [ 87.855580][ T6653] x86: Booting SMP configuration: [ 87.855584][ T6653] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 87.855789][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 87.856791][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 87.858273][ T6653] CPU1 is up [ 87.858485][ T6653] ACPI: Waking up from system sleep state S3 [ 87.966711][ T6653] OOM killer enabled. [ 87.967472][ T6653] Restarting tasks ... [ 87.971877][ T1037] synth uevent: /devices/virtual/block/loop2: failed to send uevent [ 87.973965][ T1037] block loop2: uevent: failed to send synthetic uevent 16:10:51 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a57802", 0x15, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 87.996760][ T6653] done. [ 87.999676][ T6653] PM: suspend exit [ 88.009399][ T6674] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 88.023801][ T6673] loop2: detected capacity change from 0 to 65608 [ 88.029144][ T6673] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 88.030580][ T6673] EXT4-fs (loop2): group descriptors corrupted! 16:10:51 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x3}, 0x0) getpid() r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x5, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x1}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) r3 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r3, r3, &(0x7f0000000000)=0x7, 0x3) 16:10:51 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:51 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00"/40], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 88.054494][ T6679] loop3: detected capacity change from 0 to 65608 [ 88.067157][ T6679] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 88.068614][ T6679] EXT4-fs (loop3): group descriptors corrupted! 16:10:51 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:51 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 88.106468][ T6692] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 88.119931][ T6694] loop2: detected capacity change from 0 to 65608 [ 88.135293][ T6697] PM: suspend entry (deep) [ 88.149895][ T6694] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 88.151904][ T6694] EXT4-fs (loop2): group descriptors corrupted! [ 88.156908][ T6697] Filesystems sync: 0.020 seconds [ 88.158104][ T6697] Freezing user space processes ... (elapsed 0.015 seconds) done. [ 88.174390][ T6697] OOM killer disabled. [ 88.175152][ T6697] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 88.177722][ T6697] printk: Suspending console(s) (use no_console_suspend to debug) 16:10:52 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, 0x0, 0x0) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2d5}], 0x1}, 0x0) 16:10:52 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a57802", 0x15, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="0200", 0x2, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 88.383223][ T6318] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 88.900945][ T6697] ACPI: Preparing to enter system sleep state S3 [ 88.901063][ T6697] PM: Saving platform NVS memory [ 88.901067][ T6697] Disabling non-boot CPUs ... [ 88.904599][ T6697] smpboot: CPU 1 is now offline [ 88.907925][ T6697] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 88.907984][ T6697] ACPI: Low-level resume complete [ 88.908079][ T6697] PM: Restoring platform NVS memory [ 88.908088][ T6697] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 88.921029][ T6697] Enabling non-boot CPUs ... [ 88.921335][ T6697] x86: Booting SMP configuration: [ 88.921339][ T6697] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 88.921604][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 88.922718][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 88.923931][ T6697] CPU1 is up [ 88.924178][ T6697] ACPI: Waking up from system sleep state S3 [ 89.026137][ T6697] OOM killer enabled. [ 89.026801][ T6697] Restarting tasks ... [ 89.029965][ T1037] synth uevent: /devices/virtual/block/loop5: failed to send uevent [ 89.032414][ T1037] block loop5: uevent: failed to send synthetic uevent [ 89.050195][ T6697] done. [ 89.050949][ T6697] PM: suspend exit [ 89.055974][ T6709] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 16:10:52 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x3}, 0x0) getpid() r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x5, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r2, r2, &(0x7f0000000000)=0x7, 0x3) 16:10:52 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a57802", 0x15, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:52 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:52 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a5780200", 0x16, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 89.069770][ T6703] loop3: detected capacity change from 0 to 65608 [ 89.076432][ T6703] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 89.078474][ T6703] EXT4-fs (loop3): group descriptors corrupted! [ 89.098798][ T6714] loop2: detected capacity change from 0 to 65608 [ 89.102105][ T6714] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 131072)! [ 89.104062][ T6714] EXT4-fs (loop2): group descriptors corrupted! [ 89.113937][ T6719] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 89.115489][ T6719] __nla_validate_parse: 12 callbacks suppressed [ 89.115501][ T6719] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. 16:10:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 89.144258][ T6727] loop3: detected capacity change from 0 to 65608 [ 89.147220][ T6727] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 89.148814][ T6727] EXT4-fs (loop3): group descriptors corrupted! [ 89.158478][ T6732] netlink: 37 bytes leftover after parsing attributes in process `syz-executor.4'. [ 89.174046][ T6735] PM: suspend entry (deep) [ 89.187693][ T6734] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 89.189294][ T6734] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 89.194066][ T6735] Filesystems sync: 0.018 seconds [ 89.195474][ T6735] Freezing user space processes ... (elapsed 0.007 seconds) done. [ 89.206224][ T6735] OOM killer disabled. [ 89.206892][ T6735] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 89.209905][ T6735] printk: Suspending console(s) (use no_console_suspend to debug) 16:10:53 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d09a0e63c9476288b671afdbd53a5994e137381f62021d1951b627b8dda57a5d17d744648c81c5703ed8146ab1b0171f89091b1dd3238d03dbb686df460963245dedf2013ee555af99499e44ad420dbf65fd46fbc99a1274429e2d5783751815828ec8cb3553110cca66460215353d19f6d8bbd8fb264eddea60b18e16c31aa5e200000491634ac2fd10e2cd30bcd7fede24263a7fff16e53ea293f3551b7147c33a44ea437fb1515c3e8d4f162fdebf8ebe11ae6fcd9372c8d8f19556ae091fe94215ae9434da412f6fa4cb6561e5f78ff9707844ee5d573fb294437722d9a06dfa61748c32c73d759933a8dd344c947d3efdbe90d0eb049df5fbb0c19f6785264b619c530d97395d44b04f7e2a280d658c7871ad373b792678c49227999651ef3b2ee1bc2b8f3035db376e8e09aa3837233c8713065a8ad131d24f6c42a3220d0e07c3d3e95d59a5dd10c09716b5f874ecf53aadfa5050ff40f2c3c4a629b6445e5836100afff5a8977583653b40ca316f8f11416e5c1bd5499636ddae25fc4970b37209cf5c0bf8e432160c258d14223baa52798e09858645773dd97e68a9531072713cff077b2e73e03ed4f145e9199c126a7f235e5674a3c7f5c7129ac7c1a3319590249b6d34ef6c3d8b94c6fc7cdcbddb053243053f7bc1f230d3bc7dfc4359e33992d0a3946b914a093287a76ac4a249b5b86cc75476466e409553355fefab75e9268a8751ffc9481fcff1f49c475699595b315e2147eebe8b7291600c6b1cf7c8f24d587b9464a67e5ccec17820e711b98f4f7d5053642068a3fff704c3fe35ba862b53e2622d6e8b4a4c815fb2ea90ef63e141209dd29254e5ab5bde9c6857b3cb184586049e7741b2d8b5b1a19e99e1834a25959155720c1c0ef84d9d3c42e1ba282847d476cef0228b1422aba08e5f3c1cd279bbd1c5303c2e9c16a0da4f88f770fca118b09e92b51a33970e32ade0c74eee1b31a420d7914c9d75db25855ae32798edc1b47e0f0f88429b2b60ae63", 0x2d5}], 0x1}, 0x0) 16:10:53 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:53 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a5780200", 0x16, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 89.429358][ T1768] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 89.931768][ T6735] ACPI: Preparing to enter system sleep state S3 [ 89.931843][ T6735] PM: Saving platform NVS memory [ 89.931846][ T6735] Disabling non-boot CPUs ... [ 89.934172][ T6735] smpboot: CPU 1 is now offline [ 89.937661][ T6735] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 89.937716][ T6735] ACPI: Low-level resume complete [ 89.937804][ T6735] PM: Restoring platform NVS memory [ 89.937890][ T6735] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 89.948180][ T6735] Enabling non-boot CPUs ... [ 89.948382][ T6735] x86: Booting SMP configuration: [ 89.948439][ T6735] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 89.948602][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 89.949601][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 89.950871][ T6735] CPU1 is up [ 89.951115][ T6735] ACPI: Waking up from system sleep state S3 [ 90.044501][ T6735] OOM killer enabled. 16:10:53 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x3}, 0x0) getpid() r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x5, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0x7, 0x3) [ 90.045222][ T6735] Restarting tasks ... [ 90.089744][ T1037] synth uevent: /devices/virtual/block/loop2: failed to send uevent [ 90.092602][ T1037] block loop2: uevent: failed to send synthetic uevent [ 90.098666][ T6735] done. [ 90.099761][ T6735] PM: suspend exit [ 90.113651][ T6752] netlink: 37 bytes leftover after parsing attributes in process `syz-executor.4'. [ 90.117035][ T6748] loop3: detected capacity change from 0 to 65608 [ 90.123869][ T6753] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 90.129113][ T6748] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 131072)! [ 90.131190][ T6748] EXT4-fs (loop3): group descriptors corrupted! [ 90.138457][ T6756] loop2: detected capacity change from 0 to 65608 16:10:53 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a5780200", 0x16, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:53 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2d5}], 0x1}, 0x0) [ 90.145149][ T6756] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 90.146711][ T6756] EXT4-fs (loop2): group descriptors corrupted! 16:10:53 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:53 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:53 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 90.191266][ T6767] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 90.208276][ T6763] PM: suspend entry (deep) [ 90.218093][ T6763] Filesystems sync: 0.008 seconds [ 90.219429][ T6763] Freezing user space processes ... (elapsed 0.003 seconds) done. [ 90.224220][ T6763] OOM killer disabled. [ 90.225127][ T6763] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 90.227710][ T6763] printk: Suspending console(s) (use no_console_suspend to debug) 16:10:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 90.672935][ T1766] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 91.181161][ T6763] ACPI: Preparing to enter system sleep state S3 [ 91.181236][ T6763] PM: Saving platform NVS memory [ 91.181239][ T6763] Disabling non-boot CPUs ... [ 91.184533][ T6763] smpboot: CPU 1 is now offline [ 91.188086][ T6763] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 91.188143][ T6763] ACPI: Low-level resume complete [ 91.188262][ T6763] PM: Restoring platform NVS memory [ 91.188276][ T6763] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 91.199170][ T6763] Enabling non-boot CPUs ... [ 91.199317][ T6763] x86: Booting SMP configuration: [ 91.199322][ T6763] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 91.199484][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 91.200506][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 91.202066][ T6763] CPU1 is up [ 91.202264][ T6763] ACPI: Waking up from system sleep state S3 [ 91.305157][ T6763] OOM killer enabled. [ 91.305721][ T6763] Restarting tasks ... done. [ 91.315632][ T6763] PM: suspend exit [ 91.317052][ T6775] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 91.335097][ T6774] netlink: 37 bytes leftover after parsing attributes in process `syz-executor.4'. [ 91.337212][ T6777] loop3: detected capacity change from 0 to 65608 16:10:54 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x3}, 0x0) getpid() r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x5, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0x7, 0x3) 16:10:54 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d09a0e63c9476288b671afdbd53a5994e137381f62021d1951b627b8dda57a5d17d744648c81c5703ed8146ab1b0171f89091b1dd3238d03dbb686df460963245dedf2013ee555af99499e44ad420dbf65fd46fbc99a1274429e2d5783751815828ec8cb3553110cca66460215353d19f6d8bbd8fb264eddea60b18e16c31aa5e200000491634ac2fd10e2cd30bcd7fede24263a7fff16e53ea293f3551b7147c33a44ea437fb1515c3e8d4f162fdebf8ebe11ae6fcd9372c8d8f19556ae091fe94215ae9434da412f6fa4cb6561e5f78ff9707844ee5d573fb294437722d9a06dfa61748c32c73d759933a8dd344c947d3efdbe90d0eb049df5fbb0c19f6785264b619c530d97395d44b04f7e2a280d658c7871ad373b792678c49227999651ef3b2ee1bc2b8f3035db376e8e09aa3837233c8713065a8ad131d24f6c42a3220d0e07c3d3e95d59a5dd10c09716b5f874ecf53aadfa5050ff40f2c3c4a629b6445e5836100afff5a8977583653b40ca316f8f11416e5c1bd5499636ddae25fc4970b37209cf5c0bf8e432160c258d14223baa52798e09858645773dd97e68a9531072713cff077b2e73e03ed4f145e9199c126a7f235e5674a3c7f5c7129ac7c1a3319590249b6d34ef6c3d8b94c6fc7cdcbddb053243053f7bc1f230d3bc7dfc4359e33992d0a3946b914a093287a76ac4a249b5b86cc75476466e409553355fefab75e9268a8751ffc9481fcff1f49c475699595b315e2147eebe8b7291600c6b1cf7c8f24d587b9464a67e5ccec17820e711b98f4f7d5053642068a3fff704c3fe35ba862b53e2622d6e8b4a4c815fb2ea90ef63e141209dd29254e5ab5bde9c6857b3cb184586049e7741b2d8b5b1a19e99e1834a25959155720c1c0ef84d9d3c42e1ba282847d476cef0228b1422aba08e5f3c1cd279bbd1c5303c2e9c16a0da4f88f770fca118b09e92b51a33970e32ade0c74eee1b31a420d7914c9d75db25855ae32798edc1b47e0f0f88429b2b60ae63", 0x2d5}], 0x1}, 0x0) 16:10:54 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:54 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, 0x0, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d09a0e63c9476288b671afdbd53a5994e137381f62021d1951b627b8dda57a5d17d744648c81c5703ed8146ab1b0171f89091b1dd3238d03dbb686df460963245dedf2013ee555af99499e44ad420dbf65fd46fbc99a1274429e2d5783751815828ec8cb3553110cca66460215353d19f6d8bbd8fb264eddea60b18e16c31aa5e200000491634ac2fd10e2cd30bcd7fede24263a7fff16e53ea293f3551b7147c33a44ea437fb1515c3e8d4f162fdebf8ebe11ae6fcd9372c8d8f19556ae091fe94215ae9434da412f6fa4cb6561e5f78ff9707844ee5d573fb294437722d9a06dfa61748c32c73d759933a8dd344c947d3efdbe90d0eb049df5fbb0c19f6785264b619c530d97395d44b04f7e2a280d658c7871ad373b792678c49227999651ef3b2ee1bc2b8f3035db376e8e09aa3837233c8713065a8ad131d24f6c42a3220d0e07c3d3e95d59a5dd10c09716b5f874ecf53aadfa5050ff40f2c3c4a629b6445e5836100afff5a8977583653b40ca316f8f11416e5c1bd5499636ddae25fc4970b37209cf5c0bf8e432160c258d14223baa52798e09858645773dd97e68a9531072713cff077b2e73e03ed4f145e9199c126a7f235e5674a3c7f5c7129ac7c1a3319590249b6d34ef6c3d8b94c6fc7cdcbddb053243053f7bc1f230d3bc7dfc4359e33992d0a3946b914a093287a76ac4a249b5b86cc75476466e409553355fefab75e9268a8751ffc9481fcff1f49c475699595b315e2147eebe8b7291600c6b1cf7c8f24d587b9464a67e5ccec17820e711b98f4f7d5053642068a3fff704c3fe35ba862b53e2622d6e8b4a4c815fb2ea90ef63e141209dd29254e5ab5bde9c6857b3cb184586049e7741b2d8b5b1a19e99e1834a25959155720c1c0ef84d9d3c42e1ba282847d476cef0228b1422aba08e5f3c1cd279bbd1c5303c2e9c16a0da4f88f770fca118b09e92b51a33970e32ade0c74eee1b31a420d7914c9d75db25855ae32798edc1b47e0f0f88429b2b60ae63", 0x2d5}], 0x1}, 0x0) [ 91.347221][ T6777] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 91.348956][ T6777] EXT4-fs (loop3): group descriptors corrupted! [ 91.356134][ T6781] loop2: detected capacity change from 0 to 65608 [ 91.372942][ T6781] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 91.374614][ T6781] EXT4-fs (loop2): group descriptors corrupted! [ 91.396396][ T6791] PM: suspend entry (deep) [ 91.411296][ T6791] Filesystems sync: 0.013 seconds [ 91.413436][ T6791] Freezing user space processes ... [ 91.413989][ T1037] synth uevent: /devices/virtual/block/loop5: failed to send uevent [ 91.414618][ T6796] loop3: detected capacity change from 0 to 65608 [ 91.414792][ T1037] block loop5: uevent: failed to send synthetic uevent [ 91.435766][ T6791] (elapsed 0.022 seconds) done. [ 91.436822][ T6791] OOM killer disabled. [ 91.437443][ T6791] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 91.440125][ T6791] printk: Suspending console(s) (use no_console_suspend to debug) 16:10:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 91.517782][ T8] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 92.025064][ T6791] ACPI: Preparing to enter system sleep state S3 [ 92.025196][ T6791] PM: Saving platform NVS memory [ 92.025200][ T6791] Disabling non-boot CPUs ... [ 92.027767][ T6791] smpboot: CPU 1 is now offline [ 92.031354][ T6791] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 92.031460][ T6791] ACPI: Low-level resume complete [ 92.031547][ T6791] PM: Restoring platform NVS memory [ 92.031557][ T6791] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 92.042025][ T6791] Enabling non-boot CPUs ... [ 92.042279][ T6791] x86: Booting SMP configuration: [ 92.042283][ T6791] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 92.042513][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 92.043596][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 92.044928][ T6791] CPU1 is up [ 92.045165][ T6791] ACPI: Waking up from system sleep state S3 [ 92.927827][ T6791] OOM killer enabled. [ 92.928479][ T6791] Restarting tasks ... [ 92.938952][ T1037] synth uevent: /devices/virtual/block/loop4: failed to send uevent [ 92.940913][ T1037] block loop4: uevent: failed to send synthetic uevent [ 92.942141][ T6791] done. [ 92.942601][ T6791] PM: suspend exit [ 92.943773][ T6792] netlink: 37 bytes leftover after parsing attributes in process `syz-executor.4'. [ 92.946886][ T6801] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 92.952010][ T6796] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 92.953606][ T6796] EXT4-fs (loop3): group descriptors corrupted! 16:10:56 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:56 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, 0x0, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d09a0e63c9476288b671afdbd53a5994e137381f62021d1951b627b8dda57a5d17d744648c81c5703ed8146ab1b0171f89091b1dd3238d03dbb686df460963245dedf2013ee555af99499e44ad420dbf65fd46fbc99a1274429e2d5783751815828ec8cb3553110cca66460215353d19f6d8bbd8fb264eddea60b18e16c31aa5e200000491634ac2fd10e2cd30bcd7fede24263a7fff16e53ea293f3551b7147c33a44ea437fb1515c3e8d4f162fdebf8ebe11ae6fcd9372c8d8f19556ae091fe94215ae9434da412f6fa4cb6561e5f78ff9707844ee5d573fb294437722d9a06dfa61748c32c73d759933a8dd344c947d3efdbe90d0eb049df5fbb0c19f6785264b619c530d97395d44b04f7e2a280d658c7871ad373b792678c49227999651ef3b2ee1bc2b8f3035db376e8e09aa3837233c8713065a8ad131d24f6c42a3220d0e07c3d3e95d59a5dd10c09716b5f874ecf53aadfa5050ff40f2c3c4a629b6445e5836100afff5a8977583653b40ca316f8f11416e5c1bd5499636ddae25fc4970b37209cf5c0bf8e432160c258d14223baa52798e09858645773dd97e68a9531072713cff077b2e73e03ed4f145e9199c126a7f235e5674a3c7f5c7129ac7c1a3319590249b6d34ef6c3d8b94c6fc7cdcbddb053243053f7bc1f230d3bc7dfc4359e33992d0a3946b914a093287a76ac4a249b5b86cc75476466e409553355fefab75e9268a8751ffc9481fcff1f49c475699595b315e2147eebe8b7291600c6b1cf7c8f24d587b9464a67e5ccec17820e711b98f4f7d5053642068a3fff704c3fe35ba862b53e2622d6e8b4a4c815fb2ea90ef63e141209dd29254e5ab5bde9c6857b3cb184586049e7741b2d8b5b1a19e99e1834a25959155720c1c0ef84d9d3c42e1ba282847d476cef0228b1422aba08e5f3c1cd279bbd1c5303c2e9c16a0da4f88f770fca118b09e92b51a33970e32ade0c74eee1b31a420d7914c9d75db25855ae32798edc1b47e0f0f88429b2b60ae63", 0x2d5}], 0x1}, 0x0) 16:10:56 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:56 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x3}, 0x0) getpid() r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x5, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0x7, 0x3) [ 93.007317][ T6805] loop2: detected capacity change from 0 to 65608 16:10:56 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={0x0, 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:56 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, 0x0, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d09a0e63c9476288b671afdbd53a5994e137381f62021d1951b627b8dda57a5d17d744648c81c5703ed8146ab1b0171f89091b1dd3238d03dbb686df460963245dedf2013ee555af99499e44ad420dbf65fd46fbc99a1274429e2d5783751815828ec8cb3553110cca66460215353d19f6d8bbd8fb264eddea60b18e16c31aa5e200000491634ac2fd10e2cd30bcd7fede24263a7fff16e53ea293f3551b7147c33a44ea437fb1515c3e8d4f162fdebf8ebe11ae6fcd9372c8d8f19556ae091fe94215ae9434da412f6fa4cb6561e5f78ff9707844ee5d573fb294437722d9a06dfa61748c32c73d759933a8dd344c947d3efdbe90d0eb049df5fbb0c19f6785264b619c530d97395d44b04f7e2a280d658c7871ad373b792678c49227999651ef3b2ee1bc2b8f3035db376e8e09aa3837233c8713065a8ad131d24f6c42a3220d0e07c3d3e95d59a5dd10c09716b5f874ecf53aadfa5050ff40f2c3c4a629b6445e5836100afff5a8977583653b40ca316f8f11416e5c1bd5499636ddae25fc4970b37209cf5c0bf8e432160c258d14223baa52798e09858645773dd97e68a9531072713cff077b2e73e03ed4f145e9199c126a7f235e5674a3c7f5c7129ac7c1a3319590249b6d34ef6c3d8b94c6fc7cdcbddb053243053f7bc1f230d3bc7dfc4359e33992d0a3946b914a093287a76ac4a249b5b86cc75476466e409553355fefab75e9268a8751ffc9481fcff1f49c475699595b315e2147eebe8b7291600c6b1cf7c8f24d587b9464a67e5ccec17820e711b98f4f7d5053642068a3fff704c3fe35ba862b53e2622d6e8b4a4c815fb2ea90ef63e141209dd29254e5ab5bde9c6857b3cb184586049e7741b2d8b5b1a19e99e1834a25959155720c1c0ef84d9d3c42e1ba282847d476cef0228b1422aba08e5f3c1cd279bbd1c5303c2e9c16a0da4f88f770fca118b09e92b51a33970e32ade0c74eee1b31a420d7914c9d75db25855ae32798edc1b47e0f0f88429b2b60ae63", 0x2d5}], 0x1}, 0x0) 16:10:56 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 93.042348][ T6805] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 93.044285][ T6805] EXT4-fs (loop2): group descriptors corrupted! [ 93.061343][ T6820] PM: suspend entry (deep) [ 93.067685][ T6820] Filesystems sync: 0.005 seconds [ 93.081880][ T6820] Freezing user space processes ... (elapsed 0.007 seconds) done. [ 93.091293][ T6820] OOM killer disabled. [ 93.091968][ T6820] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 93.094355][ T6820] printk: Suspending console(s) (use no_console_suspend to debug) 16:10:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 93.161689][ T203] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 93.676398][ T6820] ACPI: Preparing to enter system sleep state S3 [ 93.676464][ T6820] PM: Saving platform NVS memory [ 93.676468][ T6820] Disabling non-boot CPUs ... [ 93.680068][ T6820] smpboot: CPU 1 is now offline [ 93.683791][ T6820] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 93.683846][ T6820] ACPI: Low-level resume complete [ 93.683929][ T6820] PM: Restoring platform NVS memory [ 93.683938][ T6820] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 93.694559][ T6820] Enabling non-boot CPUs ... [ 93.694715][ T6820] x86: Booting SMP configuration: [ 93.694785][ T6820] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 93.694953][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 93.695808][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 93.697304][ T6820] CPU1 is up [ 93.697502][ T6820] ACPI: Waking up from system sleep state S3 [ 93.911512][ T6820] OOM killer enabled. [ 93.912215][ T6820] Restarting tasks ... [ 93.918456][ T1037] synth uevent: /devices/virtual/block/loop4: failed to send uevent [ 93.920544][ T1037] block loop4: uevent: failed to send synthetic uevent [ 93.928281][ T6820] done. [ 93.929370][ T6820] PM: suspend exit 16:10:57 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x3}, 0x0) getpid() getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x318, 0x0) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0x7, 0x3) 16:10:57 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2d5}], 0x1}, 0x0) 16:10:57 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={0x0, 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:57 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:57 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02", 0x1}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:57 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={0x0, 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:57 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 93.944852][ T6822] loop3: detected capacity change from 0 to 65608 [ 93.951374][ T6822] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 93.952976][ T6822] EXT4-fs (loop3): group descriptors corrupted! [ 93.978331][ T6834] loop2: detected capacity change from 0 to 65608 [ 93.981930][ T6834] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 131072)! [ 93.983617][ T6834] EXT4-fs (loop2): group descriptors corrupted! 16:10:57 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:57 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:57 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02", 0x1}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 94.034476][ T6853] loop3: detected capacity change from 0 to 65608 [ 94.037514][ T6853] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 94.039225][ T6853] EXT4-fs (loop3): group descriptors corrupted! 16:10:57 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 94.091409][ T6864] PM: suspend entry (deep) [ 94.105203][ T6864] Filesystems sync: 0.012 seconds [ 94.106734][ T6864] Freezing user space processes ... (elapsed 0.007 seconds) done. [ 94.115670][ T6864] OOM killer disabled. [ 94.116367][ T6864] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 94.119049][ T6864] printk: Suspending console(s) (use no_console_suspend to debug) [ 94.565305][ T1766] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 95.071120][ T6864] ACPI: Preparing to enter system sleep state S3 [ 95.071189][ T6864] PM: Saving platform NVS memory [ 95.071193][ T6864] Disabling non-boot CPUs ... [ 95.074484][ T6864] smpboot: CPU 1 is now offline [ 95.077805][ T6864] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 95.077863][ T6864] ACPI: Low-level resume complete [ 95.077945][ T6864] PM: Restoring platform NVS memory [ 95.077954][ T6864] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 95.087862][ T6864] Enabling non-boot CPUs ... [ 95.088127][ T6864] x86: Booting SMP configuration: [ 95.088130][ T6864] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 95.088343][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 95.089407][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 95.090796][ T6864] CPU1 is up [ 95.090933][ T6864] ACPI: Waking up from system sleep state S3 [ 95.189671][ T6864] OOM killer enabled. [ 95.190246][ T6864] Restarting tasks ... [ 95.204372][ T1037] synth uevent: /devices/virtual/block/loop5: failed to send uevent [ 95.205807][ T6864] done. [ 95.206384][ T1037] block loop5: uevent: failed to send synthetic uevent [ 95.210938][ T6874] __nla_validate_parse: 9 callbacks suppressed [ 95.210993][ T6874] netlink: 37 bytes leftover after parsing attributes in process `syz-executor.4'. [ 95.214471][ T6864] PM: suspend exit [ 95.216828][ T6869] loop2: detected capacity change from 0 to 65608 [ 95.219597][ T6869] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 95.221102][ T6869] EXT4-fs (loop2): group descriptors corrupted! 16:10:58 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x3}, 0x0) getpid() getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x318, 0x0) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0x7, 0x3) 16:10:58 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d09a0e63c9476288b671afdbd53a5994e137381f62021d1951b627b8dda57a5d17d744648c81c5703ed8146ab1b0171f89091b1dd3238d03dbb686df460963245dedf2013ee555af99499e44ad420dbf65fd46fbc99a1274429e2d5783751815828ec8cb3553110cca66460215353d19f6d8bbd8fb264eddea60b18e16c31aa5e200000491634ac2fd10e2cd30bcd7fede24263a7fff16e53ea293f3551b7147c33a44ea437fb1515c3e8d4f162fdebf8ebe11ae6fcd9372c8d8f19556ae091fe94215ae9434da412f6fa4cb6561e5f78ff9707844ee5d573fb294437722d9a06dfa61748c32c73d759933a8dd344c947d3efdbe90d0eb049df5fbb0c19f6785264b619c530d97395d44b04f7e2a280d658c7871ad373b792678c49227999651ef3b2ee1bc2b8f3035db376e8e09aa3837233c8713065a8ad131d24f6c42a3220d0e07c3d3e95d59a5dd10c09716b5f874ecf53aadfa5050ff40f2c3c4a629b6445e5836100afff5a8977583653b40ca316f8f11416e5c1bd5499636ddae25fc4970b37209cf5c0bf8e432160c258d14223baa52798e09858645773dd97e68a9531072713cff077b2e73e03ed4f145e9199c126a7f235e5674a3c7f5c7129ac7c1a3319590249b6d34ef6c3d8b94c6fc7cdcbddb053243053f7bc1f230d3bc7dfc4359e33992d0a3946b914a093287a76ac4a249b5b86cc75476466e409553355fefab75e9268a8751ffc9481fcff1f49c475699595b315e2147eebe8b7291600c6b1cf7c8f24d587b9464a67e5ccec17820e711b98f4f7d5053642068a3fff704c3fe35ba862b53e2622d6e8b4a4c815fb2ea90ef63e141209dd29254e5ab5bde9c6857b3cb184586049e7741b2d8b5b1a19e99e1834a25959155720c1c0ef84d9d3c42e1ba282847d476cef0228b1422aba08e5f3c1cd279bbd1c5303c2e9c16a0da4f88f770fca118b09e92b51a33970e32ade0c74eee1b31a420d7914c9d75db25855ae32798edc1b47e0f0f88429b2b60ae63", 0x2d5}], 0x1}, 0x0) 16:10:58 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:58 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="130000", 0x3, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:58 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 95.229736][ T6873] loop3: detected capacity change from 0 to 65608 [ 95.233772][ T6873] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 95.235216][ T6873] EXT4-fs (loop3): group descriptors corrupted! [ 95.253165][ T6882] netlink: 37 bytes leftover after parsing attributes in process `syz-executor.4'. 16:10:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02", 0x1}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:10:58 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="130000", 0x3, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:58 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 95.293396][ T6889] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 95.303475][ T6894] netlink: 37 bytes leftover after parsing attributes in process `syz-executor.4'. [ 95.330268][ T6898] loop3: detected capacity change from 0 to 65608 [ 95.334145][ T6898] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 95.335551][ T6898] EXT4-fs (loop3): group descriptors corrupted! [ 95.338868][ T6899] loop2: detected capacity change from 0 to 65608 16:10:58 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:58 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c00000009060000000140000000000000000000"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 95.344004][ T6908] netlink: 37 bytes leftover after parsing attributes in process `syz-executor.4'. [ 95.355361][ T6899] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 95.356987][ T6899] EXT4-fs (loop2): group descriptors corrupted! [ 95.371432][ T6915] netlink: 37 bytes leftover after parsing attributes in process `syz-executor.4'. [ 95.378920][ T6913] PM: suspend entry (deep) [ 95.389865][ T6913] Filesystems sync: 0.010 seconds [ 95.391118][ T6913] Freezing user space processes ... (elapsed 0.014 seconds) done. [ 95.407385][ T6913] OOM killer disabled. [ 95.408070][ T6913] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 95.410556][ T6913] printk: Suspending console(s) (use no_console_suspend to debug) 16:10:59 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 95.828247][ T8] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 96.351930][ T6913] ACPI: Preparing to enter system sleep state S3 [ 96.351999][ T6913] PM: Saving platform NVS memory [ 96.352003][ T6913] Disabling non-boot CPUs ... [ 96.355283][ T6913] smpboot: CPU 1 is now offline [ 96.358326][ T6913] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 96.358410][ T6913] ACPI: Low-level resume complete [ 96.358495][ T6913] PM: Restoring platform NVS memory [ 96.358504][ T6913] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 96.368345][ T6913] Enabling non-boot CPUs ... [ 96.368505][ T6913] x86: Booting SMP configuration: [ 96.368513][ T6913] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 96.368672][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 96.369653][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 96.371389][ T6913] CPU1 is up [ 96.371722][ T6913] ACPI: Waking up from system sleep state S3 [ 96.418137][ T6918] hwrng: no data available [ 96.469927][ T6913] OOM killer enabled. [ 96.470629][ T6913] Restarting tasks ... done. [ 96.474095][ T6913] PM: suspend exit [ 96.482040][ T6919] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 96.484077][ T6921] netlink: 37 bytes leftover after parsing attributes in process `syz-executor.4'. 16:10:59 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x3}, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x318, 0x0) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0x7, 0x3) 16:10:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 96.514367][ T6924] loop3: detected capacity change from 0 to 65608 [ 96.516899][ T6924] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 131072)! [ 96.518527][ T6924] EXT4-fs (loop3): group descriptors corrupted! [ 96.538205][ T6932] loop2: detected capacity change from 0 to 65608 [ 96.554921][ T6932] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 96.556598][ T6932] EXT4-fs (loop2): group descriptors corrupted! 16:10:59 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="130000", 0x3, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:59 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2d5}], 0x1}, 0x0) 16:10:59 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c00000009060000000140000000000000000000"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:10:59 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 96.609924][ T6944] netlink: 37 bytes leftover after parsing attributes in process `syz-executor.4'. [ 96.614369][ T6940] PM: suspend entry (deep) [ 96.622896][ T6940] Filesystems sync: 0.007 seconds [ 96.624130][ T6940] Freezing user space processes ... (elapsed 0.006 seconds) done. [ 96.631919][ T6940] OOM killer disabled. [ 96.632664][ T6940] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 96.635675][ T6940] printk: Suspending console(s) (use no_console_suspend to debug) 16:11:10 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="13000000", 0x4, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:10 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c00000009060000000140000000000000000000"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 96.870584][ T22] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 106.644051][ T6940] ACPI: Preparing to enter system sleep state S3 [ 106.644203][ T6940] PM: Saving platform NVS memory [ 106.644208][ T6940] Disabling non-boot CPUs ... [ 106.647637][ T6940] smpboot: CPU 1 is now offline [ 106.651001][ T6940] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 106.651058][ T6940] ACPI: Low-level resume complete [ 106.651158][ T6940] PM: Restoring platform NVS memory [ 106.651170][ T6940] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 106.661704][ T6940] Enabling non-boot CPUs ... [ 106.661922][ T6940] x86: Booting SMP configuration: [ 106.661926][ T6940] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 106.662144][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 106.663282][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 106.664880][ T6940] CPU1 is up [ 106.665004][ T6940] ACPI: Waking up from system sleep state S3 [ 106.764671][ T6940] OOM killer enabled. [ 106.765302][ T6940] Restarting tasks ... done. [ 106.767846][ T6940] PM: suspend exit 16:11:10 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, 0x0, 0x0) 16:11:10 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c0000000906000000014000000000000000000005000100070000001000"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:10 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 106.803740][ T6952] netlink: 37 bytes leftover after parsing attributes in process `syz-executor.4'. 16:11:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02", 0x1}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:10 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x3}, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x318, 0x0) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0x7, 0x3) 16:11:10 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="13000000", 0x4, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:10 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c0000000906000000014000000000000000000005000100070000001000"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:10 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 106.843332][ T6957] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 106.849097][ T6960] netlink: 37 bytes leftover after parsing attributes in process `syz-executor.4'. [ 106.868790][ T6961] loop3: detected capacity change from 0 to 65608 [ 106.871835][ T6961] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 106.874016][ T6961] EXT4-fs (loop3): group descriptors corrupted! 16:11:10 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="13000000", 0x4, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 106.918822][ T6966] loop2: detected capacity change from 0 to 65608 [ 106.933148][ T6976] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 106.935296][ T6977] netlink: 37 bytes leftover after parsing attributes in process `syz-executor.4'. [ 106.937130][ T6966] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 106.939402][ T6966] EXT4-fs (loop2): group descriptors corrupted! [ 106.951926][ T6978] loop3: detected capacity change from 0 to 65608 16:11:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02", 0x1}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 106.973504][ T6978] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 106.975561][ T6978] EXT4-fs (loop3): group descriptors corrupted! [ 106.988679][ T6985] PM: suspend entry (deep) [ 107.000559][ T6985] Filesystems sync: 0.010 seconds [ 107.002409][ T6985] Freezing user space processes ... (elapsed 0.021 seconds) done. [ 107.026308][ T6985] OOM killer disabled. [ 107.027637][ T6985] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 107.031128][ T6985] printk: Suspending console(s) (use no_console_suspend to debug) 16:11:11 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c0000000906000000014000000000000000000005000100070000001000"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:11 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400), 0x0, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 107.195999][ T1766] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 107.708922][ T6985] ACPI: Preparing to enter system sleep state S3 [ 107.709004][ T6985] PM: Saving platform NVS memory [ 107.709023][ T6985] Disabling non-boot CPUs ... [ 107.712234][ T6985] smpboot: CPU 1 is now offline [ 107.716108][ T6985] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 107.716171][ T6985] ACPI: Low-level resume complete [ 107.716258][ T6985] PM: Restoring platform NVS memory [ 107.716267][ T6985] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 107.728611][ T6985] Enabling non-boot CPUs ... [ 107.728846][ T6985] x86: Booting SMP configuration: [ 107.728850][ T6985] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 107.729035][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 107.730148][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 107.731857][ T6985] CPU1 is up [ 107.732080][ T6985] ACPI: Waking up from system sleep state S3 [ 107.846182][ T6985] OOM killer enabled. [ 107.847041][ T6985] Restarting tasks ... [ 107.851525][ T1037] synth uevent: /devices/virtual/block/loop2: failed to send uevent [ 107.854864][ T1037] block loop2: uevent: failed to send synthetic uevent [ 107.856060][ T6989] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. 16:11:11 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, 0x0, 0x0) 16:11:11 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 107.879729][ T6985] done. [ 107.883011][ T6985] PM: suspend exit [ 107.885819][ T6992] loop2: detected capacity change from 0 to 65608 [ 107.896549][ T6992] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 107.899109][ T6992] EXT4-fs (loop2): group descriptors corrupted! [ 107.901295][ T6994] netlink: 37 bytes leftover after parsing attributes in process `syz-executor.4'. 16:11:11 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:11 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x3}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x318, 0x0) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0x7, 0x3) 16:11:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02", 0x1}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:11 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:11 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 107.919942][ T6997] loop3: detected capacity change from 0 to 65608 [ 107.926051][ T6997] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 107.928375][ T6997] EXT4-fs (loop3): group descriptors corrupted! [ 107.954443][ T7010] loop2: detected capacity change from 0 to 65608 [ 107.954743][ T7012] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.4'. [ 107.957922][ T7012] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 107.963662][ T7010] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 107.965390][ T7010] EXT4-fs (loop2): group descriptors corrupted! 16:11:11 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400), 0x0, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 107.999789][ T7022] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.4'. 16:11:11 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:11 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 108.043547][ T7028] loop3: detected capacity change from 0 to 65608 [ 108.047607][ T7028] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 108.049970][ T7028] EXT4-fs (loop3): group descriptors corrupted! [ 108.053983][ T7029] PM: suspend entry (deep) [ 108.061749][ T7029] Filesystems sync: 0.006 seconds [ 108.063210][ T7029] Freezing user space processes ... [ 108.063795][ T7030] loop2: detected capacity change from 0 to 65608 [ 108.086432][ T7029] (elapsed 0.023 seconds) done. [ 108.087810][ T7029] OOM killer disabled. [ 108.088827][ T7029] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 108.091861][ T7029] printk: Suspending console(s) (use no_console_suspend to debug) 16:11:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400), 0x0, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:12 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, 0x0, 0x0) 16:11:12 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x318, 0x0) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0x7, 0x3) [ 108.452031][ T1768] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 108.956950][ T7029] ACPI: Preparing to enter system sleep state S3 [ 108.957028][ T7029] PM: Saving platform NVS memory [ 108.957032][ T7029] Disabling non-boot CPUs ... [ 108.960545][ T7029] smpboot: CPU 1 is now offline [ 108.964158][ T7029] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 108.964217][ T7029] ACPI: Low-level resume complete [ 108.964303][ T7029] PM: Restoring platform NVS memory [ 108.964312][ T7029] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 108.974987][ T7029] Enabling non-boot CPUs ... [ 108.975355][ T7029] x86: Booting SMP configuration: [ 108.975359][ T7029] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 108.975520][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 108.976618][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 108.978149][ T7029] CPU1 is up [ 108.978376][ T7029] ACPI: Waking up from system sleep state S3 [ 109.065400][ T7029] OOM killer enabled. [ 109.066056][ T7029] Restarting tasks ... [ 109.067367][ T1037] synth uevent: /devices/virtual/block/loop5: failed to send uevent [ 109.069226][ T1037] block loop5: uevent: failed to send synthetic uevent [ 109.075588][ T1037] synth uevent: /devices/virtual/block/loop4: failed to send uevent [ 109.077285][ T1037] block loop4: uevent: failed to send synthetic uevent [ 109.086084][ T7030] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 131072)! [ 109.087472][ T7029] done. [ 109.087816][ T7030] EXT4-fs (loop2): group descriptors corrupted! [ 109.089741][ T7029] PM: suspend exit 16:11:12 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b8008"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:12 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 16:11:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:12 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 109.159962][ T7045] loop3: detected capacity change from 0 to 65608 [ 109.175945][ T7045] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 109.177709][ T7045] EXT4-fs (loop3): group descriptors corrupted! 16:11:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:12 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b8008"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 109.221698][ T7057] PM: suspend entry (deep) [ 109.242243][ T7057] Filesystems sync: 0.019 seconds [ 109.243800][ T7057] Freezing user space processes ... [ 109.244550][ T7061] loop2: detected capacity change from 0 to 65608 [ 109.253145][ T7057] (elapsed 0.009 seconds) done. [ 109.254136][ T7057] OOM killer disabled. [ 109.254966][ T7057] Freezing remaining freezable tasks ... (elapsed 0.000 seconds) done. [ 109.257665][ T7057] printk: Suspending console(s) (use no_console_suspend to debug) 16:11:13 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 109.706264][ T22] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 110.227648][ T7057] ACPI: Preparing to enter system sleep state S3 [ 110.227732][ T7057] PM: Saving platform NVS memory [ 110.227737][ T7057] Disabling non-boot CPUs ... [ 110.231375][ T7057] smpboot: CPU 1 is now offline [ 110.234872][ T7057] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 110.234933][ T7057] ACPI: Low-level resume complete [ 110.235022][ T7057] PM: Restoring platform NVS memory [ 110.235032][ T7057] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 110.245570][ T7057] Enabling non-boot CPUs ... [ 110.245828][ T7057] x86: Booting SMP configuration: [ 110.245833][ T7057] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 110.246035][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 110.247011][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 110.248421][ T7057] CPU1 is up [ 110.248546][ T7057] ACPI: Waking up from system sleep state S3 [ 110.359378][ T7057] OOM killer enabled. [ 110.360278][ T7057] Restarting tasks ... [ 110.364946][ T1037] synth uevent: /devices/virtual/block/loop4: failed to send uevent [ 110.367458][ T1037] block loop4: uevent: failed to send synthetic uevent [ 110.378574][ T7061] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 110.378685][ T7057] done. [ 110.380694][ T7061] EXT4-fs (loop2): group descriptors corrupted! [ 110.383621][ T7057] PM: suspend exit 16:11:13 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b8008"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:13 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x318, 0x0) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0x7, 0x3) 16:11:13 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) [ 110.400752][ T7068] loop3: detected capacity change from 0 to 65608 [ 110.406127][ T7068] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 110.408030][ T7068] EXT4-fs (loop3): group descriptors corrupted! [ 110.452173][ T7080] PM: suspend entry (deep) [ 110.462901][ T7080] Filesystems sync: 0.009 seconds [ 110.464270][ T7080] Freezing user space processes ... (elapsed 0.015 seconds) done. [ 110.481599][ T7080] OOM killer disabled. [ 110.482342][ T7080] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 110.486264][ T7080] printk: Suspending console(s) (use no_console_suspend to debug) [ 110.539488][ T6046] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 110.709516][ T5075] psmouse serio1: Failed to reset mouse on isa0060/serio1: -5 [ 111.060087][ T7080] ACPI: Preparing to enter system sleep state S3 [ 111.060226][ T7080] PM: Saving platform NVS memory [ 111.060231][ T7080] Disabling non-boot CPUs ... [ 111.062851][ T7080] smpboot: CPU 1 is now offline [ 111.066505][ T7080] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 111.066575][ T7080] ACPI: Low-level resume complete [ 111.066665][ T7080] PM: Restoring platform NVS memory [ 111.066735][ T7080] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 111.078756][ T7080] Enabling non-boot CPUs ... [ 111.079075][ T7080] x86: Booting SMP configuration: [ 111.079080][ T7080] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 111.079376][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 111.080401][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 111.081858][ T7080] CPU1 is up [ 111.082030][ T7080] ACPI: Waking up from system sleep state S3 [ 111.188282][ T7080] OOM killer enabled. [ 111.189617][ T7080] Restarting tasks ... [ 111.191995][ T1037] synth uevent: /devices/virtual/block/loop3: failed to send uevent [ 111.194508][ T1037] block loop3: uevent: failed to send synthetic uevent [ 111.206360][ T1037] synth uevent: /devices/virtual/block/loop4: failed to send uevent [ 111.207655][ T1037] block loop4: uevent: failed to send synthetic uevent 16:11:14 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) 16:11:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:14 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b800800"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:14 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:14 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) 16:11:14 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x318, 0x0) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0x7, 0x3) [ 111.214950][ T1037] synth uevent: /devices/virtual/block/loop5: failed to send uevent [ 111.216961][ T1037] block loop5: uevent: failed to send synthetic uevent [ 111.225705][ T7080] done. [ 111.226497][ T7080] PM: suspend exit 16:11:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:14 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b800800"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:14 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) [ 111.283448][ T7092] loop2: detected capacity change from 0 to 65608 [ 111.289893][ T7093] loop3: detected capacity change from 0 to 65608 [ 111.291450][ T7092] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 111.294142][ T7092] EXT4-fs (loop2): group descriptors corrupted! [ 111.302962][ T7093] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 111.305301][ T7093] EXT4-fs (loop3): group descriptors corrupted! [ 111.318330][ T7100] PM: suspend entry (deep) [ 111.365809][ T7100] Filesystems sync: 0.046 seconds [ 111.366939][ T7100] Freezing user space processes ... (elapsed 0.007 seconds) done. [ 111.376218][ T7100] OOM killer disabled. [ 111.377019][ T7100] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 111.380193][ T7100] printk: Suspending console(s) (use no_console_suspend to debug) 16:11:14 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x3}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x318, 0x0) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0x7, 0x3) 16:11:15 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b800800"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:15 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x3}, 0x0) getpid() r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x5, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0x7, 0x3) [ 111.604520][ T6046] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 112.123240][ T7100] ACPI: Preparing to enter system sleep state S3 [ 112.123386][ T7100] PM: Saving platform NVS memory [ 112.123391][ T7100] Disabling non-boot CPUs ... [ 112.126706][ T7100] smpboot: CPU 1 is now offline [ 112.130245][ T7100] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 112.130316][ T7100] ACPI: Low-level resume complete [ 112.130397][ T7100] PM: Restoring platform NVS memory [ 112.130448][ T7100] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 112.142566][ T7100] Enabling non-boot CPUs ... [ 112.142705][ T7100] x86: Booting SMP configuration: [ 112.142709][ T7100] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 112.142906][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 112.143998][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 112.145351][ T7100] CPU1 is up [ 112.145597][ T7100] ACPI: Waking up from system sleep state S3 [ 112.261088][ T7100] OOM killer enabled. [ 112.262093][ T7100] Restarting tasks ... [ 112.266269][ T1037] synth uevent: /devices/virtual/block/loop2: failed to send uevent [ 112.268937][ T1037] block loop2: uevent: failed to send synthetic uevent [ 112.278125][ T7100] done. [ 112.286282][ T7100] PM: suspend exit 16:11:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 112.302588][ T7119] PM: suspend entry (deep) [ 112.302736][ T7115] loop2: detected capacity change from 0 to 65608 [ 112.307154][ T7120] __nla_validate_parse: 8 callbacks suppressed [ 112.307201][ T7120] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.4'. [ 112.314934][ T7115] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 112.317406][ T7115] EXT4-fs (loop2): group descriptors corrupted! [ 112.324380][ T7119] Filesystems sync: 0.020 seconds [ 112.325874][ T7119] Freezing user space processes ... (elapsed 0.026 seconds) done. [ 112.354730][ T7119] OOM killer disabled. [ 112.355872][ T7119] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 112.359767][ T7119] printk: Suspending console(s) (use no_console_suspend to debug) 16:11:16 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x318, 0x0) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0x7, 0x3) 16:11:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400), 0x0, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 112.679662][ T1766] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 113.197751][ T7119] ACPI: Preparing to enter system sleep state S3 [ 113.197836][ T7119] PM: Saving platform NVS memory [ 113.197840][ T7119] Disabling non-boot CPUs ... [ 113.200022][ T7119] smpboot: CPU 1 is now offline [ 113.203682][ T7119] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 113.203794][ T7119] ACPI: Low-level resume complete [ 113.203876][ T7119] PM: Restoring platform NVS memory [ 113.203886][ T7119] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 113.214901][ T7119] Enabling non-boot CPUs ... [ 113.215114][ T7119] x86: Booting SMP configuration: [ 113.215121][ T7119] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 113.215352][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 113.216423][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 113.217771][ T7119] CPU1 is up [ 113.218013][ T7119] ACPI: Waking up from system sleep state S3 [ 113.324415][ T7119] OOM killer enabled. [ 113.325223][ T7119] Restarting tasks ... [ 113.338614][ T1037] synth uevent: /devices/virtual/block/loop4: failed to send uevent [ 113.340936][ T1037] block loop4: uevent: failed to send synthetic uevent 16:11:16 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 113.355924][ T7119] done. [ 113.356485][ T7119] PM: suspend exit [ 113.365995][ T7131] PM: suspend entry (deep) [ 113.367860][ T7130] loop2: detected capacity change from 0 to 65608 [ 113.371435][ T7130] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 113.373374][ T7130] EXT4-fs (loop2): group descriptors corrupted! [ 113.375218][ T7129] loop3: detected capacity change from 0 to 65608 [ 113.380829][ T7131] Filesystems sync: 0.013 seconds [ 113.384205][ T7131] Freezing user space processes ... (elapsed 0.037 seconds) done. [ 113.423839][ T7131] OOM killer disabled. [ 113.424451][ T7131] Freezing remaining freezable tasks ... (elapsed 0.003 seconds) done. [ 113.429008][ T7131] printk: Suspending console(s) (use no_console_suspend to debug) [ 113.563680][ T1770] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 114.073807][ T7131] ACPI: Preparing to enter system sleep state S3 [ 114.074011][ T7131] PM: Saving platform NVS memory [ 114.074019][ T7131] Disabling non-boot CPUs ... [ 114.076465][ T7131] smpboot: CPU 1 is now offline [ 114.079620][ T7131] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 114.079763][ T7131] ACPI: Low-level resume complete [ 114.079839][ T7131] PM: Restoring platform NVS memory [ 114.079848][ T7131] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 114.092606][ T7131] Enabling non-boot CPUs ... [ 114.092848][ T7131] x86: Booting SMP configuration: [ 114.092853][ T7131] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 114.093022][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 114.094016][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 114.095566][ T7131] CPU1 is up [ 114.095801][ T7131] ACPI: Waking up from system sleep state S3 [ 114.196827][ T7131] OOM killer enabled. [ 114.197509][ T7131] Restarting tasks ... [ 114.203690][ T1037] synth uevent: /devices/virtual/block/loop3: failed to send uevent [ 114.205659][ T1037] block loop3: uevent: failed to send synthetic uevent [ 114.218705][ T7131] done. [ 114.219669][ T7131] PM: suspend exit [ 114.221572][ T7123] PM: suspend entry (deep) [ 114.227766][ T7129] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 114.229428][ T7129] EXT4-fs (loop3): group descriptors corrupted! [ 114.234845][ T7123] Filesystems sync: 0.012 seconds [ 114.236034][ T7123] Freezing user space processes ... (elapsed 0.012 seconds) done. [ 114.250421][ T7123] OOM killer disabled. [ 114.251211][ T7123] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 114.253830][ T7123] printk: Suspending console(s) (use no_console_suspend to debug) 16:11:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400), 0x0, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:18 executing program 0: socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 16:11:18 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 114.429113][ T1766] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 114.947319][ T7123] ACPI: Preparing to enter system sleep state S3 [ 114.947419][ T7123] PM: Saving platform NVS memory [ 114.947442][ T7123] Disabling non-boot CPUs ... [ 114.950462][ T7123] smpboot: CPU 1 is now offline [ 114.953650][ T7123] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 114.953717][ T7123] ACPI: Low-level resume complete [ 114.953804][ T7123] PM: Restoring platform NVS memory [ 114.953814][ T7123] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 114.964451][ T7123] Enabling non-boot CPUs ... [ 114.964674][ T7123] x86: Booting SMP configuration: [ 114.964679][ T7123] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 114.964876][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 114.966004][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 114.967543][ T7123] CPU1 is up [ 114.967713][ T7123] ACPI: Waking up from system sleep state S3 [ 115.013982][ T7139] hwrng: no data available [ 115.067940][ T7123] OOM killer enabled. [ 115.068739][ T7123] Restarting tasks ... [ 115.075659][ T1037] synth uevent: /devices/virtual/block/loop2: failed to send uevent [ 115.077837][ T1037] block loop2: uevent: failed to send synthetic uevent [ 115.088591][ T7123] done. [ 115.092118][ T7123] PM: suspend exit 16:11:18 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:18 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x3}, 0x0) r0 = getpid() r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x5, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x1}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x3, 0x28, 0x5, 0x1ff, 0xfffffffffffffff9, 0x7, 0x3, 0x7, 0x7fff}, 0x0) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ftruncate(0xffffffffffffffff, 0x4) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x7, 0x3) [ 115.120358][ T7148] loop2: detected capacity change from 0 to 65608 [ 115.126666][ T7148] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 115.128370][ T7148] EXT4-fs (loop2): group descriptors corrupted! [ 115.130935][ T7146] loop3: detected capacity change from 0 to 65608 [ 115.134183][ T7146] EXT4-fs (loop3): unsupported descriptor size 0 [ 115.135705][ T7147] PM: suspend entry (deep) [ 115.139908][ T7149] loop1: detected capacity change from 0 to 65608 [ 115.145830][ T7149] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 115.147537][ T7149] EXT4-fs (loop1): group descriptors corrupted! [ 115.172257][ T7147] Filesystems sync: 0.035 seconds [ 115.173425][ T7147] Freezing user space processes ... (elapsed 0.012 seconds) done. [ 115.188203][ T7147] OOM killer disabled. [ 115.188826][ T7147] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 115.191902][ T7147] printk: Suspending console(s) (use no_console_suspend to debug) 16:11:28 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400), 0x0, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 115.262368][ T6318] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 125.340063][ T7147] ACPI: Preparing to enter system sleep state S3 [ 125.340143][ T7147] PM: Saving platform NVS memory [ 125.340147][ T7147] Disabling non-boot CPUs ... [ 125.344088][ T7147] smpboot: CPU 1 is now offline [ 125.347233][ T7147] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 125.347291][ T7147] ACPI: Low-level resume complete [ 125.347419][ T7147] PM: Restoring platform NVS memory [ 125.347429][ T7147] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 125.357877][ T7147] Enabling non-boot CPUs ... [ 125.358056][ T7147] x86: Booting SMP configuration: [ 125.358061][ T7147] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 125.358237][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 125.359360][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 125.360899][ T7147] CPU1 is up [ 125.361134][ T7147] ACPI: Waking up from system sleep state S3 [ 125.480297][ T7147] OOM killer enabled. [ 125.481599][ T7147] Restarting tasks ... [ 125.484549][ T1037] synth uevent: /devices/virtual/block/loop4: failed to send uevent [ 125.489463][ T1037] block loop4: uevent: failed to send synthetic uevent 16:11:28 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x3}, 0x0) r0 = getpid() r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x5, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x1}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x3, 0x28, 0x5, 0x1ff, 0xfffffffffffffff9, 0x7, 0x3, 0x7, 0x7fff}, 0x0) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ftruncate(0xffffffffffffffff, 0x4) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x7, 0x3) 16:11:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:28 executing program 0: socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) [ 125.507946][ T7147] done. [ 125.510191][ T7147] PM: suspend exit 16:11:28 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:28 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 125.537870][ T7171] loop1: detected capacity change from 0 to 65608 [ 125.542047][ T7171] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 125.544891][ T7171] EXT4-fs (loop1): group descriptors corrupted! [ 125.557052][ T7176] loop2: detected capacity change from 0 to 65608 [ 125.560745][ T7176] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 125.563871][ T7176] EXT4-fs (loop2): group descriptors corrupted! [ 125.565780][ T7177] loop3: detected capacity change from 0 to 65608 [ 125.569195][ T7177] EXT4-fs (loop3): unsupported descriptor size 0 [ 125.571614][ T7181] PM: suspend entry (deep) 16:11:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 125.592697][ T7187] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1555 sclass=netlink_route_socket pid=7187 comm=syz-executor.4 [ 125.609137][ T7181] Filesystems sync: 0.036 seconds [ 125.610966][ T7181] Freezing user space processes ... (elapsed 0.132 seconds) done. [ 125.746947][ T7181] OOM killer disabled. [ 125.748143][ T7181] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 125.751701][ T7181] printk: Suspending console(s) (use no_console_suspend to debug) [ 125.863716][ T6318] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 126.395399][ T7181] ACPI: Preparing to enter system sleep state S3 [ 126.395542][ T7181] PM: Saving platform NVS memory [ 126.395547][ T7181] Disabling non-boot CPUs ... [ 126.399107][ T7181] smpboot: CPU 1 is now offline [ 126.402641][ T7181] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 126.402704][ T7181] ACPI: Low-level resume complete [ 126.402795][ T7181] PM: Restoring platform NVS memory [ 126.402803][ T7181] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 126.413755][ T7181] Enabling non-boot CPUs ... [ 126.413896][ T7181] x86: Booting SMP configuration: [ 126.413900][ T7181] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 126.414190][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 126.415212][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 126.416718][ T7181] CPU1 is up [ 126.416897][ T7181] ACPI: Waking up from system sleep state S3 [ 126.528538][ T7181] OOM killer enabled. [ 126.530034][ T7181] Restarting tasks ... [ 126.532713][ T1037] synth uevent: /devices/virtual/block/loop3: failed to send uevent [ 126.536525][ T1037] block loop3: uevent: failed to send synthetic uevent [ 126.539927][ T7181] done. [ 126.541941][ T7181] PM: suspend exit 16:11:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:29 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:29 executing program 0: socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 16:11:29 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 126.554200][ T7196] loop1: detected capacity change from 0 to 65608 [ 126.558059][ T7196] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 126.561194][ T7196] EXT4-fs (loop1): group descriptors corrupted! [ 126.591161][ T7202] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1555 sclass=netlink_route_socket pid=7202 comm=syz-executor.4 [ 126.600089][ T7205] PM: suspend entry (deep) 16:11:29 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:29 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 126.605836][ T7203] loop2: detected capacity change from 0 to 65608 [ 126.615421][ T7207] loop3: detected capacity change from 0 to 65608 [ 126.616234][ T7203] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 126.620191][ T7203] EXT4-fs (loop2): group descriptors corrupted! [ 126.620319][ T7207] EXT4-fs (loop3): unsupported descriptor size 0 [ 126.626812][ T7212] validate_nla: 2 callbacks suppressed [ 126.626824][ T7212] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 126.631530][ T7212] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 126.634467][ T7212] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 126.647334][ T7205] Filesystems sync: 0.045 seconds [ 126.651564][ T7205] Freezing user space processes ... (elapsed 0.021 seconds) done. [ 126.676292][ T7205] OOM killer disabled. [ 126.677743][ T7205] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 126.682091][ T7205] printk: Suspending console(s) (use no_console_suspend to debug) 16:11:30 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x3}, 0x0) r0 = getpid() r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x5, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x1}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x3, 0x28, 0x5, 0x1ff, 0xfffffffffffffff9, 0x7, 0x3, 0x7, 0x7fff}, 0x0) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ftruncate(0xffffffffffffffff, 0x4) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x7c, 0x5, 0x3, 0x4, 0x0, 0xfffffffe, 0x20800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x80, 0x7}, 0x3040, 0x400, 0xfffffffd, 0x4, 0x1, 0x8, 0x0, 0x0, 0x10000800, 0x0, 0x5}, 0x0, 0x5, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) 16:11:30 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 126.737272][ T6318] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 127.239482][ T7205] ACPI: Preparing to enter system sleep state S3 [ 127.239624][ T7205] PM: Saving platform NVS memory [ 127.239629][ T7205] Disabling non-boot CPUs ... [ 127.242239][ T7205] smpboot: CPU 1 is now offline [ 127.245551][ T7205] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 127.245613][ T7205] ACPI: Low-level resume complete [ 127.245689][ T7205] PM: Restoring platform NVS memory [ 127.245703][ T7205] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 127.256559][ T7205] Enabling non-boot CPUs ... [ 127.256719][ T7205] x86: Booting SMP configuration: [ 127.256724][ T7205] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 127.256881][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 127.257906][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 127.259123][ T7205] CPU1 is up [ 127.259337][ T7205] ACPI: Waking up from system sleep state S3 [ 127.360078][ T7205] OOM killer enabled. [ 127.361161][ T7205] Restarting tasks ... [ 127.370662][ T1037] synth uevent: /devices/virtual/block/loop4: failed to send uevent [ 127.374195][ T1037] block loop4: uevent: failed to send synthetic uevent 16:11:30 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:30 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 127.387015][ T7218] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1555 sclass=netlink_route_socket pid=7218 comm=syz-executor.4 [ 127.392611][ T7205] done. [ 127.393411][ T7205] PM: suspend exit [ 127.418374][ T7222] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 127.420693][ T7222] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 127.423045][ T7222] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 127.427294][ T7225] loop2: detected capacity change from 0 to 65608 16:11:30 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 16:11:30 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 127.435290][ T7225] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 127.437973][ T7225] EXT4-fs (loop2): group descriptors corrupted! [ 127.440216][ T7224] loop3: detected capacity change from 0 to 65608 [ 127.451220][ T7224] EXT4-fs (loop3): unsupported descriptor size 0 [ 127.463764][ T7234] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1555 sclass=netlink_route_socket pid=7234 comm=syz-executor.4 [ 127.471759][ T7236] PM: suspend entry (deep) 16:11:30 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 127.485298][ T7239] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 127.487341][ T7239] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 127.489669][ T7239] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 127.503101][ T7244] loop2: detected capacity change from 0 to 65608 [ 127.505658][ T7244] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 127.508644][ T7244] EXT4-fs (loop2): group descriptors corrupted! 16:11:30 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:30 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 127.536760][ T7251] loop3: detected capacity change from 0 to 65608 [ 127.547069][ T7251] EXT4-fs (loop3): unsupported descriptor size 0 [ 127.550119][ T7256] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1555 sclass=netlink_route_socket pid=7256 comm=syz-executor.4 [ 127.551797][ T7257] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 127.562031][ T7236] Filesystems sync: 0.088 seconds [ 127.563694][ T7236] Freezing user space processes ... (elapsed 0.121 seconds) done. [ 127.688297][ T7236] OOM killer disabled. [ 127.689618][ T7236] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 127.693781][ T7236] printk: Suspending console(s) (use no_console_suspend to debug) 16:11:31 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 127.981758][ T1766] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 128.487147][ T7236] ACPI: Preparing to enter system sleep state S3 [ 128.487353][ T7236] PM: Saving platform NVS memory [ 128.487358][ T7236] Disabling non-boot CPUs ... [ 128.490594][ T7236] smpboot: CPU 1 is now offline [ 128.494139][ T7236] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 128.494195][ T7236] ACPI: Low-level resume complete [ 128.494289][ T7236] PM: Restoring platform NVS memory [ 128.494298][ T7236] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 128.505809][ T7236] Enabling non-boot CPUs ... [ 128.506022][ T7236] x86: Booting SMP configuration: [ 128.506031][ T7236] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 128.506223][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 128.507211][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 128.508637][ T7236] CPU1 is up [ 128.508905][ T7236] ACPI: Waking up from system sleep state S3 [ 128.630331][ T7236] OOM killer enabled. [ 128.631269][ T7236] Restarting tasks ... [ 128.635100][ T1037] synth uevent: /devices/virtual/block/loop2: failed to send uevent [ 128.638140][ T1037] block loop2: uevent: failed to send synthetic uevent [ 128.658916][ T7236] done. [ 128.659870][ T7236] PM: suspend exit [ 128.672659][ T7262] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1555 sclass=netlink_route_socket pid=7262 comm=syz-executor.4 16:11:31 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x3}, 0x0) r0 = getpid() r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x5, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x1}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x3, 0x28, 0x5, 0x1ff, 0xfffffffffffffff9, 0x7, 0x3, 0x7, 0x7fff}, 0x0) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ftruncate(0xffffffffffffffff, 0x4) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x7c, 0x5, 0x3, 0x4, 0x0, 0xfffffffe, 0x20800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x80, 0x7}, 0x3040, 0x400, 0xfffffffd, 0x4, 0x1, 0x8, 0x0, 0x0, 0x10000800, 0x0, 0x5}, 0x0, 0x5, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) 16:11:31 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:31 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:31 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 16:11:31 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d", 0xc, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:32 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 128.758889][ T7279] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 128.758966][ T7275] PM: suspend entry (deep) [ 128.776779][ T7276] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.4'. [ 128.777292][ T7278] loop2: detected capacity change from 0 to 65608 16:11:32 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d", 0xc, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 128.801060][ T7278] EXT4-fs (loop2): unsupported descriptor size 0 [ 128.810962][ T7284] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 128.826489][ T7280] loop3: detected capacity change from 0 to 65608 [ 128.838996][ T7280] EXT4-fs (loop3): unsupported descriptor size 0 [ 128.856365][ T7275] Filesystems sync: 0.092 seconds [ 128.858229][ T7275] Freezing user space processes ... (elapsed 0.143 seconds) done. [ 129.005164][ T7275] OOM killer disabled. [ 129.006620][ T7275] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 129.010331][ T7275] printk: Suspending console(s) (use no_console_suspend to debug) 16:11:33 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:33 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 129.235954][ T1766] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 129.749454][ T7275] ACPI: Preparing to enter system sleep state S3 [ 129.749530][ T7275] PM: Saving platform NVS memory [ 129.749534][ T7275] Disabling non-boot CPUs ... [ 129.752908][ T7275] smpboot: CPU 1 is now offline [ 129.756238][ T7275] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 129.756295][ T7275] ACPI: Low-level resume complete [ 129.756367][ T7275] PM: Restoring platform NVS memory [ 129.756376][ T7275] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 129.767052][ T7275] Enabling non-boot CPUs ... [ 129.767197][ T7275] x86: Booting SMP configuration: [ 129.767200][ T7275] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 129.767387][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 129.768417][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 129.769911][ T7275] CPU1 is up [ 129.770034][ T7275] ACPI: Waking up from system sleep state S3 [ 129.883643][ T7275] OOM killer enabled. 16:11:33 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d", 0xc, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:33 executing program 1: socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 16:11:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:33 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) [ 129.884826][ T7275] Restarting tasks ... done. [ 129.930802][ T7298] loop2: detected capacity change from 0 to 65608 [ 129.933916][ T7298] EXT4-fs (loop2): unsupported descriptor size 0 [ 129.948324][ T7275] PM: suspend exit [ 129.956208][ T7304] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1555 sclass=netlink_route_socket pid=7304 comm=syz-executor.5 [ 129.968834][ T7300] loop3: detected capacity change from 0 to 65608 [ 129.972362][ T7300] EXT4-fs (loop3): unsupported descriptor size 0 16:11:33 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:33 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200", 0x12, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:33 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 130.016436][ T7314] PM: suspend entry (deep) [ 130.021872][ T7317] loop2: detected capacity change from 0 to 65608 [ 130.027545][ T7315] PM: suspend entry (deep) [ 130.028913][ T7315] PM: suspend exit [ 130.040412][ T7317] EXT4-fs (loop2): unsupported descriptor size 0 [ 130.042980][ T7314] Filesystems sync: 0.025 seconds [ 130.045874][ T7314] Freezing user space processes ... [ 130.046281][ T1037] synth uevent: /devices/virtual/block/loop5: failed to send uevent [ 130.051237][ T1037] block loop5: uevent: failed to send synthetic uevent [ 130.055366][ T7314] (elapsed 0.009 seconds) done. [ 130.057652][ T7314] OOM killer disabled. [ 130.059448][ T7314] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 130.063503][ T7314] printk: Suspending console(s) (use no_console_suspend to debug) [ 130.309248][ T6046] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 130.832243][ T7314] ACPI: Preparing to enter system sleep state S3 [ 130.832364][ T7314] PM: Saving platform NVS memory [ 130.832368][ T7314] Disabling non-boot CPUs ... [ 130.835744][ T7314] smpboot: CPU 1 is now offline [ 130.839189][ T7314] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 130.839245][ T7314] ACPI: Low-level resume complete [ 130.839341][ T7314] PM: Restoring platform NVS memory [ 130.839350][ T7314] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 130.851176][ T7314] Enabling non-boot CPUs ... [ 130.851335][ T7314] x86: Booting SMP configuration: [ 130.851338][ T7314] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 130.851618][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 130.852734][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 130.854533][ T7314] CPU1 is up [ 130.854736][ T7314] ACPI: Waking up from system sleep state S3 [ 130.978278][ T7314] OOM killer enabled. [ 130.979688][ T7314] Restarting tasks ... [ 130.990584][ T1037] synth uevent: /devices/virtual/block/loop3: failed to send uevent [ 130.994421][ T1037] block loop3: uevent: failed to send synthetic uevent 16:11:34 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, 0x0, 0x0, 0x0) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0x7, 0x3) 16:11:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 130.997415][ T7320] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1555 sclass=netlink_route_socket pid=7320 comm=syz-executor.5 [ 131.013467][ T7314] done. [ 131.022134][ T7314] PM: suspend exit [ 131.025084][ T7327] loop3: detected capacity change from 0 to 65608 [ 131.028250][ T7327] EXT4-fs (loop3): unsupported descriptor size 0 16:11:34 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200", 0x12, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:34 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:34 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x3}, 0x0) r0 = getpid() r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x5, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x1}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x3, 0x28, 0x5, 0x1ff, 0xfffffffffffffff9, 0x7, 0x3, 0x7, 0x7fff}, 0x0) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ftruncate(0xffffffffffffffff, 0x4) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x7c, 0x5, 0x3, 0x4, 0x0, 0xfffffffe, 0x20800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x80, 0x7}, 0x3040, 0x400, 0xfffffffd, 0x4, 0x1, 0x8, 0x0, 0x0, 0x10000800, 0x0, 0x5}, 0x0, 0x5, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) 16:11:34 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200", 0x12, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 131.051099][ T7333] PM: suspend entry (deep) [ 131.055219][ T7335] loop2: detected capacity change from 0 to 65608 [ 131.080789][ T7335] EXT4-fs (loop2): unsupported descriptor size 0 [ 131.101486][ T7344] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1555 sclass=netlink_route_socket pid=7344 comm=syz-executor.5 [ 131.110304][ T7333] Filesystems sync: 0.057 seconds [ 131.112137][ T7333] Freezing user space processes ... (elapsed 0.020 seconds) done. [ 131.135212][ T7333] OOM killer disabled. [ 131.136573][ T7333] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 131.140854][ T7333] printk: Suspending console(s) (use no_console_suspend to debug) 16:11:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 131.354472][ T5935] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 131.863065][ T7333] ACPI: Preparing to enter system sleep state S3 [ 131.863134][ T7333] PM: Saving platform NVS memory [ 131.863138][ T7333] Disabling non-boot CPUs ... [ 131.865625][ T7333] smpboot: CPU 1 is now offline [ 131.869072][ T7333] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 131.869180][ T7333] ACPI: Low-level resume complete [ 131.869294][ T7333] PM: Restoring platform NVS memory [ 131.869305][ T7333] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 131.880179][ T7333] Enabling non-boot CPUs ... [ 131.880376][ T7333] x86: Booting SMP configuration: [ 131.880380][ T7333] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 131.880572][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 131.881665][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 131.883004][ T7333] CPU1 is up [ 131.883209][ T7333] ACPI: Waking up from system sleep state S3 [ 131.993367][ T7333] OOM killer enabled. [ 131.994640][ T7333] Restarting tasks ... 16:11:35 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:35 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:35 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, 0x0, 0x0, 0x0) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0x7, 0x3) [ 132.012147][ T1037] synth uevent: /devices/virtual/block/loop1: failed to send uevent [ 132.016935][ T1037] block loop1: uevent: failed to send synthetic uevent [ 132.034798][ T7333] done. [ 132.035465][ T7333] PM: suspend exit [ 132.039193][ T7350] __nla_validate_parse: 4 callbacks suppressed [ 132.039206][ T7350] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.4'. [ 132.055663][ T7353] loop2: detected capacity change from 0 to 65608 [ 132.062953][ T7353] EXT4-fs (loop2): unsupported descriptor size 0 16:11:35 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a57802", 0x15, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:35 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 132.078559][ T7357] loop3: detected capacity change from 0 to 65608 [ 132.082273][ T7357] EXT4-fs (loop3): unsupported descriptor size 0 [ 132.093955][ T7364] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.4'. [ 132.097478][ T7365] PM: suspend entry (deep) [ 132.125315][ T7365] Filesystems sync: 0.026 seconds [ 132.126849][ T7365] Freezing user space processes ... (elapsed 0.119 seconds) done. [ 132.249599][ T7365] OOM killer disabled. [ 132.250814][ T7365] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 132.255059][ T7365] printk: Suspending console(s) (use no_console_suspend to debug) 16:11:36 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a57802", 0x15, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:36 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724", 0x10, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 132.608851][ T882] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 133.107208][ T7365] ACPI: Preparing to enter system sleep state S3 [ 133.107347][ T7365] PM: Saving platform NVS memory [ 133.107352][ T7365] Disabling non-boot CPUs ... [ 133.110991][ T7365] smpboot: CPU 1 is now offline [ 133.114369][ T7365] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 133.114427][ T7365] ACPI: Low-level resume complete [ 133.114496][ T7365] PM: Restoring platform NVS memory [ 133.114505][ T7365] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 133.125260][ T7365] Enabling non-boot CPUs ... [ 133.125454][ T7365] x86: Booting SMP configuration: [ 133.125457][ T7365] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 133.125641][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 133.126763][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 133.128418][ T7365] CPU1 is up [ 133.128660][ T7365] ACPI: Waking up from system sleep state S3 [ 133.234084][ T7365] OOM killer enabled. [ 133.234726][ T7365] Restarting tasks ... [ 133.244909][ T1037] synth uevent: /devices/virtual/block/loop4: failed to send uevent [ 133.247264][ T1037] block loop4: uevent: failed to send synthetic uevent [ 133.264520][ T7365] done. [ 133.265173][ T7365] PM: suspend exit 16:11:36 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 133.282002][ T7376] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.4'. [ 133.295352][ T7375] loop3: detected capacity change from 0 to 65608 [ 133.305737][ T7375] EXT4-fs (loop3): unsupported descriptor size 0 16:11:36 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x3}, 0x0) r0 = getpid() r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x5, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x1}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x3, 0x28, 0x5, 0x1ff, 0xfffffffffffffff9, 0x7, 0x3, 0x7, 0x7fff}, 0x0) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ftruncate(0xffffffffffffffff, 0x4) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x7c, 0x5, 0x3, 0x4, 0x0, 0xfffffffe, 0x20800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x80, 0x7}, 0x3040, 0x400, 0xfffffffd, 0x4, 0x1, 0x8, 0x0, 0x0, 0x10000800, 0x0, 0x5}, 0x0, 0x5, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) 16:11:36 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, 0x0, 0x0, 0x0) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0x7, 0x3) 16:11:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:36 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a57802", 0x15, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 133.322597][ T7379] loop2: detected capacity change from 0 to 65608 [ 133.328227][ T7379] EXT4-fs (loop2): unsupported descriptor size 0 16:11:36 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724", 0x10, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:36 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 133.392558][ T7394] PM: suspend entry (deep) [ 133.396945][ T7393] loop2: detected capacity change from 0 to 65608 [ 133.398693][ T7395] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.4'. [ 133.402051][ T7393] EXT4-fs (loop2): unsupported descriptor size 0 [ 133.413074][ T7394] Filesystems sync: 0.019 seconds [ 133.414645][ T7394] Freezing user space processes ... (elapsed 0.036 seconds) done. [ 133.452186][ T7394] OOM killer disabled. [ 133.452956][ T7394] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 133.455370][ T7394] printk: Suspending console(s) (use no_console_suspend to debug) 16:11:37 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a5780200", 0x16, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 133.843240][ T7292] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 134.349574][ T7394] ACPI: Preparing to enter system sleep state S3 [ 134.349636][ T7394] PM: Saving platform NVS memory [ 134.349640][ T7394] Disabling non-boot CPUs ... [ 134.352959][ T7394] smpboot: CPU 1 is now offline [ 134.356428][ T7394] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 134.356487][ T7394] ACPI: Low-level resume complete [ 134.356577][ T7394] PM: Restoring platform NVS memory [ 134.356585][ T7394] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 134.367317][ T7394] Enabling non-boot CPUs ... [ 134.367474][ T7394] x86: Booting SMP configuration: [ 134.367477][ T7394] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 134.367674][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 134.368755][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 134.370159][ T7394] CPU1 is up [ 134.370409][ T7394] ACPI: Waking up from system sleep state S3 [ 134.491701][ T7394] OOM killer enabled. [ 134.493064][ T7394] Restarting tasks ... 16:11:37 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x318, 0x0) r1 = openat$sysfs(0xffffff9c, 0x0, 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0x7, 0x3) 16:11:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:37 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a5780200", 0x16, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 134.506695][ T1037] synth uevent: /devices/virtual/block/loop4: failed to send uevent [ 134.511257][ T1037] block loop4: uevent: failed to send synthetic uevent [ 134.514034][ T7394] done. [ 134.514883][ T7394] PM: suspend exit [ 134.527060][ T7400] loop3: detected capacity change from 0 to 65608 [ 134.530670][ T7400] EXT4-fs (loop3): unsupported descriptor size 0 [ 134.540870][ T7406] netlink: 37 bytes leftover after parsing attributes in process `syz-executor.5'. [ 134.548941][ T7409] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.4'. 16:11:37 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724", 0x10, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:37 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 134.595209][ T7417] loop2: detected capacity change from 0 to 65608 [ 134.603195][ T7417] EXT4-fs (loop2): unsupported descriptor size 0 [ 134.624153][ T7421] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.4'. [ 134.668114][ T7424] loop3: detected capacity change from 0 to 65608 [ 134.670873][ T7428] netlink: 37 bytes leftover after parsing attributes in process `syz-executor.5'. [ 134.682941][ T7424] EXT4-fs (loop3): unsupported descriptor size 0 16:11:38 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x3}, 0x0) r0 = getpid() r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x5, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x1}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x3, 0x28, 0x5, 0x1ff, 0xfffffffffffffff9, 0x7, 0x3, 0x7, 0x7fff}, 0x0) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ftruncate(0xffffffffffffffff, 0x4) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x7c, 0x5, 0x3, 0x4, 0x0, 0xfffffffe, 0x20800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x80, 0x7}, 0x3040, 0x400, 0xfffffffd, 0x4, 0x1, 0x8, 0x0, 0x0, 0x10000800, 0x0, 0x5}, 0x0, 0x5, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) 16:11:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:38 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a5780200", 0x16, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:38 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5", 0x18, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:38 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:38 executing program 5: sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:38 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 134.854766][ T7444] loop3: detected capacity change from 0 to 65608 [ 134.858721][ T7447] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.4'. [ 134.858922][ T7444] EXT4-fs (loop3): unsupported descriptor size 0 [ 134.862253][ T7445] netlink: 37 bytes leftover after parsing attributes in process `syz-executor.5'. [ 134.863982][ T7446] loop2: detected capacity change from 0 to 65608 [ 134.869084][ T7446] EXT4-fs (loop2): unsupported descriptor size 0 16:11:38 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x318, 0x0) r1 = openat$sysfs(0xffffff9c, 0x0, 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0x7, 0x3) 16:11:38 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:38 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5", 0x18, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724", 0x10, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:38 executing program 5: sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 135.441395][ T7480] loop3: detected capacity change from 0 to 65608 [ 135.444503][ T7480] EXT4-fs (loop3): unsupported descriptor size 0 [ 135.447972][ T7478] loop2: detected capacity change from 0 to 65608 [ 135.450910][ T7478] EXT4-fs (loop2): unsupported descriptor size 0 16:11:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:38 executing program 5: sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:38 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:38 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5", 0x18, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724", 0x10, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:38 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:38 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 135.722696][ T7505] loop3: detected capacity change from 0 to 65608 [ 135.725793][ T7505] EXT4-fs (loop3): unsupported descriptor size 0 [ 135.726603][ T7507] loop2: detected capacity change from 0 to 65608 [ 135.733440][ T7515] loop1: detected capacity change from 0 to 65608 [ 135.739770][ T7515] EXT4-fs (loop1): unsupported descriptor size 0 [ 135.741167][ T7507] EXT4-fs (loop2): unsupported descriptor size 0 16:11:39 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x318, 0x0) r1 = openat$sysfs(0xffffff9c, 0x0, 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0x7, 0x3) 16:11:39 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378", 0x1c, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:39 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724", 0x10, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:39 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x3}, 0x0) r0 = getpid() r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x5, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x1}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x3, 0x28, 0x5, 0x1ff, 0xfffffffffffffff9, 0x7, 0x3, 0x7, 0x7fff}, 0x0) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ftruncate(0xffffffffffffffff, 0x4) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x7c, 0x5, 0x3, 0x4, 0x0, 0xfffffffe, 0x20800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x80, 0x7}, 0x3040, 0x400, 0xfffffffd, 0x4, 0x1, 0x8, 0x0, 0x0, 0x10000800, 0x0, 0x5}, 0x0, 0x5, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) sendfile(r4, r4, &(0x7f0000000000)=0x7, 0x3) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000240)={0x0, 0x3, 0x0, 0x0, 0x40, "00000000000000000000000000ddc1517600"}) 16:11:39 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:39 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:39 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, 0x0}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:39 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, 0x0}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:39 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378", 0x1c, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 136.305630][ T7536] loop3: detected capacity change from 0 to 65608 [ 136.310555][ T7536] EXT4-fs (loop3): unsupported descriptor size 0 [ 136.322661][ T7545] loop2: detected capacity change from 0 to 65608 [ 136.336903][ T7545] EXT4-fs (loop2): unsupported descriptor size 0 16:11:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5", 0x18, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:39 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 136.412707][ T7564] loop3: detected capacity change from 0 to 65608 [ 136.416235][ T7564] EXT4-fs (loop3): unsupported descriptor size 0 [ 136.427636][ T7568] loop2: detected capacity change from 0 to 65608 [ 136.445556][ T7577] PM: suspend entry (deep) [ 136.446015][ T7568] EXT4-fs (loop2): unsupported descriptor size 0 [ 136.457176][ T7577] Filesystems sync: 0.010 seconds [ 136.460515][ T7577] Freezing user space processes ... (elapsed 0.125 seconds) done. [ 136.587255][ T7577] OOM killer disabled. [ 136.587917][ T7577] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 136.590536][ T7577] printk: Suspending console(s) (use no_console_suspend to debug) 16:11:40 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378", 0x1c, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:40 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x318, 0x0) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0x7, 0x3) 16:11:40 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, 0x0}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:40 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="130000", 0x3, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 136.627730][ T1368] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 137.150220][ T7577] ACPI: Preparing to enter system sleep state S3 [ 137.150351][ T7577] PM: Saving platform NVS memory [ 137.150356][ T7577] Disabling non-boot CPUs ... [ 137.153363][ T7577] smpboot: CPU 1 is now offline [ 137.158813][ T7577] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 137.158876][ T7577] ACPI: Low-level resume complete [ 137.158959][ T7577] PM: Restoring platform NVS memory [ 137.158968][ T7577] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 137.170226][ T7577] Enabling non-boot CPUs ... [ 137.170380][ T7577] x86: Booting SMP configuration: [ 137.170411][ T7577] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 137.170625][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 137.171705][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 137.173160][ T7577] CPU1 is up [ 137.173359][ T7577] ACPI: Waking up from system sleep state S3 [ 137.293558][ T7577] OOM killer enabled. [ 137.294480][ T7577] Restarting tasks ... [ 137.297719][ T1037] synth uevent: /devices/virtual/block/loop5: failed to send uevent [ 137.299985][ T1037] block loop5: uevent: failed to send synthetic uevent [ 137.313859][ T7577] done. [ 137.314550][ T7577] PM: suspend exit 16:11:40 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x3}, 0x0) r0 = getpid() r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x5, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x1}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x3, 0x28, 0x5, 0x1ff, 0xfffffffffffffff9, 0x7, 0x3, 0x7, 0x7fff}, 0x0) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ftruncate(0xffffffffffffffff, 0x4) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x7c, 0x5, 0x3, 0x4, 0x0, 0xfffffffe, 0x20800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x80, 0x7}, 0x3040, 0x400, 0xfffffffd, 0x4, 0x1, 0x8, 0x0, 0x0, 0x10000800, 0x0, 0x5}, 0x0, 0x5, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) sendfile(r4, r4, &(0x7f0000000000)=0x7, 0x3) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000240)={0x0, 0x3, 0x0, 0x0, 0x40, "00000000000000000000000000ddc1517600"}) syz_open_pts(0xffffffffffffffff, 0x0) 16:11:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5", 0x18, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:40 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="130000", 0x3, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:40 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={0x0, 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 137.363604][ T7590] __nla_validate_parse: 22 callbacks suppressed [ 137.363620][ T7590] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.5'. [ 137.367310][ T7590] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 137.375802][ T7589] loop3: detected capacity change from 0 to 65608 [ 137.377055][ T7588] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.4'. [ 137.380867][ T7589] EXT4-fs (loop3): unsupported descriptor size 0 [ 137.430286][ T7604] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.5'. [ 137.432355][ T7604] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 16:11:40 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5277033780100", 0x1e, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:40 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={0x0, 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:40 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="130000", 0x3, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 137.460406][ T7603] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.4'. [ 137.472288][ T7601] loop2: detected capacity change from 0 to 65608 [ 137.474530][ T7601] EXT4-fs (loop2): unsupported descriptor size 0 [ 137.489394][ T7614] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.5'. [ 137.491308][ T7614] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 137.494495][ T7616] loop3: detected capacity change from 0 to 65608 [ 137.498530][ T7616] EXT4-fs (loop3): unsupported descriptor size 0 16:11:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5", 0x18, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:40 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={0x0, 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 137.513700][ T7624] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.4'. [ 137.538092][ T7630] loop2: detected capacity change from 0 to 65608 [ 137.540167][ T7630] EXT4-fs (loop2): unsupported descriptor size 0 [ 137.556337][ T7635] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.5'. [ 137.598866][ T7639] PM: suspend entry (deep) [ 137.610784][ T7639] Filesystems sync: 0.010 seconds [ 137.612554][ T7639] Freezing user space processes ... [ 137.612622][ T1037] synth uevent: /devices/virtual/block/loop5: failed to send uevent [ 137.614832][ T1037] block loop5: uevent: failed to send synthetic uevent [ 137.728234][ T7639] (elapsed 0.115 seconds) done. [ 137.729411][ T7639] OOM killer disabled. [ 137.730355][ T7639] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 137.734334][ T7639] printk: Suspending console(s) (use no_console_suspend to debug) 16:11:41 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x318, 0x0) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0x7, 0x3) 16:11:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5277033780100", 0x1e, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:41 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="13000000", 0x4, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 137.922060][ T882] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 138.429159][ T7639] ACPI: Preparing to enter system sleep state S3 [ 138.429221][ T7639] PM: Saving platform NVS memory [ 138.429224][ T7639] Disabling non-boot CPUs ... [ 138.432424][ T7639] smpboot: CPU 1 is now offline [ 138.435875][ T7639] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 138.435932][ T7639] ACPI: Low-level resume complete [ 138.436047][ T7639] PM: Restoring platform NVS memory [ 138.436056][ T7639] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 138.447143][ T7639] Enabling non-boot CPUs ... [ 138.447276][ T7639] x86: Booting SMP configuration: [ 138.447280][ T7639] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 138.447565][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 138.448475][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 138.449955][ T7639] CPU1 is up [ 138.450124][ T7639] ACPI: Waking up from system sleep state S3 [ 138.562164][ T7639] OOM killer enabled. [ 138.562946][ T7639] Restarting tasks ... done. [ 138.585453][ T7639] PM: suspend exit 16:11:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000187303d5eb0b8b6b000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f00000002c0)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x7}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378", 0x1c, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:41 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:41 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="13000000", 0x4, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 138.608663][ T7649] loop3: detected capacity change from 0 to 65608 [ 138.615162][ T7649] EXT4-fs (loop3): unsupported descriptor size 0 16:11:41 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 138.668086][ T7665] loop2: detected capacity change from 0 to 65608 16:11:41 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="13000000", 0x4, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5277033780100", 0x1e, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378", 0x1c, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 138.688795][ T7665] EXT4-fs (loop2): unsupported descriptor size 0 [ 138.694107][ T7664] loop1: detected capacity change from 0 to 16 [ 138.701494][ T7664] EXT4-fs (loop1): bad geometry: block count 512 exceeds size of device (2 blocks) 16:11:41 executing program 1 (fault-call:5 fault-nth:0): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) [ 138.755636][ T7684] loop2: detected capacity change from 0 to 65608 [ 138.760353][ T7681] loop3: detected capacity change from 0 to 65608 [ 138.763421][ T7681] EXT4-fs (loop3): unsupported descriptor size 0 [ 138.768354][ T7692] FAULT_INJECTION: forcing a failure. [ 138.768354][ T7692] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 138.768613][ T7684] EXT4-fs (loop2): unsupported descriptor size 0 [ 138.771089][ T7692] CPU: 0 PID: 7692 Comm: syz-executor.1 Not tainted 5.13.0-rc7-syzkaller #0 [ 138.773990][ T7692] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 138.776015][ T7692] Call Trace: [ 138.776569][ T7692] dump_stack+0x137/0x19d [ 138.777958][ T7692] should_fail+0x23c/0x250 [ 138.778776][ T7692] should_fail_usercopy+0x16/0x20 [ 138.779687][ T7692] _copy_from_user+0x1c/0xd0 [ 138.780945][ T7692] __sys_recvmsg+0x133/0x3a0 [ 138.781877][ T7692] ? vfs_write+0x50c/0x770 [ 138.782575][ T7692] ? __fget_light+0x21b/0x260 [ 138.783462][ T7692] ? __cond_resched+0x11/0x40 [ 138.785557][ T7692] ? fput+0x2d/0x130 [ 138.786297][ T7692] ? ksys_write+0x157/0x180 [ 138.787297][ T7692] __x64_sys_recvmsg+0x42/0x50 [ 138.788257][ T7692] do_syscall_64+0x4a/0x90 [ 138.789006][ T7692] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 138.790563][ T7692] RIP: 0033:0x4665d9 [ 138.791378][ T7692] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 138.794805][ T7692] RSP: 002b:00007f87891e6188 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 138.796379][ T7692] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 138.797670][ T7692] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000004 [ 138.799228][ T7692] RBP: 00007f87891e61d0 R08: 0000000000000000 R09: 0000000000000000 [ 138.800943][ T7692] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 138.802422][ T7692] R13: 00007ffcb777a60f R14: 00007f87891e6300 R15: 0000000000022000 16:11:42 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x318, 0x0) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0x7, 0x3) 16:11:42 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:42 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378", 0x1c, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:42 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:42 executing program 1 (fault-call:5 fault-nth:1): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) 16:11:42 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:42 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:42 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 139.454142][ T7706] loop3: detected capacity change from 0 to 65608 [ 139.457659][ T7706] EXT4-fs (loop3): unsupported descriptor size 0 [ 139.460864][ T7709] loop2: detected capacity change from 0 to 65608 [ 139.464050][ T7709] EXT4-fs (loop2): unsupported descriptor size 0 16:11:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5277033780100", 0x1e, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:42 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:42 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 139.517434][ T7705] FAULT_INJECTION: forcing a failure. [ 139.517434][ T7705] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 139.520035][ T7705] CPU: 1 PID: 7705 Comm: syz-executor.1 Not tainted 5.13.0-rc7-syzkaller #0 [ 139.521343][ T7705] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 139.523897][ T7705] Call Trace: [ 139.524459][ T7705] dump_stack+0x137/0x19d [ 139.525411][ T7705] should_fail+0x23c/0x250 [ 139.526200][ T7705] should_fail_usercopy+0x16/0x20 [ 139.527398][ T7705] _copy_to_user+0x1c/0x90 [ 139.528092][ T7705] simple_read_from_buffer+0xab/0x120 [ 139.529118][ T7705] proc_fail_nth_read+0xf6/0x140 [ 139.530111][ T7705] ? rw_verify_area+0x136/0x250 [ 139.531353][ T7705] ? proc_fault_inject_write+0x200/0x200 [ 139.532391][ T7705] vfs_read+0x154/0x5d0 [ 139.533135][ T7705] ? __fget_light+0x21b/0x260 [ 139.534350][ T7705] ? __cond_resched+0x11/0x40 [ 139.535155][ T7705] ksys_read+0xce/0x180 [ 139.535872][ T7705] __x64_sys_read+0x3e/0x50 [ 139.536794][ T7705] do_syscall_64+0x4a/0x90 [ 139.537753][ T7705] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 139.538726][ T7705] RIP: 0033:0x41935c [ 139.539436][ T7705] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 139.543095][ T7705] RSP: 002b:00007f87891e6170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 139.544863][ T7705] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000041935c [ 139.546121][ T7705] RDX: 000000000000000f RSI: 00007f87891e61e0 RDI: 0000000000000005 [ 139.547535][ T7705] RBP: 00007f87891e61d0 R08: 0000000000000000 R09: 0000000000000000 [ 139.548801][ T7705] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 139.550106][ T7705] R13: 00007ffcb777a60f R14: 00007f87891e6300 R15: 0000000000022000 [ 139.581450][ T7737] loop2: detected capacity change from 0 to 65608 [ 139.589642][ T7737] EXT4-fs (loop2): unsupported descriptor size 0 [ 139.590418][ T7735] loop3: detected capacity change from 0 to 65608 [ 139.596949][ T7735] EXT4-fs (loop3): unsupported descriptor size 0 16:11:43 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x318, 0x0) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000000)=0x7, 0x3) 16:11:43 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:43 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 16:11:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5277033780100", 0x1e, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:43 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:43 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) 16:11:43 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 16:11:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e5277033780100", 0x1e, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 140.329463][ T7760] loop2: detected capacity change from 0 to 65608 [ 140.347811][ T7760] EXT4-fs (loop2): unsupported descriptor size 0 [ 140.368744][ T7766] loop3: detected capacity change from 0 to 65608 16:11:43 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:43 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 140.380020][ T7766] EXT4-fs (loop3): unsupported descriptor size 0 16:11:43 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:43 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) [ 140.428038][ T7777] loop2: detected capacity change from 0 to 65608 [ 140.435188][ T7777] EXT4-fs (loop2): unsupported descriptor size 0 [ 140.492057][ T7795] loop3: detected capacity change from 0 to 65608 [ 140.495019][ T7795] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 16:11:44 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x318, 0x0) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000000)=0x7, 0x3) 16:11:44 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:44 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) 16:11:44 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:44 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x4, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) 16:11:44 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) 16:11:44 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:44 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00"/36], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 141.214513][ T7812] loop2: detected capacity change from 0 to 65608 [ 141.219736][ T7814] loop3: detected capacity change from 0 to 65608 [ 141.221479][ T7812] EXT4-fs (loop2): unsupported descriptor size 0 [ 141.224223][ T7814] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 16:11:44 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) 16:11:44 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 141.330782][ T7842] loop3: detected capacity change from 0 to 65608 [ 141.345718][ T7842] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 141.354281][ T7844] loop2: detected capacity change from 0 to 65608 [ 141.374726][ T7844] EXT4-fs (loop2): unsupported descriptor size 0 16:11:45 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x318, 0x0) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000000)=0x7, 0x3) 16:11:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0xfc, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) 16:11:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378", 0x1c, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:45 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:45 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00"/36], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:45 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00"/36], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 142.080970][ T7866] loop4: detected capacity change from 0 to 65608 [ 142.096964][ T7871] loop2: detected capacity change from 0 to 65608 [ 142.105545][ T7871] EXT4-fs (loop2): unsupported descriptor size 0 [ 142.111956][ T7873] loop3: detected capacity change from 0 to 65608 [ 142.121845][ T7866] EXT4-fs (loop4): unsupported descriptor size 0 16:11:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:45 executing program 4 (fault-call:5 fault-nth:0): sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0xfc00, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) 16:11:45 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 142.144502][ T7873] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 142.213005][ T7897] FAULT_INJECTION: forcing a failure. [ 142.213005][ T7897] name failslab, interval 1, probability 0, space 0, times 1 [ 142.213612][ T7894] loop2: detected capacity change from 0 to 65608 [ 142.225723][ T7897] CPU: 0 PID: 7897 Comm: syz-executor.4 Not tainted 5.13.0-rc7-syzkaller #0 [ 142.236360][ T7894] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 142.240812][ T7897] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 142.240825][ T7897] Call Trace: 16:11:45 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 142.240833][ T7897] dump_stack+0x137/0x19d [ 142.240857][ T7897] should_fail+0x23c/0x250 [ 142.240876][ T7897] __should_failslab+0x81/0x90 [ 142.274205][ T7897] should_failslab+0x5/0x20 [ 142.278716][ T7897] kmem_cache_alloc_node_trace+0x58/0x2e0 [ 142.284453][ T7897] ? local_bh_enable+0x1b/0x20 [ 142.289295][ T7897] ? __get_vm_area_node+0x11b/0x260 [ 142.294545][ T7897] __get_vm_area_node+0x11b/0x260 [ 142.299589][ T7897] __vmalloc_node_range+0xc2/0x5b0 [ 142.304713][ T7897] ? netlink_sendmsg+0x425/0x7c0 [ 142.309723][ T7897] ? rht_key_hashfn+0x60/0x60 [ 142.314410][ T7897] ? netlink_hash+0x90/0x90 [ 142.318953][ T7897] ? netlink_sendmsg+0x425/0x7c0 [ 142.323940][ T7897] vmalloc+0x5a/0x70 [ 142.327853][ T7897] ? netlink_sendmsg+0x425/0x7c0 [ 142.332867][ T7897] netlink_sendmsg+0x425/0x7c0 [ 142.337712][ T7897] __sys_sendto+0x2a8/0x370 [ 142.342237][ T7897] ? __fget_light+0x21b/0x260 [ 142.346991][ T7897] ? __cond_resched+0x11/0x40 [ 142.351764][ T7897] ? fput+0x2d/0x130 [ 142.355672][ T7897] __x64_sys_sendto+0x74/0x90 [ 142.360455][ T7897] do_syscall_64+0x4a/0x90 [ 142.364864][ T7897] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 142.370827][ T7897] RIP: 0033:0x4665d9 [ 142.374729][ T7897] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 142.394537][ T7897] RSP: 002b:00007fb5cc5e4188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 142.402943][ T7897] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 142.411709][ T7897] RDX: 0000000000010a86 RSI: 0000000020000000 RDI: 0000000000000003 [ 142.419904][ T7897] RBP: 00007fb5cc5e41d0 R08: 0000000000000000 R09: 4b6ae4f95a5de35b [ 142.427880][ T7897] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 142.436279][ T7897] R13: 00007fff9eec533f R14: 00007fb5cc5e4300 R15: 0000000000022000 [ 142.444291][ T7897] syz-executor.4: vmalloc size 68608 allocation failure: vm_struct allocation failed, mode:0xcc0(GFP_KERNEL), nodemask=(null),cpuset=/,mems_allowed=0 [ 142.459448][ T7897] CPU: 0 PID: 7897 Comm: syz-executor.4 Not tainted 5.13.0-rc7-syzkaller #0 [ 142.468120][ T7897] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 142.478270][ T7897] Call Trace: [ 142.481782][ T7897] dump_stack+0x137/0x19d [ 142.486102][ T7897] warn_alloc+0x105/0x160 [ 142.490477][ T7897] __vmalloc_node_range+0x222/0x5b0 [ 142.495666][ T7897] ? rht_key_hashfn+0x60/0x60 [ 142.500449][ T7897] ? netlink_hash+0x90/0x90 [ 142.504967][ T7897] ? netlink_sendmsg+0x425/0x7c0 [ 142.509966][ T7897] vmalloc+0x5a/0x70 [ 142.513955][ T7897] ? netlink_sendmsg+0x425/0x7c0 [ 142.518890][ T7897] netlink_sendmsg+0x425/0x7c0 [ 142.523664][ T7897] __sys_sendto+0x2a8/0x370 [ 142.528466][ T7897] ? __fget_light+0x21b/0x260 [ 142.533161][ T7897] ? __cond_resched+0x11/0x40 [ 142.537839][ T7897] ? fput+0x2d/0x130 [ 142.541723][ T7897] __x64_sys_sendto+0x74/0x90 [ 142.546614][ T7897] do_syscall_64+0x4a/0x90 [ 142.551043][ T7897] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 142.556957][ T7897] RIP: 0033:0x4665d9 [ 142.561376][ T7897] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 142.581084][ T7897] RSP: 002b:00007fb5cc5e4188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 142.589483][ T7897] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 142.597470][ T7897] RDX: 0000000000010a86 RSI: 0000000020000000 RDI: 0000000000000003 [ 142.605460][ T7897] RBP: 00007fb5cc5e41d0 R08: 0000000000000000 R09: 4b6ae4f95a5de35b [ 142.613478][ T7897] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 142.621440][ T7897] R13: 00007fff9eec533f R14: 00007fb5cc5e4300 R15: 0000000000022000 [ 142.629605][ T7897] Mem-Info: [ 142.632743][ T7897] active_anon:63 inactive_anon:79960 isolated_anon:0 [ 142.632743][ T7897] active_file:10285 inactive_file:25907 isolated_file:0 [ 142.632743][ T7897] unevictable:0 dirty:85 writeback:0 [ 142.632743][ T7897] slab_reclaimable:3652 slab_unreclaimable:5659 [ 142.632743][ T7897] mapped:60292 shmem:2693 pagetables:1227 bounce:0 [ 142.632743][ T7897] free:1840873 free_pcp:609 free_cma:0 [ 142.669643][ T7897] Node 0 active_anon:252kB inactive_anon:319724kB active_file:41140kB inactive_file:103744kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:241168kB dirty:340kB writeback:0kB shmem:10772kB writeback_tmp:0kB kernel_stack:1936kB pagetables:4908kB all_unreclaimable? no [ 142.700904][ T7897] Node 0 DMA free:15360kB min:20kB low:32kB high:44kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 142.726861][ T7897] lowmem_reserve[]: 0 2938 7916 7916 [ 142.732303][ T7897] Node 0 DMA32 free:3013472kB min:4220kB low:7228kB high:10236kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:3013524kB mlocked:0kB bounce:0kB free_pcp:52kB local_pcp:52kB free_cma:0kB [ 142.759963][ T7897] lowmem_reserve[]: 0 0 4978 4978 [ 142.764997][ T7897] Node 0 Normal free:4334660kB min:7152kB low:12248kB high:17344kB reserved_highatomic:0KB active_anon:252kB inactive_anon:319376kB active_file:41140kB inactive_file:104092kB unevictable:0kB writepending:340kB present:5242880kB managed:5098252kB mlocked:0kB bounce:0kB free_pcp:2380kB local_pcp:1064kB free_cma:0kB [ 142.795089][ T7897] lowmem_reserve[]: 0 0 0 0 [ 142.799865][ T7897] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 142.812674][ T7897] Node 0 DMA32: 4*4kB (M) 2*8kB (M) 4*16kB (M) 4*32kB (M) 6*64kB (M) 4*128kB (M) 5*256kB (M) 5*512kB (M) 4*1024kB (M) 1*2048kB (M) 733*4096kB (M) = 3013472kB [ 142.828712][ T7897] Node 0 Normal: 1*4kB (U) 162*8kB (UME) 199*16kB (UME) 52*32kB (UME) 15*64kB (UME) 19*128kB (UME) 9*256kB (UM) 7*512kB (UM) 10*1024kB (ME) 2*2048kB (U) 1051*4096kB (UM) = 4334660kB [ 142.846937][ T7897] Node 0 hugepages_total=4 hugepages_free=4 hugepages_surp=0 hugepages_size=2048kB [ 142.856253][ T7897] 21910 total pagecache pages [ 142.860944][ T7897] 0 pages in swap cache 16:11:46 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x318, 0x0) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000000)=0x7, 0x3) 16:11:46 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0xff00, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) 16:11:46 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:46 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:46 executing program 4 (fault-call:5 fault-nth:1): sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 142.865093][ T7897] Swap cache stats: add 0, delete 0, find 0/0 [ 142.871213][ T7897] Free swap = 0kB [ 142.874942][ T7897] Total swap = 0kB [ 142.878642][ T7897] 2097051 pages RAM [ 142.882470][ T7897] 0 pages HighMem/MovableOnly [ 142.887266][ T7897] 65267 pages reserved [ 142.965611][ T7922] loop2: detected capacity change from 0 to 65608 [ 142.969671][ T7920] __nla_validate_parse: 32 callbacks suppressed [ 142.969684][ T7920] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.5'. [ 142.974303][ T7922] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 142.978448][ T7920] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 142.998302][ T7923] loop3: detected capacity change from 0 to 65608 16:11:46 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:46 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 143.012098][ T7923] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 143.017600][ T7926] FAULT_INJECTION: forcing a failure. [ 143.017600][ T7926] name failslab, interval 1, probability 0, space 0, times 0 [ 143.031309][ T7926] CPU: 1 PID: 7926 Comm: syz-executor.4 Not tainted 5.13.0-rc7-syzkaller #0 [ 143.040046][ T7926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 143.050125][ T7926] Call Trace: [ 143.053410][ T7926] dump_stack+0x137/0x19d [ 143.057756][ T7926] should_fail+0x23c/0x250 16:11:46 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 143.062239][ T7926] __should_failslab+0x81/0x90 [ 143.067010][ T7926] should_failslab+0x5/0x20 [ 143.068730][ T7936] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 143.071522][ T7926] kmem_cache_alloc_node+0x58/0x2b0 [ 143.071560][ T7926] ? alloc_vmap_area+0x12f/0x1340 [ 143.080798][ T7936] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 143.085957][ T7926] alloc_vmap_area+0x12f/0x1340 [ 143.104989][ T7926] ? kmem_cache_alloc_node_trace+0x1f6/0x2e0 [ 143.111007][ T7926] __get_vm_area_node+0x165/0x260 16:11:46 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x40000, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) [ 143.116064][ T7926] __vmalloc_node_range+0xc2/0x5b0 [ 143.121232][ T7926] ? netlink_sendmsg+0x425/0x7c0 [ 143.126247][ T7926] ? rht_key_hashfn+0x60/0x60 [ 143.130928][ T7926] ? netlink_hash+0x90/0x90 [ 143.135427][ T7926] ? netlink_sendmsg+0x425/0x7c0 [ 143.140476][ T7926] vmalloc+0x5a/0x70 [ 143.144385][ T7926] ? netlink_sendmsg+0x425/0x7c0 [ 143.149324][ T7926] netlink_sendmsg+0x425/0x7c0 [ 143.154101][ T7926] __sys_sendto+0x2a8/0x370 [ 143.158598][ T7926] ? __fget_light+0x21b/0x260 16:11:46 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 143.162108][ T7940] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 143.163280][ T7926] ? __cond_resched+0x11/0x40 [ 143.172504][ T7940] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 143.177136][ T7926] ? fput+0x2d/0x130 [ 143.190517][ T7926] __x64_sys_sendto+0x74/0x90 [ 143.195209][ T7926] do_syscall_64+0x4a/0x90 [ 143.199630][ T7926] ? irqentry_exit_to_user_mode+0x5/0x20 [ 143.205291][ T7926] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 143.211179][ T7926] RIP: 0033:0x4665d9 [ 143.215192][ T7926] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 143.226396][ T7946] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 143.234791][ T7926] RSP: 002b:00007fb5cc5e4188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 143.234815][ T7926] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 16:11:46 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e0000001100"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 143.244021][ T7946] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 143.252382][ T7926] RDX: 0000000000010a86 RSI: 0000000020000000 RDI: 0000000000000003 [ 143.252396][ T7926] RBP: 00007fb5cc5e41d0 R08: 0000000000000000 R09: 4b6ae4f95a5de35b [ 143.252409][ T7926] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 143.293569][ T7926] R13: 00007fff9eec533f R14: 00007fb5cc5e4300 R15: 0000000000022000 [ 143.306856][ T7951] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 143.316103][ T7951] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 143.340202][ T7955] loop3: detected capacity change from 0 to 65608 [ 143.358528][ T7955] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 16:11:47 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x318, 0x0) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000000)=0x7, 0x3) 16:11:47 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x1000000, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) 16:11:47 executing program 4 (fault-call:5 fault-nth:2): sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:47 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:47 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e0000001100"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 143.862505][ T7971] loop3: detected capacity change from 0 to 65608 [ 143.867986][ T7973] FAULT_INJECTION: forcing a failure. [ 143.867986][ T7973] name failslab, interval 1, probability 0, space 0, times 0 [ 143.872424][ T7971] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 143.881620][ T7973] CPU: 0 PID: 7973 Comm: syz-executor.4 Not tainted 5.13.0-rc7-syzkaller #0 [ 143.896739][ T7973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 143.906792][ T7973] Call Trace: 16:11:47 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e0000001100"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 143.910068][ T7973] dump_stack+0x137/0x19d [ 143.914464][ T7973] should_fail+0x23c/0x250 [ 143.917996][ T7977] loop2: detected capacity change from 0 to 65608 [ 143.918885][ T7973] __should_failslab+0x81/0x90 [ 143.918937][ T7973] should_failslab+0x5/0x20 [ 143.928506][ T7977] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 143.930064][ T7973] kmem_cache_alloc_node+0x58/0x2b0 [ 143.946214][ T7973] ? alloc_vmap_area+0x202/0x1340 [ 143.951243][ T7973] alloc_vmap_area+0x202/0x1340 [ 143.956101][ T7973] ? kmem_cache_alloc_node_trace+0x1f6/0x2e0 16:11:47 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:47 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0xe0ffffff, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) [ 143.962080][ T7973] __get_vm_area_node+0x165/0x260 [ 143.967114][ T7973] __vmalloc_node_range+0xc2/0x5b0 [ 143.972275][ T7973] ? netlink_sendmsg+0x425/0x7c0 [ 143.977233][ T7973] ? rht_key_hashfn+0x60/0x60 [ 143.981910][ T7973] ? netlink_hash+0x90/0x90 [ 143.986409][ T7973] ? netlink_sendmsg+0x425/0x7c0 [ 143.991483][ T7973] vmalloc+0x5a/0x70 [ 143.995467][ T7973] ? netlink_sendmsg+0x425/0x7c0 [ 144.000486][ T7973] netlink_sendmsg+0x425/0x7c0 [ 144.005248][ T7973] __sys_sendto+0x2a8/0x370 16:11:47 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:47 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 144.009753][ T7973] ? __switch_to+0x14e/0x4b0 [ 144.014365][ T7973] ? finish_task_switch+0xce/0x290 [ 144.019557][ T7973] ? __schedule+0x427/0x5b0 [ 144.024058][ T7973] ? fput+0x2d/0x130 [ 144.027952][ T7973] ? __fpregs_load_activate+0x103/0x1b0 [ 144.033497][ T7973] __x64_sys_sendto+0x74/0x90 [ 144.039479][ T7973] do_syscall_64+0x4a/0x90 [ 144.043906][ T7973] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 144.049832][ T7973] RIP: 0033:0x4665d9 [ 144.053722][ T7973] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 144.073490][ T7973] RSP: 002b:00007fb5cc5e4188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 144.082040][ T7973] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 144.090010][ T7973] RDX: 0000000000010a86 RSI: 0000000020000000 RDI: 0000000000000003 [ 144.097963][ T7973] RBP: 00007fb5cc5e41d0 R08: 0000000000000000 R09: 4b6ae4f95a5de35b 16:11:47 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 144.106018][ T7973] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 144.113982][ T7973] R13: 00007fff9eec533f R14: 00007fb5cc5e4300 R15: 0000000000022000 16:11:47 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x318, 0x0) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000000)=0x7, 0x3) 16:11:47 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:47 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:47 executing program 4 (fault-call:5 fault-nth:3): sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:47 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0xfc000000, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) 16:11:47 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 144.724266][ T8020] loop2: detected capacity change from 0 to 65608 [ 144.735805][ T8023] FAULT_INJECTION: forcing a failure. [ 144.735805][ T8023] name failslab, interval 1, probability 0, space 0, times 0 [ 144.747391][ T8020] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 144.749239][ T8023] CPU: 0 PID: 8023 Comm: syz-executor.4 Not tainted 5.13.0-rc7-syzkaller #0 [ 144.764535][ T8023] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 16:11:48 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={0x0, 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 144.771008][ T8024] loop3: detected capacity change from 0 to 65608 [ 144.774586][ T8023] Call Trace: [ 144.774596][ T8023] dump_stack+0x137/0x19d [ 144.774621][ T8023] should_fail+0x23c/0x250 [ 144.787439][ T8024] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 144.788718][ T8023] __should_failslab+0x81/0x90 [ 144.788745][ T8023] should_failslab+0x5/0x20 [ 144.808960][ T8023] kmem_cache_alloc_node_trace+0x58/0x2e0 [ 144.814790][ T8023] ? __kmalloc_node+0x30/0x40 [ 144.819479][ T8023] ? __get_vm_area_node+0x226/0x260 16:11:48 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={0x0, 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 144.824780][ T8023] __kmalloc_node+0x30/0x40 [ 144.829293][ T8023] __vmalloc_node_range+0x250/0x5b0 [ 144.834511][ T8023] ? rht_key_hashfn+0x60/0x60 [ 144.839236][ T8023] ? netlink_sendmsg+0x425/0x7c0 [ 144.844194][ T8023] vmalloc+0x5a/0x70 [ 144.848188][ T8023] ? netlink_sendmsg+0x425/0x7c0 [ 144.853156][ T8023] netlink_sendmsg+0x425/0x7c0 [ 144.857925][ T8023] __sys_sendto+0x2a8/0x370 [ 144.862433][ T8023] ? __fget_light+0x21b/0x260 [ 144.867183][ T8023] ? __cond_resched+0x11/0x40 16:11:48 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={0x0, 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:48 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 144.872647][ T8023] ? fput+0x2d/0x130 [ 144.876548][ T8023] __x64_sys_sendto+0x74/0x90 [ 144.881255][ T8023] do_syscall_64+0x4a/0x90 [ 144.885683][ T8023] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 144.891593][ T8023] RIP: 0033:0x4665d9 [ 144.895490][ T8023] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 144.915199][ T8023] RSP: 002b:00007fb5cc5e4188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c 16:11:48 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 144.923620][ T8023] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 144.931600][ T8023] RDX: 0000000000010a86 RSI: 0000000020000000 RDI: 0000000000000003 [ 144.939573][ T8023] RBP: 00007fb5cc5e41d0 R08: 0000000000000000 R09: 4b6ae4f95a5de35b [ 144.947554][ T8023] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 144.955644][ T8023] R13: 00007fff9eec533f R14: 00007fb5cc5e4300 R15: 0000000000022000 16:11:48 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x318, 0x0) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x3) 16:11:48 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0xfe80ffff, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) 16:11:48 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:48 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:48 executing program 4 (fault-call:5 fault-nth:4): sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 145.583244][ T8064] loop2: detected capacity change from 0 to 65608 [ 145.587696][ T8068] FAULT_INJECTION: forcing a failure. [ 145.587696][ T8068] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 145.591590][ T8064] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 145.602939][ T8068] CPU: 0 PID: 8068 Comm: syz-executor.4 Not tainted 5.13.0-rc7-syzkaller #0 [ 145.618192][ T8068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 145.628525][ T8068] Call Trace: 16:11:48 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 145.631806][ T8068] dump_stack+0x137/0x19d [ 145.636221][ T8068] should_fail+0x23c/0x250 [ 145.640699][ T8068] __alloc_pages+0x102/0x320 [ 145.645338][ T8068] __vmalloc_node_range+0x319/0x5b0 [ 145.648010][ T8065] loop3: detected capacity change from 0 to 65608 [ 145.650631][ T8068] ? netlink_sendmsg+0x425/0x7c0 [ 145.662074][ T8068] vmalloc+0x5a/0x70 [ 145.665416][ T8065] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 145.665978][ T8068] ? netlink_sendmsg+0x425/0x7c0 [ 145.677394][ T8068] netlink_sendmsg+0x425/0x7c0 16:11:48 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:48 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0xfec0ffff, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) [ 145.682175][ T8068] __sys_sendto+0x2a8/0x370 [ 145.686691][ T8068] ? __fget_light+0x21b/0x260 [ 145.691380][ T8068] ? __cond_resched+0x11/0x40 [ 145.696063][ T8068] ? fput+0x2d/0x130 [ 145.699963][ T8068] __x64_sys_sendto+0x74/0x90 [ 145.704699][ T8068] do_syscall_64+0x4a/0x90 [ 145.709166][ T8068] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 145.715297][ T8068] RIP: 0033:0x4665d9 16:11:48 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 145.719193][ T8068] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 145.738842][ T8068] RSP: 002b:00007fb5cc5e4188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 145.747262][ T8068] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 145.755236][ T8068] RDX: 0000000000010a86 RSI: 0000000020000000 RDI: 0000000000000003 [ 145.763254][ T8068] RBP: 00007fb5cc5e41d0 R08: 0000000000000000 R09: 4b6ae4f95a5de35b [ 145.771233][ T8068] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 16:11:49 executing program 4 (fault-call:5 fault-nth:5): sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 145.779239][ T8068] R13: 00007fff9eec533f R14: 00007fb5cc5e4300 R15: 0000000000022000 [ 145.839540][ T8098] FAULT_INJECTION: forcing a failure. [ 145.839540][ T8098] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 145.844346][ T8100] loop2: detected capacity change from 0 to 65608 [ 145.852925][ T8098] CPU: 0 PID: 8098 Comm: syz-executor.4 Not tainted 5.13.0-rc7-syzkaller #0 [ 145.863135][ T8100] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 145.869306][ T8098] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 145.885906][ T8098] Call Trace: [ 145.889186][ T8098] dump_stack+0x137/0x19d [ 145.893524][ T8098] should_fail+0x23c/0x250 [ 145.898008][ T8098] __alloc_pages+0x102/0x320 [ 145.902647][ T8098] __vmalloc_node_range+0x319/0x5b0 [ 145.907862][ T8098] ? netlink_sendmsg+0x425/0x7c0 [ 145.912810][ T8098] vmalloc+0x5a/0x70 [ 145.916723][ T8098] ? netlink_sendmsg+0x425/0x7c0 [ 145.921745][ T8098] netlink_sendmsg+0x425/0x7c0 [ 145.926498][ T8098] __sys_sendto+0x2a8/0x370 [ 145.930994][ T8098] ? __fget_light+0x21b/0x260 [ 145.935857][ T8098] ? __cond_resched+0x11/0x40 [ 145.940537][ T8098] ? fput+0x2d/0x130 [ 145.944450][ T8098] __x64_sys_sendto+0x74/0x90 [ 145.949130][ T8098] do_syscall_64+0x4a/0x90 [ 145.953680][ T8098] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 145.959720][ T8098] RIP: 0033:0x4665d9 [ 145.963658][ T8098] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 145.983773][ T8098] RSP: 002b:00007fb5cc5e4188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 145.992197][ T8098] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 146.000393][ T8098] RDX: 0000000000010a86 RSI: 0000000020000000 RDI: 0000000000000003 [ 146.008363][ T8098] RBP: 00007fb5cc5e41d0 R08: 0000000000000000 R09: 4b6ae4f95a5de35b [ 146.016420][ T8098] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 146.024379][ T8098] R13: 00007fff9eec533f R14: 00007fb5cc5e4300 R15: 0000000000022000 16:11:49 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x318, 0x0) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x3) 16:11:49 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c0000000906000000014000000000000000"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:49 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:49 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0xff000000, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) 16:11:49 executing program 4 (fault-call:5 fault-nth:6): sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:49 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c0000000906000000014000000000000000"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 146.492975][ T8118] loop3: detected capacity change from 0 to 65608 [ 146.500563][ T8123] FAULT_INJECTION: forcing a failure. [ 146.500563][ T8123] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 146.513845][ T8123] CPU: 0 PID: 8123 Comm: syz-executor.4 Not tainted 5.13.0-rc7-syzkaller #0 [ 146.522523][ T8123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 146.532574][ T8123] Call Trace: [ 146.535878][ T8123] dump_stack+0x137/0x19d 16:11:49 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c0000000906000000014000000000000000"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 146.540296][ T8123] should_fail+0x23c/0x250 [ 146.544753][ T8123] __alloc_pages+0x102/0x320 [ 146.549346][ T8123] __vmalloc_node_range+0x319/0x5b0 [ 146.554648][ T8123] ? netlink_sendmsg+0x425/0x7c0 [ 146.559594][ T8123] vmalloc+0x5a/0x70 [ 146.563530][ T8123] ? netlink_sendmsg+0x425/0x7c0 [ 146.568616][ T8123] netlink_sendmsg+0x425/0x7c0 [ 146.573074][ T8122] loop2: detected capacity change from 0 to 65608 [ 146.573402][ T8123] __sys_sendto+0x2a8/0x370 [ 146.573426][ T8123] ? __fget_light+0x21b/0x260 [ 146.589002][ T8123] ? __cond_resched+0x11/0x40 [ 146.589365][ T8118] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 146.593690][ T8123] ? fput+0x2d/0x130 [ 146.593713][ T8123] __x64_sys_sendto+0x74/0x90 [ 146.593731][ T8123] do_syscall_64+0x4a/0x90 [ 146.593752][ T8123] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 146.608277][ T8122] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 146.608795][ T8123] RIP: 0033:0x4665d9 [ 146.608814][ T8123] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 146.650415][ T8123] RSP: 002b:00007fb5cc5e4188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 146.658819][ T8123] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 146.666879][ T8123] RDX: 0000000000010a86 RSI: 0000000020000000 RDI: 0000000000000003 [ 146.674852][ T8123] RBP: 00007fb5cc5e41d0 R08: 0000000000000000 R09: 4b6ae4f95a5de35b [ 146.682825][ T8123] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 16:11:49 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0xffff0000, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) 16:11:49 executing program 4 (fault-call:5 fault-nth:7): sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:49 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c0000000906000000014000000000000000000005000100070000"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 146.690889][ T8123] R13: 00007fff9eec533f R14: 00007fb5cc5e4300 R15: 0000000000022000 16:11:49 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 146.774486][ T8147] FAULT_INJECTION: forcing a failure. [ 146.774486][ T8147] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 146.787846][ T8147] CPU: 0 PID: 8147 Comm: syz-executor.4 Not tainted 5.13.0-rc7-syzkaller #0 [ 146.796570][ T8147] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 146.798426][ T8150] loop3: detected capacity change from 0 to 65608 [ 146.806718][ T8147] Call Trace: [ 146.806731][ T8147] dump_stack+0x137/0x19d [ 146.806763][ T8147] should_fail+0x23c/0x250 [ 146.815592][ T8150] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 146.816452][ T8147] __alloc_pages+0x102/0x320 [ 146.816477][ T8147] __vmalloc_node_range+0x319/0x5b0 [ 146.841596][ T8147] ? netlink_sendmsg+0x425/0x7c0 [ 146.846528][ T8147] vmalloc+0x5a/0x70 [ 146.850415][ T8147] ? netlink_sendmsg+0x425/0x7c0 [ 146.855377][ T8147] netlink_sendmsg+0x425/0x7c0 [ 146.860269][ T8147] __sys_sendto+0x2a8/0x370 [ 146.864830][ T8147] ? __fget_light+0x21b/0x260 [ 146.869649][ T8147] ? __cond_resched+0x11/0x40 [ 146.874318][ T8147] ? fput+0x2d/0x130 [ 146.878278][ T8147] __x64_sys_sendto+0x74/0x90 [ 146.882957][ T8147] do_syscall_64+0x4a/0x90 [ 146.887391][ T8147] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 146.893395][ T8147] RIP: 0033:0x4665d9 [ 146.897302][ T8147] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 146.917275][ T8147] RSP: 002b:00007fb5cc5e4188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 146.925850][ T8147] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 146.933837][ T8147] RDX: 0000000000010a86 RSI: 0000000020000000 RDI: 0000000000000003 [ 146.941819][ T8147] RBP: 00007fb5cc5e41d0 R08: 0000000000000000 R09: 4b6ae4f95a5de35b [ 146.949806][ T8147] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 146.957768][ T8147] R13: 00007fff9eec533f R14: 00007fb5cc5e4300 R15: 0000000000022000 16:11:50 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x318, 0x0) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x3) 16:11:50 executing program 4 (fault-call:5 fault-nth:8): sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:50 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:50 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0xffff80fe, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) 16:11:50 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c0000000906000000014000000000000000000005000100070000"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 147.343967][ T8167] FAULT_INJECTION: forcing a failure. [ 147.343967][ T8167] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 147.357287][ T8167] CPU: 0 PID: 8167 Comm: syz-executor.4 Not tainted 5.13.0-rc7-syzkaller #0 [ 147.365962][ T8167] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 147.376020][ T8167] Call Trace: [ 147.379293][ T8167] dump_stack+0x137/0x19d [ 147.383627][ T8167] should_fail+0x23c/0x250 [ 147.388039][ T8167] __alloc_pages+0x102/0x320 16:11:50 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c0000000906000000014000000000000000000005000100070000"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 147.390075][ T8172] loop2: detected capacity change from 0 to 65608 [ 147.392631][ T8167] __vmalloc_node_range+0x319/0x5b0 [ 147.404239][ T8167] ? netlink_sendmsg+0x425/0x7c0 [ 147.407921][ T8176] loop3: detected capacity change from 0 to 65608 [ 147.409219][ T8167] vmalloc+0x5a/0x70 [ 147.409246][ T8167] ? netlink_sendmsg+0x425/0x7c0 [ 147.420437][ T8172] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 147.424474][ T8167] netlink_sendmsg+0x425/0x7c0 [ 147.424503][ T8167] __sys_sendto+0x2a8/0x370 16:11:50 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 147.432316][ T8176] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 147.435791][ T8167] ? __fget_light+0x21b/0x260 [ 147.435818][ T8167] ? __cond_resched+0x11/0x40 [ 147.435836][ T8167] ? fput+0x2d/0x130 [ 147.460135][ T8167] __x64_sys_sendto+0x74/0x90 [ 147.464839][ T8167] do_syscall_64+0x4a/0x90 [ 147.469281][ T8167] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 147.475178][ T8167] RIP: 0033:0x4665d9 16:11:50 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0xffffc0fe, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) [ 147.479072][ T8167] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 147.498824][ T8167] RSP: 002b:00007fb5cc5e4188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 147.507261][ T8167] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 147.515232][ T8167] RDX: 0000000000010a86 RSI: 0000000020000000 RDI: 0000000000000003 [ 147.523193][ T8167] RBP: 00007fb5cc5e41d0 R08: 0000000000000000 R09: 4b6ae4f95a5de35b [ 147.531168][ T8167] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 16:11:50 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:50 executing program 4 (fault-call:5 fault-nth:9): sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 147.539418][ T8167] R13: 00007fff9eec533f R14: 00007fb5cc5e4300 R15: 0000000000022000 [ 147.578711][ T8202] FAULT_INJECTION: forcing a failure. [ 147.578711][ T8202] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 147.592003][ T8202] CPU: 1 PID: 8202 Comm: syz-executor.4 Not tainted 5.13.0-rc7-syzkaller #0 [ 147.600816][ T8202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 147.610870][ T8202] Call Trace: [ 147.614199][ T8202] dump_stack+0x137/0x19d [ 147.618635][ T8202] should_fail+0x23c/0x250 [ 147.623143][ T8202] __alloc_pages+0x102/0x320 16:11:50 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:50 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 147.627749][ T8202] __vmalloc_node_range+0x319/0x5b0 [ 147.632954][ T8202] ? netlink_sendmsg+0x425/0x7c0 [ 147.633555][ T8209] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 147.637896][ T8202] vmalloc+0x5a/0x70 [ 147.649942][ T8202] ? netlink_sendmsg+0x425/0x7c0 [ 147.654882][ T8202] netlink_sendmsg+0x425/0x7c0 [ 147.659639][ T8202] __sys_sendto+0x2a8/0x370 [ 147.664140][ T8202] ? __fget_light+0x21b/0x260 [ 147.668898][ T8202] ? __cond_resched+0x11/0x40 [ 147.673591][ T8202] ? fput+0x2d/0x130 [ 147.677485][ T8202] __x64_sys_sendto+0x74/0x90 [ 147.682159][ T8202] do_syscall_64+0x4a/0x90 [ 147.686575][ T8202] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 147.692471][ T8202] RIP: 0033:0x4665d9 [ 147.696363][ T8202] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 147.716098][ T8202] RSP: 002b:00007fb5cc5e4188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 147.724507][ T8202] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 147.732456][ T8202] RDX: 0000000000010a86 RSI: 0000000020000000 RDI: 0000000000000003 [ 147.740405][ T8202] RBP: 00007fb5cc5e41d0 R08: 0000000000000000 R09: 4b6ae4f95a5de35b [ 147.748376][ T8202] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 147.756437][ T8202] R13: 00007fff9eec533f R14: 00007fb5cc5e4300 R15: 0000000000022000 16:11:51 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x318, 0x0) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x3) 16:11:51 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:51 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0xffffffe0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) 16:11:51 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:51 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:51 executing program 4 (fault-call:5 fault-nth:10): sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 148.228244][ T8222] loop2: detected capacity change from 0 to 65608 [ 148.240614][ T8222] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 148.240760][ T8226] FAULT_INJECTION: forcing a failure. [ 148.240760][ T8226] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 148.253014][ T8231] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 148.260514][ T8226] CPU: 0 PID: 8226 Comm: syz-executor.4 Not tainted 5.13.0-rc7-syzkaller #0 16:11:51 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 148.260538][ T8226] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 148.268776][ T8231] __nla_validate_parse: 30 callbacks suppressed [ 148.268788][ T8231] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 148.277420][ T8226] Call Trace: [ 148.277433][ T8226] dump_stack+0x137/0x19d [ 148.310673][ T8226] should_fail+0x23c/0x250 [ 148.315096][ T8226] __alloc_pages+0x102/0x320 [ 148.319010][ T8227] loop3: detected capacity change from 0 to 65608 [ 148.319692][ T8226] __vmalloc_node_range+0x319/0x5b0 [ 148.331299][ T8226] ? netlink_sendmsg+0x425/0x7c0 [ 148.334165][ T8227] EXT4-fs (loop3): invalid first ino: 0 [ 148.336328][ T8226] vmalloc+0x5a/0x70 [ 148.336355][ T8226] ? netlink_sendmsg+0x425/0x7c0 [ 148.336377][ T8226] netlink_sendmsg+0x425/0x7c0 [ 148.352273][ T8239] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 148.355578][ T8226] __sys_sendto+0x2a8/0x370 [ 148.355602][ T8226] ? __fget_light+0x21b/0x260 [ 148.355623][ T8226] ? __cond_resched+0x11/0x40 16:11:51 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c00"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 148.363769][ T8239] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 148.368269][ T8226] ? fput+0x2d/0x130 [ 148.368292][ T8226] __x64_sys_sendto+0x74/0x90 [ 148.368309][ T8226] do_syscall_64+0x4a/0x90 [ 148.368329][ T8226] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 148.405973][ T8226] RIP: 0033:0x4665d9 16:11:51 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x4}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) 16:11:51 executing program 4 (fault-call:5 fault-nth:11): sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 148.409870][ T8226] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 148.423374][ T8243] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 148.429554][ T8226] RSP: 002b:00007fb5cc5e4188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 148.429579][ T8226] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 148.429591][ T8226] RDX: 0000000000010a86 RSI: 0000000020000000 RDI: 0000000000000003 [ 148.429601][ T8226] RBP: 00007fb5cc5e41d0 R08: 0000000000000000 R09: 4b6ae4f95a5de35b [ 148.429613][ T8226] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 148.429623][ T8226] R13: 00007fff9eec533f R14: 00007fb5cc5e4300 R15: 0000000000022000 [ 148.486192][ T8243] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 148.498144][ T8250] FAULT_INJECTION: forcing a failure. [ 148.498144][ T8250] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 148.511431][ T8250] CPU: 0 PID: 8250 Comm: syz-executor.4 Not tainted 5.13.0-rc7-syzkaller #0 [ 148.520117][ T8250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 148.530205][ T8250] Call Trace: [ 148.533495][ T8250] dump_stack+0x137/0x19d [ 148.537835][ T8250] should_fail+0x23c/0x250 [ 148.542367][ T8250] __alloc_pages+0x102/0x320 [ 148.544479][ T8254] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 148.546961][ T8250] __vmalloc_node_range+0x319/0x5b0 [ 148.546992][ T8250] ? netlink_sendmsg+0x425/0x7c0 [ 148.555177][ T8254] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 148.560312][ T8250] vmalloc+0x5a/0x70 16:11:51 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xfc}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) 16:11:51 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c00"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 148.578328][ T8250] ? netlink_sendmsg+0x425/0x7c0 [ 148.583419][ T8250] netlink_sendmsg+0x425/0x7c0 [ 148.588201][ T8250] __sys_sendto+0x2a8/0x370 [ 148.592710][ T8250] ? __fget_light+0x21b/0x260 [ 148.597391][ T8250] ? __cond_resched+0x11/0x40 [ 148.602071][ T8250] ? fput+0x2d/0x130 [ 148.605970][ T8250] __x64_sys_sendto+0x74/0x90 [ 148.610728][ T8250] do_syscall_64+0x4a/0x90 [ 148.615213][ T8250] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 148.621178][ T8250] RIP: 0033:0x4665d9 [ 148.625075][ T8250] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 148.644689][ T8250] RSP: 002b:00007fb5cc5e4188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 148.653155][ T8250] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 148.661228][ T8250] RDX: 0000000000010a86 RSI: 0000000020000000 RDI: 0000000000000003 [ 148.669230][ T8250] RBP: 00007fb5cc5e41d0 R08: 0000000000000000 R09: 4b6ae4f95a5de35b [ 148.677532][ T8250] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 148.685496][ T8250] R13: 00007fff9eec533f R14: 00007fb5cc5e4300 R15: 0000000000022000 16:11:52 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x318, 0x0) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x3) 16:11:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:52 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c00"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:52 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xfc00}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) 16:11:52 executing program 4 (fault-call:5 fault-nth:12): sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 149.092682][ T8273] FAULT_INJECTION: forcing a failure. [ 149.092682][ T8273] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 149.097362][ T8276] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 149.106094][ T8273] CPU: 0 PID: 8273 Comm: syz-executor.4 Not tainted 5.13.0-rc7-syzkaller #0 [ 149.114246][ T8276] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 149.123049][ T8273] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 16:11:52 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:52 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 149.123062][ T8273] Call Trace: [ 149.123070][ T8273] dump_stack+0x137/0x19d [ 149.123095][ T8273] should_fail+0x23c/0x250 [ 149.123113][ T8273] __alloc_pages+0x102/0x320 [ 149.123146][ T8273] __vmalloc_node_range+0x319/0x5b0 [ 149.123168][ T8273] ? netlink_sendmsg+0x425/0x7c0 [ 149.170028][ T8273] vmalloc+0x5a/0x70 [ 149.174100][ T8273] ? netlink_sendmsg+0x425/0x7c0 [ 149.179038][ T8273] netlink_sendmsg+0x425/0x7c0 [ 149.183825][ T8273] __sys_sendto+0x2a8/0x370 [ 149.188335][ T8273] ? __fget_light+0x21b/0x260 16:11:52 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:52 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 149.193030][ T8273] ? __cond_resched+0x11/0x40 [ 149.197704][ T8273] ? fput+0x2d/0x130 [ 149.201598][ T8273] __x64_sys_sendto+0x74/0x90 [ 149.206385][ T8273] do_syscall_64+0x4a/0x90 [ 149.210852][ T8273] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 149.216819][ T8273] RIP: 0033:0x4665d9 [ 149.220714][ T8273] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 16:11:52 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 149.228489][ T8288] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1555 sclass=netlink_route_socket pid=8288 comm=syz-executor.5 [ 149.240366][ T8273] RSP: 002b:00007fb5cc5e4188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 149.240392][ T8273] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 149.269716][ T8273] RDX: 0000000000010a86 RSI: 0000000020000000 RDI: 0000000000000003 [ 149.276787][ T8274] loop2: detected capacity change from 0 to 65608 [ 149.277728][ T8273] RBP: 00007fb5cc5e41d0 R08: 0000000000000000 R09: 4b6ae4f95a5de35b [ 149.277743][ T8273] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 149.288317][ T8274] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 149.292106][ T8273] R13: 00007fff9eec533f R14: 00007fb5cc5e4300 R15: 0000000000022000 [ 149.314906][ T8272] loop3: detected capacity change from 0 to 65608 [ 149.323627][ T8272] EXT4-fs (loop3): invalid first ino: 0 16:11:52 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xff00}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) [ 149.343670][ T8299] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1555 sclass=netlink_route_socket pid=8299 comm=syz-executor.5 16:11:53 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x318, 0x0) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x3) 16:11:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:53 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:53 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:53 executing program 4 (fault-call:5 fault-nth:13): sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:53 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x40000}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) [ 149.991927][ T8313] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1555 sclass=netlink_route_socket pid=8313 comm=syz-executor.5 [ 150.013908][ T8319] FAULT_INJECTION: forcing a failure. [ 150.013908][ T8319] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 150.015337][ T8320] loop3: detected capacity change from 0 to 65608 [ 150.027621][ T8319] CPU: 1 PID: 8319 Comm: syz-executor.4 Not tainted 5.13.0-rc7-syzkaller #0 [ 150.042877][ T8319] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 150.046323][ T8320] EXT4-fs (loop3): invalid first ino: 0 [ 150.052995][ T8319] Call Trace: [ 150.053007][ T8319] dump_stack+0x137/0x19d [ 150.066241][ T8319] should_fail+0x23c/0x250 [ 150.070665][ T8319] __alloc_pages+0x102/0x320 [ 150.075261][ T8319] __vmalloc_node_range+0x319/0x5b0 [ 150.080549][ T8319] ? netlink_sendmsg+0x425/0x7c0 [ 150.085666][ T8319] vmalloc+0x5a/0x70 16:11:53 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1000000}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) 16:11:53 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 150.089565][ T8319] ? netlink_sendmsg+0x425/0x7c0 [ 150.094554][ T8319] netlink_sendmsg+0x425/0x7c0 [ 150.099329][ T8319] __sys_sendto+0x2a8/0x370 [ 150.103841][ T8319] ? __fget_light+0x21b/0x260 [ 150.108548][ T8319] ? __cond_resched+0x11/0x40 [ 150.111163][ T8318] loop2: detected capacity change from 0 to 65608 [ 150.113427][ T8319] ? fput+0x2d/0x130 [ 150.113450][ T8319] __x64_sys_sendto+0x74/0x90 [ 150.128414][ T8319] do_syscall_64+0x4a/0x90 [ 150.132876][ T8319] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 150.138898][ T8319] RIP: 0033:0x4665d9 [ 150.142795][ T8319] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 150.162555][ T8319] RSP: 002b:00007fb5cc5e4188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 150.170969][ T8319] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 150.178944][ T8319] RDX: 0000000000010a86 RSI: 0000000020000000 RDI: 0000000000000003 16:11:53 executing program 4 (fault-call:5 fault-nth:14): sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:53 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xe0ffffff}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) 16:11:53 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 150.186917][ T8319] RBP: 00007fb5cc5e41d0 R08: 0000000000000000 R09: 4b6ae4f95a5de35b [ 150.194922][ T8319] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 150.202917][ T8319] R13: 00007fff9eec533f R14: 00007fb5cc5e4300 R15: 0000000000022000 [ 150.211783][ T8318] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 150.216632][ T8338] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1555 sclass=netlink_route_socket pid=8338 comm=syz-executor.5 16:11:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 150.275679][ T8345] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1555 sclass=netlink_route_socket pid=8345 comm=syz-executor.5 [ 150.315548][ T8352] loop2: detected capacity change from 0 to 65608 [ 150.319414][ T8355] FAULT_INJECTION: forcing a failure. [ 150.319414][ T8355] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 150.323737][ T8352] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 150.335401][ T8355] CPU: 1 PID: 8355 Comm: syz-executor.4 Not tainted 5.13.0-rc7-syzkaller #0 [ 150.350716][ T8355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 150.360799][ T8355] Call Trace: [ 150.364082][ T8355] dump_stack+0x137/0x19d [ 150.370257][ T8355] should_fail+0x23c/0x250 [ 150.374668][ T8355] __alloc_pages+0x102/0x320 [ 150.379242][ T8355] __vmalloc_node_range+0x319/0x5b0 [ 150.384450][ T8355] ? netlink_sendmsg+0x425/0x7c0 [ 150.389367][ T8355] vmalloc+0x5a/0x70 [ 150.393360][ T8355] ? netlink_sendmsg+0x425/0x7c0 [ 150.398337][ T8355] netlink_sendmsg+0x425/0x7c0 [ 150.403081][ T8355] __sys_sendto+0x2a8/0x370 [ 150.407569][ T8355] ? __fget_light+0x21b/0x260 [ 150.412231][ T8355] ? __cond_resched+0x11/0x40 [ 150.416885][ T8355] ? fput+0x2d/0x130 [ 150.420846][ T8355] __x64_sys_sendto+0x74/0x90 [ 150.425557][ T8355] do_syscall_64+0x4a/0x90 [ 150.429988][ T8355] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 150.435884][ T8355] RIP: 0033:0x4665d9 [ 150.439792][ T8355] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 150.459492][ T8355] RSP: 002b:00007fb5cc5e4188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 150.467882][ T8355] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 150.475835][ T8355] RDX: 0000000000010a86 RSI: 0000000020000000 RDI: 0000000000000003 [ 150.483805][ T8355] RBP: 00007fb5cc5e41d0 R08: 0000000000000000 R09: 4b6ae4f95a5de35b [ 150.491888][ T8355] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 150.499839][ T8355] R13: 00007fff9eec533f R14: 00007fb5cc5e4300 R15: 0000000000022000 16:11:54 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x318, 0x0) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0x7, 0x0) 16:11:54 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xfc000000}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) 16:11:54 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:54 executing program 4 (fault-call:5 fault-nth:15): sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 150.927100][ T8370] FAULT_INJECTION: forcing a failure. [ 150.927100][ T8370] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 150.927914][ T8371] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1555 sclass=netlink_route_socket pid=8371 comm=syz-executor.5 [ 150.940352][ T8370] CPU: 1 PID: 8370 Comm: syz-executor.4 Not tainted 5.13.0-rc7-syzkaller #0 [ 150.956845][ T8373] loop3: detected capacity change from 0 to 65608 [ 150.962386][ T8370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 150.962399][ T8370] Call Trace: [ 150.962409][ T8370] dump_stack+0x137/0x19d [ 150.986722][ T8370] should_fail+0x23c/0x250 [ 150.992077][ T8370] __alloc_pages+0x102/0x320 [ 150.996657][ T8370] __vmalloc_node_range+0x319/0x5b0 [ 151.001856][ T8370] ? netlink_sendmsg+0x425/0x7c0 [ 151.006806][ T8370] vmalloc+0x5a/0x70 [ 151.010698][ T8370] ? netlink_sendmsg+0x425/0x7c0 [ 151.015629][ T8370] netlink_sendmsg+0x425/0x7c0 [ 151.020563][ T8370] __sys_sendto+0x2a8/0x370 [ 151.025169][ T8370] ? __fget_light+0x21b/0x260 [ 151.029856][ T8370] ? __cond_resched+0x11/0x40 [ 151.034524][ T8370] ? fput+0x2d/0x130 [ 151.038534][ T8370] __x64_sys_sendto+0x74/0x90 [ 151.043563][ T8370] do_syscall_64+0x4a/0x90 [ 151.048038][ T8370] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 151.053931][ T8370] RIP: 0033:0x4665d9 [ 151.057892][ T8370] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 151.077588][ T8370] RSP: 002b:00007fb5cc5e4188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 151.086002][ T8370] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 151.094260][ T8370] RDX: 0000000000010a86 RSI: 0000000020000000 RDI: 0000000000000003 [ 151.102310][ T8370] RBP: 00007fb5cc5e41d0 R08: 0000000000000000 R09: 4b6ae4f95a5de35b [ 151.110299][ T8370] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 151.118299][ T8370] R13: 00007fff9eec533f R14: 00007fb5cc5e4300 R15: 0000000000022000 16:11:54 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x318, 0x0) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0x7, 0x0) 16:11:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xfe80ffff}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) 16:11:54 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d", 0xc, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 151.127321][ T8373] EXT4-fs (loop3): fragment/cluster size (65536) != block size (4096) [ 151.154261][ T8372] loop2: detected capacity change from 0 to 65608 [ 151.172487][ T8372] EXT4-fs (loop2): invalid first ino: 0 16:11:54 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:54 executing program 4 (fault-call:5 fault-nth:16): sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 151.229129][ T8392] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 151.233374][ T8397] FAULT_INJECTION: forcing a failure. [ 151.233374][ T8397] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 151.237392][ T8392] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 151.250686][ T8397] CPU: 0 PID: 8397 Comm: syz-executor.4 Not tainted 5.13.0-rc7-syzkaller #0 [ 151.268729][ T8397] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 16:11:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xfec0ffff}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) [ 151.278911][ T8397] Call Trace: [ 151.282197][ T8397] dump_stack+0x137/0x19d [ 151.286881][ T8397] should_fail+0x23c/0x250 [ 151.291304][ T8397] __alloc_pages+0x102/0x320 [ 151.295896][ T8397] __vmalloc_node_range+0x319/0x5b0 [ 151.301094][ T8397] ? netlink_sendmsg+0x425/0x7c0 [ 151.306049][ T8397] vmalloc+0x5a/0x70 [ 151.310012][ T8397] ? netlink_sendmsg+0x425/0x7c0 [ 151.314953][ T8397] netlink_sendmsg+0x425/0x7c0 [ 151.319759][ T8397] __sys_sendto+0x2a8/0x370 [ 151.324261][ T8397] ? __fget_light+0x21b/0x260 16:11:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xff000000}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) 16:11:54 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d", 0xc, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 151.328936][ T8397] ? __cond_resched+0x11/0x40 [ 151.333698][ T8397] ? fput+0x2d/0x130 [ 151.337657][ T8397] __x64_sys_sendto+0x74/0x90 [ 151.342324][ T8397] do_syscall_64+0x4a/0x90 [ 151.346738][ T8397] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 151.352684][ T8397] RIP: 0033:0x4665d9 [ 151.356575][ T8397] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 151.376257][ T8397] RSP: 002b:00007fb5cc5e4188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 151.384671][ T8397] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 151.392665][ T8397] RDX: 0000000000010a86 RSI: 0000000020000000 RDI: 0000000000000003 [ 151.400638][ T8397] RBP: 00007fb5cc5e41d0 R08: 0000000000000000 R09: 4b6ae4f95a5de35b [ 151.401198][ T8415] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 151.408789][ T8397] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 16:11:54 executing program 4 (fault-call:5 fault-nth:17): sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xffff0000}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) 16:11:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 151.408804][ T8397] R13: 00007fff9eec533f R14: 00007fb5cc5e4300 R15: 0000000000022000 [ 151.433015][ T8415] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 151.458868][ T8396] loop3: detected capacity change from 0 to 65608 16:11:54 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d", 0xc, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 151.486096][ T8396] EXT4-fs (loop3): fragment/cluster size (65536) != block size (4096) [ 151.505618][ T8421] FAULT_INJECTION: forcing a failure. [ 151.505618][ T8421] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 151.518943][ T8421] CPU: 0 PID: 8421 Comm: syz-executor.4 Not tainted 5.13.0-rc7-syzkaller #0 [ 151.527600][ T8421] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 151.537826][ T8421] Call Trace: [ 151.541097][ T8421] dump_stack+0x137/0x19d [ 151.545432][ T8421] should_fail+0x23c/0x250 [ 151.549905][ T8421] __alloc_pages+0x102/0x320 [ 151.554503][ T8421] __vmalloc_node_range+0x319/0x5b0 [ 151.559741][ T8421] ? netlink_sendmsg+0x425/0x7c0 [ 151.564681][ T8421] vmalloc+0x5a/0x70 [ 151.567432][ T8435] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 151.568612][ T8421] ? netlink_sendmsg+0x425/0x7c0 [ 151.568641][ T8421] netlink_sendmsg+0x425/0x7c0 [ 151.576787][ T8435] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 151.581682][ T8421] __sys_sendto+0x2a8/0x370 [ 151.600072][ T8421] ? __fget_light+0x21b/0x260 [ 151.604745][ T8421] ? __cond_resched+0x11/0x40 [ 151.609533][ T8421] ? fput+0x2d/0x130 [ 151.613423][ T8421] __x64_sys_sendto+0x74/0x90 [ 151.618094][ T8421] do_syscall_64+0x4a/0x90 [ 151.622507][ T8421] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 151.628425][ T8421] RIP: 0033:0x4665d9 [ 151.632309][ T8421] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 151.645087][ T8433] loop2: detected capacity change from 0 to 65608 [ 151.652008][ T8421] RSP: 002b:00007fb5cc5e4188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 151.652031][ T8421] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 151.652043][ T8421] RDX: 0000000000010a86 RSI: 0000000020000000 RDI: 0000000000000003 [ 151.672662][ T8433] EXT4-fs (loop2): invalid first ino: 0 [ 151.674825][ T8421] RBP: 00007fb5cc5e41d0 R08: 0000000000000000 R09: 4b6ae4f95a5de35b [ 151.674842][ T8421] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 151.674855][ T8421] R13: 00007fff9eec533f R14: 00007fb5cc5e4300 R15: 0000000000022000 16:11:55 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x318, 0x0) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0x7, 0x0) 16:11:55 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:55 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200", 0x12, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:55 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xffff80fe}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) 16:11:55 executing program 4 (fault-call:5 fault-nth:18): sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 152.076044][ T8458] loop3: detected capacity change from 0 to 65608 [ 152.076862][ T8456] FAULT_INJECTION: forcing a failure. [ 152.076862][ T8456] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 152.084574][ T8458] EXT4-fs (loop3): fragment/cluster size (65536) != block size (4096) [ 152.095794][ T8456] CPU: 0 PID: 8456 Comm: syz-executor.4 Not tainted 5.13.0-rc7-syzkaller #0 [ 152.104644][ T8457] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 152.112679][ T8456] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 152.112692][ T8456] Call Trace: [ 152.112701][ T8456] dump_stack+0x137/0x19d [ 152.120904][ T8457] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 152.131523][ T8456] should_fail+0x23c/0x250 [ 152.131555][ T8456] __alloc_pages+0x102/0x320 [ 152.136628][ T8455] loop2: detected capacity change from 0 to 65608 [ 152.139395][ T8456] __vmalloc_node_range+0x319/0x5b0 [ 152.153435][ T8455] EXT4-fs (loop2): invalid first ino: 0 16:11:55 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xffffc0fe}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) 16:11:55 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200", 0x12, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 152.157635][ T8456] ? netlink_sendmsg+0x425/0x7c0 [ 152.179688][ T8456] vmalloc+0x5a/0x70 [ 152.183646][ T8456] ? netlink_sendmsg+0x425/0x7c0 [ 152.188589][ T8456] netlink_sendmsg+0x425/0x7c0 [ 152.193353][ T8456] __sys_sendto+0x2a8/0x370 [ 152.197968][ T8456] ? __fget_light+0x21b/0x260 [ 152.202651][ T8456] ? __cond_resched+0x11/0x40 [ 152.207331][ T8456] ? fput+0x2d/0x130 [ 152.211527][ T8456] __x64_sys_sendto+0x74/0x90 [ 152.216233][ T8456] do_syscall_64+0x4a/0x90 [ 152.220648][ T8456] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 152.226549][ T8456] RIP: 0033:0x4665d9 [ 152.230435][ T8456] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 152.234985][ T8472] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 152.250043][ T8456] RSP: 002b:00007fb5cc5e4188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 152.250114][ T8456] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 16:11:55 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xffffffe0}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) 16:11:55 executing program 4 (fault-call:5 fault-nth:19): sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 152.250125][ T8456] RDX: 0000000000010a86 RSI: 0000000020000000 RDI: 0000000000000003 [ 152.250136][ T8456] RBP: 00007fb5cc5e41d0 R08: 0000000000000000 R09: 4b6ae4f95a5de35b [ 152.250147][ T8456] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 152.250158][ T8456] R13: 00007fff9eec533f R14: 00007fb5cc5e4300 R15: 0000000000022000 [ 152.326834][ T8481] FAULT_INJECTION: forcing a failure. [ 152.326834][ T8481] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 152.340101][ T8481] CPU: 0 PID: 8481 Comm: syz-executor.4 Not tainted 5.13.0-rc7-syzkaller #0 [ 152.348849][ T8481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 152.358981][ T8481] Call Trace: [ 152.362259][ T8481] dump_stack+0x137/0x19d [ 152.366683][ T8481] should_fail+0x23c/0x250 [ 152.371107][ T8481] __alloc_pages+0x102/0x320 16:11:55 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200", 0x12, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:55 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xffff00000000}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) [ 152.375698][ T8481] __vmalloc_node_range+0x319/0x5b0 [ 152.380959][ T8481] ? netlink_sendmsg+0x425/0x7c0 [ 152.385902][ T8481] vmalloc+0x5a/0x70 [ 152.389829][ T8481] ? netlink_sendmsg+0x425/0x7c0 [ 152.394771][ T8481] netlink_sendmsg+0x425/0x7c0 [ 152.399591][ T8481] __sys_sendto+0x2a8/0x370 [ 152.404106][ T8481] ? __fget_light+0x21b/0x260 [ 152.408792][ T8481] ? __cond_resched+0x11/0x40 [ 152.413489][ T8481] ? fput+0x2d/0x130 [ 152.417381][ T8481] __x64_sys_sendto+0x74/0x90 [ 152.422056][ T8481] do_syscall_64+0x4a/0x90 [ 152.426577][ T8481] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 152.432562][ T8481] RIP: 0033:0x4665d9 [ 152.436452][ T8481] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 152.456097][ T8481] RSP: 002b:00007fb5cc5e4188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 152.464639][ T8481] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 152.472688][ T8481] RDX: 0000000000010a86 RSI: 0000000020000000 RDI: 0000000000000003 [ 152.480655][ T8481] RBP: 00007fb5cc5e41d0 R08: 0000000000000000 R09: 4b6ae4f95a5de35b [ 152.488609][ T8481] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 152.496621][ T8481] R13: 00007fff9eec533f R14: 00007fb5cc5e4300 R15: 0000000000022000 16:11:56 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:56 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a57802", 0x15, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:56 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x4000000000000}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) 16:11:56 executing program 4 (fault-call:5 fault-nth:20): sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:56 executing program 0: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c0000000906000000014000000000000000000005000100070000"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:56 executing program 0: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c0000000906000000014000000000000000000005000100070000"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:56 executing program 0 (fault-call:1 fault-nth:0): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x318, 0x0) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0x7, 0x3) [ 152.923620][ T8504] FAULT_INJECTION: forcing a failure. [ 152.923620][ T8504] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 152.936920][ T8504] CPU: 0 PID: 8504 Comm: syz-executor.4 Not tainted 5.13.0-rc7-syzkaller #0 [ 152.945605][ T8504] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 152.955770][ T8504] Call Trace: [ 152.958731][ T8507] validate_nla: 2 callbacks suppressed [ 152.958757][ T8507] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 16:11:56 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a57802", 0x15, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 152.959066][ T8504] dump_stack+0x137/0x19d [ 152.959090][ T8504] should_fail+0x23c/0x250 [ 152.981414][ T8504] __alloc_pages+0x102/0x320 [ 152.986008][ T8504] __vmalloc_node_range+0x319/0x5b0 [ 152.991277][ T8504] ? netlink_sendmsg+0x425/0x7c0 [ 152.996243][ T8504] vmalloc+0x5a/0x70 [ 153.000153][ T8504] ? netlink_sendmsg+0x425/0x7c0 [ 153.001015][ T8516] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 153.005241][ T8504] netlink_sendmsg+0x425/0x7c0 [ 153.018373][ T8504] __sys_sendto+0x2a8/0x370 16:11:56 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a57802", 0x15, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 153.023164][ T8504] ? __fget_light+0x21b/0x260 [ 153.027886][ T8504] ? __cond_resched+0x11/0x40 [ 153.032563][ T8504] ? fput+0x2d/0x130 [ 153.036458][ T8504] __x64_sys_sendto+0x74/0x90 [ 153.040682][ T8518] FAULT_INJECTION: forcing a failure. [ 153.040682][ T8518] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 153.041133][ T8504] do_syscall_64+0x4a/0x90 [ 153.058590][ T8504] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 153.064518][ T8504] RIP: 0033:0x4665d9 [ 153.068438][ T8504] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 153.088305][ T8504] RSP: 002b:00007fb5cc5e4188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 153.096830][ T8504] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 153.104813][ T8504] RDX: 0000000000010a86 RSI: 0000000020000000 RDI: 0000000000000003 [ 153.113094][ T8504] RBP: 00007fb5cc5e41d0 R08: 0000000000000000 R09: 4b6ae4f95a5de35b [ 153.121158][ T8504] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 153.129236][ T8504] R13: 00007fff9eec533f R14: 00007fb5cc5e4300 R15: 0000000000022000 [ 153.137210][ T8518] CPU: 1 PID: 8518 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 153.144945][ T8502] loop2: detected capacity change from 0 to 65608 [ 153.146047][ T8518] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 153.146060][ T8518] Call Trace: [ 153.146068][ T8518] dump_stack+0x137/0x19d [ 153.170119][ T8518] should_fail+0x23c/0x250 [ 153.174603][ T8518] should_fail_usercopy+0x16/0x20 [ 153.179631][ T8518] _copy_to_user+0x1c/0x90 [ 153.184214][ T8518] simple_read_from_buffer+0xab/0x120 [ 153.189604][ T8518] proc_fail_nth_read+0xf6/0x140 [ 153.194629][ T8518] ? rw_verify_area+0x136/0x250 [ 153.199598][ T8518] ? proc_fault_inject_write+0x200/0x200 [ 153.205227][ T8518] vfs_read+0x154/0x5d0 [ 153.209378][ T8518] ? __fget_light+0x21b/0x260 [ 153.214048][ T8518] ? __cond_resched+0x11/0x40 [ 153.218719][ T8518] ksys_read+0xce/0x180 [ 153.222866][ T8518] __x64_sys_read+0x3e/0x50 [ 153.227399][ T8518] do_syscall_64+0x4a/0x90 [ 153.231876][ T8518] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 153.237773][ T8518] RIP: 0033:0x41935c [ 153.241666][ T8518] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 153.261283][ T8518] RSP: 002b:00007f94c6d92170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 16:11:56 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x100000000000000}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) [ 153.269725][ T8518] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 000000000041935c [ 153.277695][ T8518] RDX: 000000000000000f RSI: 00007f94c6d921e0 RDI: 0000000000000003 [ 153.285672][ T8518] RBP: 00007f94c6d921d0 R08: 0000000000000000 R09: 0000000000000000 [ 153.293678][ T8518] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 153.301718][ T8518] R13: 00007fff9f3e21bf R14: 00007f94c6d92300 R15: 0000000000022000 16:11:56 executing program 4 (fault-call:5 fault-nth:21): sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 153.321026][ T8502] EXT4-fs (loop2): fragment/cluster size (65536) != block size (4096) [ 153.329824][ T8519] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 153.338028][ T8519] __nla_validate_parse: 5 callbacks suppressed [ 153.338123][ T8519] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 153.364264][ T8505] loop3: detected capacity change from 0 to 65608 [ 153.380301][ T8532] FAULT_INJECTION: forcing a failure. [ 153.380301][ T8532] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 153.393453][ T8532] CPU: 0 PID: 8532 Comm: syz-executor.4 Not tainted 5.13.0-rc7-syzkaller #0 [ 153.397943][ T8505] EXT4-fs (loop3): fragment/cluster size (65536) != block size (4096) [ 153.402132][ T8532] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 153.402147][ T8532] Call Trace: [ 153.402156][ T8532] dump_stack+0x137/0x19d [ 153.428413][ T8532] should_fail+0x23c/0x250 [ 153.432873][ T8532] should_fail_usercopy+0x16/0x20 [ 153.437896][ T8532] _copy_from_iter_full+0x148/0xa10 [ 153.443155][ T8532] ? kmem_cache_alloc+0x201/0x2f0 [ 153.448206][ T8532] ? __build_skb+0x2d/0x170 [ 153.452705][ T8532] ? check_stack_object+0x61/0x70 [ 153.457714][ T8532] ? __virt_addr_valid+0x79/0x1a0 [ 153.462722][ T8532] ? __check_object_size+0x253/0x310 [ 153.467992][ T8532] netlink_sendmsg+0x579/0x7c0 [ 153.472812][ T8532] __sys_sendto+0x2a8/0x370 [ 153.477317][ T8532] ? __fget_light+0x21b/0x260 [ 153.482027][ T8532] ? __cond_resched+0x11/0x40 [ 153.486683][ T8532] ? fput+0x2d/0x130 [ 153.490558][ T8532] __x64_sys_sendto+0x74/0x90 [ 153.495215][ T8532] do_syscall_64+0x4a/0x90 [ 153.499649][ T8532] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 153.505534][ T8532] RIP: 0033:0x4665d9 [ 153.509452][ T8532] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 153.529059][ T8532] RSP: 002b:00007fb5cc5e4188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 153.537487][ T8532] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 153.545449][ T8532] RDX: 0000000000010a86 RSI: 0000000020000000 RDI: 0000000000000003 [ 153.553422][ T8532] RBP: 00007fb5cc5e41d0 R08: 0000000000000000 R09: 4b6ae4f95a5de35b [ 153.561369][ T8532] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 153.569333][ T8532] R13: 00007fff9eec533f R14: 00007fb5cc5e4300 R15: 0000000000022000 16:11:56 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:56 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x318, 0x0) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0x7, 0x3) 16:11:56 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x8000000000000000}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) 16:11:56 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a5780200", 0x16, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:56 executing program 4 (fault-call:5 fault-nth:22): sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 153.651282][ T8554] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 153.656071][ T8557] loop3: detected capacity change from 0 to 65608 [ 153.659501][ T8554] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 153.680188][ T8557] EXT4-fs (loop3): fragment/cluster size (65536) != block size (4096) [ 153.688025][ T8555] FAULT_INJECTION: forcing a failure. [ 153.688025][ T8555] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 153.689014][ T8564] PM: suspend entry (deep) [ 153.701601][ T8555] CPU: 1 PID: 8555 Comm: syz-executor.4 Not tainted 5.13.0-rc7-syzkaller #0 [ 153.714667][ T8555] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 153.724786][ T8555] Call Trace: [ 153.728055][ T8555] dump_stack+0x137/0x19d [ 153.732383][ T8555] should_fail+0x23c/0x250 [ 153.736811][ T8555] should_fail_usercopy+0x16/0x20 [ 153.741823][ T8555] _copy_from_iter_full+0x148/0xa10 [ 153.747013][ T8555] ? kmem_cache_alloc+0x201/0x2f0 [ 153.752060][ T8555] ? __build_skb+0x2d/0x170 [ 153.756557][ T8555] ? check_stack_object+0x61/0x70 [ 153.761579][ T8555] ? __virt_addr_valid+0x79/0x1a0 [ 153.766638][ T8555] ? __check_object_size+0x253/0x310 [ 153.772029][ T8555] netlink_sendmsg+0x579/0x7c0 [ 153.776789][ T8555] __sys_sendto+0x2a8/0x370 [ 153.781283][ T8555] ? __fget_light+0x21b/0x260 [ 153.785967][ T8555] ? __cond_resched+0x11/0x40 [ 153.790634][ T8555] ? fput+0x2d/0x130 [ 153.794514][ T8555] __x64_sys_sendto+0x74/0x90 [ 153.799178][ T8555] do_syscall_64+0x4a/0x90 [ 153.803586][ T8555] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 153.809472][ T8555] RIP: 0033:0x4665d9 [ 153.813355][ T8555] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 153.832947][ T8555] RSP: 002b:00007fb5cc5e4188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 153.841549][ T8555] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 16:11:57 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xe0ffffff00000000}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) 16:11:57 executing program 4 (fault-call:5 fault-nth:23): sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 153.849521][ T8555] RDX: 0000000000010a86 RSI: 0000000020000000 RDI: 0000000000000003 [ 153.857497][ T8555] RBP: 00007fb5cc5e41d0 R08: 0000000000000000 R09: 4b6ae4f95a5de35b [ 153.865454][ T8555] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 153.873482][ T8555] R13: 00007fff9eec533f R14: 00007fb5cc5e4300 R15: 0000000000022000 [ 153.888410][ T8561] loop2: detected capacity change from 0 to 65608 16:11:57 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a5780200", 0x16, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 153.931069][ T8568] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.4'. [ 153.940542][ T8568] FAULT_INJECTION: forcing a failure. [ 153.940542][ T8568] name failslab, interval 1, probability 0, space 0, times 0 [ 153.953360][ T8568] CPU: 0 PID: 8568 Comm: syz-executor.4 Not tainted 5.13.0-rc7-syzkaller #0 [ 153.962069][ T8568] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 153.972115][ T8568] Call Trace: [ 153.975415][ T8568] dump_stack+0x137/0x19d [ 153.977866][ T8564] Filesystems sync: 0.271 seconds [ 153.979753][ T8568] should_fail+0x23c/0x250 [ 153.989184][ T8568] __should_failslab+0x81/0x90 [ 153.989240][ T8568] should_failslab+0x5/0x20 [ 153.989264][ T8568] kmem_cache_alloc_node_trace+0x58/0x2e0 [ 153.994184][ T8564] Freezing user space processes ... [ 153.998495][ T8568] ? __kmalloc_node_track_caller+0x30/0x40 [ 153.998520][ T8568] ? kmem_cache_alloc_node+0x1da/0x2b0 [ 154.020998][ T8568] __kmalloc_node_track_caller+0x30/0x40 [ 154.021031][ T8568] ? netlink_ack+0x292/0x690 [ 154.021075][ T8568] __alloc_skb+0x187/0x420 [ 154.021111][ T8568] netlink_ack+0x292/0x690 [ 154.021130][ T8568] netlink_rcv_skb+0x1b7/0x240 [ 154.021149][ T8568] ? rtnetlink_bind+0x60/0x60 [ 154.021171][ T8568] rtnetlink_rcv+0x18/0x20 [ 154.021191][ T8568] netlink_unicast+0x5ec/0x6b0 [ 154.021267][ T8568] netlink_sendmsg+0x6f8/0x7c0 [ 154.021288][ T8568] __sys_sendto+0x2a8/0x370 [ 154.021305][ T8568] ? __fget_light+0x21b/0x260 [ 154.021326][ T8568] ? __cond_resched+0x11/0x40 [ 154.021402][ T8568] ? fput+0x2d/0x130 [ 154.021419][ T8568] __x64_sys_sendto+0x74/0x90 [ 154.021498][ T8568] do_syscall_64+0x4a/0x90 [ 154.021519][ T8568] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 154.021543][ T8568] RIP: 0033:0x4665d9 [ 154.021557][ T8568] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 154.021573][ T8568] RSP: 002b:00007fb5cc5e4188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 154.021593][ T8568] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 154.021604][ T8568] RDX: 0000000000010a86 RSI: 0000000020000000 RDI: 0000000000000003 [ 154.021616][ T8568] RBP: 00007fb5cc5e41d0 R08: 0000000000000000 R09: 4b6ae4f95a5de35b [ 154.021628][ T8568] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 154.021639][ T8568] R13: 00007fff9eec533f R14: 00007fb5cc5e4300 R15: 0000000000022000 [ 154.022223][ T8561] EXT4-fs (loop2): fragment/cluster size (65536) != block size (4096) [ 154.177710][ T8564] (elapsed 0.173 seconds) done. [ 154.182638][ T8564] OOM killer disabled. [ 154.186691][ T8564] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 154.196040][ T8564] printk: Suspending console(s) (use no_console_suspend to debug) 16:11:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:58 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xfc00000000000000}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) [ 154.237733][ T6046] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 154.741448][ T8564] ACPI: Preparing to enter system sleep state S3 [ 154.741516][ T8564] PM: Saving platform NVS memory [ 154.741519][ T8564] Disabling non-boot CPUs ... [ 154.744705][ T8564] smpboot: CPU 1 is now offline [ 154.748029][ T8564] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 154.748099][ T8564] ACPI: Low-level resume complete [ 154.748168][ T8564] PM: Restoring platform NVS memory [ 154.748176][ T8564] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 154.758505][ T8564] Enabling non-boot CPUs ... [ 154.758636][ T8564] x86: Booting SMP configuration: [ 154.758640][ T8564] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 154.758820][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 154.759827][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 154.761254][ T8564] CPU1 is up [ 154.761503][ T8564] ACPI: Waking up from system sleep state S3 [ 154.868024][ T8564] OOM killer enabled. [ 154.868599][ T8564] Restarting tasks ... done. [ 154.888553][ T8564] PM: suspend exit [ 154.901288][ T8578] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 154.902762][ T8578] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. 16:11:58 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a5780200", 0x16, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:58 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x318, 0x2) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0x7, 0x3) 16:11:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:58 executing program 4 (fault-call:5 fault-nth:24): sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:58 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xfe80ffff00000000}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) [ 154.933571][ T8581] loop3: detected capacity change from 0 to 65608 [ 154.940172][ T8581] EXT4-fs (loop3): fragment/cluster size (65536) != block size (4096) [ 154.968275][ T8585] loop2: detected capacity change from 0 to 65608 [ 154.971077][ T8585] EXT4-fs (loop2): fragment/cluster size (65536) != block size (4096) [ 154.976867][ T8594] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 154.978594][ T8594] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. 16:11:58 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:11:58 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xfec0ffff00000000}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) 16:11:58 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 155.023163][ T8600] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.4'. [ 155.024876][ T8600] FAULT_INJECTION: forcing a failure. [ 155.024876][ T8600] name failslab, interval 1, probability 0, space 0, times 0 [ 155.027404][ T8600] CPU: 1 PID: 8600 Comm: syz-executor.4 Not tainted 5.13.0-rc7-syzkaller #0 [ 155.027721][ T8609] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 155.028905][ T8600] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 155.028920][ T8600] Call Trace: [ 155.032413][ T8600] dump_stack+0x137/0x19d [ 155.033336][ T8600] should_fail+0x23c/0x250 [ 155.034707][ T8600] __should_failslab+0x81/0x90 [ 155.035469][ T8600] should_failslab+0x5/0x20 [ 155.036427][ T8600] kmem_cache_alloc_node_trace+0x58/0x2e0 [ 155.037594][ T8600] ? __kmalloc_node_track_caller+0x30/0x40 [ 155.038723][ T8600] ? kmem_cache_alloc_node+0x1da/0x2b0 [ 155.039802][ T8600] __kmalloc_node_track_caller+0x30/0x40 [ 155.040953][ T8600] ? netlink_ack+0x292/0x690 [ 155.042094][ T8600] __alloc_skb+0x187/0x420 [ 155.043009][ T8600] netlink_ack+0x292/0x690 [ 155.043910][ T8600] netlink_rcv_skb+0x1b7/0x240 [ 155.044876][ T8600] ? rtnetlink_bind+0x60/0x60 [ 155.045749][ T8600] rtnetlink_rcv+0x18/0x20 [ 155.046531][ T8600] netlink_unicast+0x5ec/0x6b0 [ 155.047247][ T8600] netlink_sendmsg+0x6f8/0x7c0 [ 155.048291][ T8600] __sys_sendto+0x2a8/0x370 [ 155.048989][ T8600] ? __fget_light+0x21b/0x260 [ 155.049708][ T8600] ? __cond_resched+0x11/0x40 [ 155.050826][ T8600] ? fput+0x2d/0x130 [ 155.051449][ T8600] __x64_sys_sendto+0x74/0x90 [ 155.052206][ T8600] do_syscall_64+0x4a/0x90 [ 155.053103][ T8600] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 155.054007][ T8600] RIP: 0033:0x4665d9 [ 155.054668][ T8600] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 155.057921][ T8600] RSP: 002b:00007fb5cc5e4188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 155.059364][ T8600] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 155.060804][ T8600] RDX: 0000000000010a86 RSI: 0000000020000000 RDI: 0000000000000003 [ 155.062424][ T8600] RBP: 00007fb5cc5e41d0 R08: 0000000000000000 R09: 4b6ae4f95a5de35b [ 155.063661][ T8600] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 155.064880][ T8600] R13: 00007fff9eec533f R14: 00007fb5cc5e4300 R15: 0000000000022000 16:11:58 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:58 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xff00000000000000}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) [ 155.086082][ T8616] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 155.088694][ T8612] loop3: detected capacity change from 0 to 65608 [ 155.097752][ T8612] EXT4-fs (loop3): fragment/cluster size (65536) != block size (4096) [ 155.100831][ T8614] loop2: detected capacity change from 0 to 65608 [ 155.107039][ T8614] EXT4-fs (loop2): fragment/cluster size (65536) != block size (4096) [ 155.120188][ T8626] PM: suspend entry (deep) [ 155.129588][ T8628] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 155.146685][ T8626] Filesystems sync: 0.025 seconds [ 155.147679][ T8626] Freezing user space processes ... (elapsed 0.012 seconds) done. [ 155.162372][ T8626] OOM killer disabled. [ 155.162979][ T8626] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 155.165484][ T8626] printk: Suspending console(s) (use no_console_suspend to debug) [ 155.520835][ T7292] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 156.027334][ T8626] ACPI: Preparing to enter system sleep state S3 [ 156.027402][ T8626] PM: Saving platform NVS memory [ 156.027406][ T8626] Disabling non-boot CPUs ... [ 156.030877][ T8626] smpboot: CPU 1 is now offline [ 156.034122][ T8626] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 156.034181][ T8626] ACPI: Low-level resume complete [ 156.034286][ T8626] PM: Restoring platform NVS memory [ 156.034294][ T8626] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 156.044632][ T8626] Enabling non-boot CPUs ... [ 156.044874][ T8626] x86: Booting SMP configuration: [ 156.044878][ T8626] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 156.045055][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 156.046041][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 156.047322][ T8626] CPU1 is up [ 156.047522][ T8626] ACPI: Waking up from system sleep state S3 [ 156.050197][ T8626] ================================================================== [ 156.050224][ T8626] BUG: KCSAN: data-race in device_resume / dpm_wait_for_superior [ 156.050250][ T8626] [ 156.050253][ T8626] write to 0xffff88810106e19c of 2 bytes by task 5713 on cpu 0: [ 156.050262][ T8626] device_resume+0x116/0x940 [ 156.050275][ T8626] async_resume+0x2b/0x130 [ 156.050288][ T8626] async_run_entry_fn+0x4a/0x170 [ 156.051971][ T8626] process_one_work+0x3e9/0x8f0 [ 156.051998][ T8626] worker_thread+0x636/0xae0 [ 156.052011][ T8626] kthread+0x1d0/0x1f0 [ 156.052022][ T8626] ret_from_fork+0x1f/0x30 [ 156.053290][ T8626] [ 156.053297][ T8626] read to 0xffff88810106e19c of 2 bytes by task 8626 on cpu 1: [ 156.053313][ T8626] dpm_wait_for_superior+0xc8/0x270 [ 156.053336][ T8626] device_resume+0xe6/0x940 [ 156.054306][ T8626] dpm_resume+0x277/0x830 [ 156.054326][ T8626] dpm_resume_end+0xf/0x20 [ 156.054351][ T8626] suspend_devices_and_enter+0x24b/0x500 [ 156.054373][ T8626] enter_state+0x274/0x530 [ 156.054383][ T8626] pm_suspend+0x4b/0x130 [ 156.055423][ T8626] state_store+0x1f2/0x210 [ 156.055442][ T8626] kobj_attr_store+0x40/0x60 [ 156.055465][ T8626] sysfs_kf_write+0xa6/0xc0 [ 156.055489][ T8626] kernfs_fop_write_iter+0x1d3/0x2d0 [ 156.055507][ T8626] do_iter_readv_writev+0x2cb/0x360 [ 156.055519][ T8626] do_iter_write+0x112/0x4c0 [ 156.055528][ T8626] vfs_iter_write+0x4c/0x70 [ 156.056554][ T8626] iter_file_splice_write+0x40a/0x750 [ 156.056581][ T8626] direct_splice_actor+0x80/0xa0 [ 156.056599][ T8626] splice_direct_to_actor+0x345/0x650 [ 156.056619][ T8626] do_splice_direct+0xf5/0x170 [ 156.056635][ T8626] do_sendfile+0x773/0xda0 [ 156.056651][ T8626] __x64_sys_sendfile64+0xa9/0x130 [ 156.056668][ T8626] do_syscall_64+0x4a/0x90 [ 156.056692][ T8626] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 156.056717][ T8626] [ 156.056720][ T8626] value changed: 0x011e -> 0x0106 [ 156.056730][ T8626] [ 156.056733][ T8626] Reported by Kernel Concurrency Sanitizer on: [ 156.056739][ T8626] CPU: 1 PID: 8626 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 156.056757][ T8626] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 156.056767][ T8626] ================================================================== [ 156.178210][ T8626] OOM killer enabled. 16:11:59 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:11:59 executing program 4 (fault-call:5 fault-nth:25): sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 156.178752][ T8626] Restarting tasks ... done. [ 156.194997][ T8626] PM: suspend exit [ 156.209143][ T8639] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 156.214048][ T8626] PM: suspend entry (deep) [ 156.219544][ T8626] Filesystems sync: 0.004 seconds [ 156.220611][ T8626] Freezing user space processes ... (elapsed 0.007 seconds) done. [ 156.229566][ T8626] OOM killer disabled. [ 156.230302][ T8626] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 156.232877][ T8626] printk: Suspending console(s) (use no_console_suspend to debug) [ 156.333883][ T7292] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 156.851298][ T8626] ACPI: Preparing to enter system sleep state S3 [ 156.851398][ T8626] PM: Saving platform NVS memory [ 156.851402][ T8626] Disabling non-boot CPUs ... [ 156.853810][ T8626] smpboot: CPU 1 is now offline [ 156.856899][ T8626] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 156.856957][ T8626] ACPI: Low-level resume complete [ 156.857052][ T8626] PM: Restoring platform NVS memory [ 156.857061][ T8626] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 156.867997][ T8626] Enabling non-boot CPUs ... [ 156.868141][ T8626] x86: Booting SMP configuration: [ 156.868145][ T8626] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 156.868419][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 156.869430][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 156.870766][ T8626] CPU1 is up [ 156.870887][ T8626] ACPI: Waking up from system sleep state S3 [ 157.756709][ T8626] OOM killer enabled. [ 157.757252][ T8626] Restarting tasks ... [ 157.769417][ T1037] synth uevent: /devices/virtual/block/loop4: failed to send uevent [ 157.772554][ T1037] block loop4: uevent: failed to send synthetic uevent [ 157.773882][ T8626] done. [ 157.774378][ T8626] PM: suspend exit [ 157.787695][ T8642] FAULT_INJECTION: forcing a failure. [ 157.787695][ T8642] name fail_usercopy, interval 1, probability 0, space 0, times 0 16:12:01 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x318, 0x4) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0x7, 0x3) 16:12:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:12:01 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xffffffff00000000}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) 16:12:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:12:01 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 157.790512][ T8642] CPU: 0 PID: 8642 Comm: syz-executor.4 Not tainted 5.13.0-rc7-syzkaller #0 [ 157.792234][ T8642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 157.793796][ T8642] Call Trace: [ 157.794279][ T8642] dump_stack+0x137/0x19d [ 157.794973][ T8642] should_fail+0x23c/0x250 [ 157.795682][ T8642] should_fail_usercopy+0x16/0x20 [ 157.796438][ T8642] _copy_from_user+0x1c/0xd0 [ 157.797329][ T8642] kstrtouint_from_user+0x6f/0x130 [ 157.798066][ T8642] ? _copy_to_user+0x77/0x90 [ 157.798772][ T8642] ? fsnotify_perm+0x59/0x2e0 [ 157.799465][ T8642] proc_fail_nth_write+0x38/0x140 [ 157.800213][ T8642] ? proc_fail_nth_read+0x140/0x140 [ 157.801044][ T8642] vfs_write+0x1f3/0x770 [ 157.801779][ T8642] ? __fget_light+0x21b/0x260 [ 157.802873][ T8642] ? __cond_resched+0x11/0x40 [ 157.803699][ T8642] ksys_write+0xce/0x180 [ 157.804592][ T8642] __x64_sys_write+0x3e/0x50 [ 157.805413][ T8642] do_syscall_64+0x4a/0x90 [ 157.806180][ T8642] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 157.807101][ T8642] RIP: 0033:0x4192bf [ 157.807691][ T8642] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 157.810798][ T8642] RSP: 002b:00007fb5cc5e4170 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 157.812363][ T8642] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004192bf [ 157.813510][ T8642] RDX: 0000000000000001 RSI: 00007fb5cc5e41e0 RDI: 0000000000000004 [ 157.814678][ T8642] RBP: 00007fb5cc5e41d0 R08: 0000000000000000 R09: 4b6ae4f95a5de35b [ 157.815854][ T8642] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 157.817058][ T8642] R13: 00007fff9eec533f R14: 00007fb5cc5e4300 R15: 0000000000022000 [ 157.840358][ T8647] loop2: detected capacity change from 0 to 65608 16:12:01 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) 16:12:01 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 157.852427][ T8647] EXT4-fs (loop2): fragment/cluster size (65536) != block size (4096) [ 157.868280][ T8653] loop3: detected capacity change from 0 to 65608 16:12:01 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:12:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 157.893419][ T8653] EXT4-fs (loop3): fragment/cluster size (65536) != block size (4096) [ 157.894511][ T8658] PM: suspend entry (deep) [ 157.919058][ T8658] Filesystems sync: 0.023 seconds [ 157.920272][ T8658] Freezing user space processes ... (elapsed 0.015 seconds) done. [ 157.936862][ T8658] OOM killer disabled. [ 157.937477][ T8658] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 157.940126][ T8658] printk: Suspending console(s) (use no_console_suspend to debug) [ 158.059430][ T5713] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 158.559882][ T8658] ACPI: Preparing to enter system sleep state S3 [ 158.559941][ T8658] PM: Saving platform NVS memory [ 158.559996][ T8658] Disabling non-boot CPUs ... [ 158.563350][ T8658] smpboot: CPU 1 is now offline [ 158.566698][ T8658] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 158.566769][ T8658] ACPI: Low-level resume complete [ 158.566874][ T8658] PM: Restoring platform NVS memory [ 158.566884][ T8658] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 158.579318][ T8658] Enabling non-boot CPUs ... [ 158.579477][ T8658] x86: Booting SMP configuration: [ 158.579481][ T8658] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 158.579676][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 158.580797][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 158.582213][ T8658] CPU1 is up [ 158.582433][ T8658] ACPI: Waking up from system sleep state S3 [ 158.840966][ T8658] OOM killer enabled. [ 158.843062][ T8658] Restarting tasks ... [ 158.848691][ T8670] __nla_validate_parse: 2 callbacks suppressed [ 158.848705][ T8670] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 158.862133][ T8667] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.4'. [ 158.868205][ T1037] synth uevent: /devices/virtual/block/loop3: failed to send uevent [ 158.870067][ T1037] block loop3: uevent: failed to send synthetic uevent [ 158.871072][ T8658] done. [ 158.871640][ T8658] PM: suspend exit [ 158.878202][ T8671] loop2: detected capacity change from 0 to 65608 [ 158.881113][ T8658] PM: suspend entry (deep) [ 158.888236][ T8658] Filesystems sync: 0.006 seconds [ 158.889963][ T8658] Freezing user space processes ... (elapsed 0.014 seconds) done. [ 158.906146][ T8658] OOM killer disabled. [ 158.906721][ T8658] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 158.910064][ T8658] printk: Suspending console(s) (use no_console_suspend to debug) 16:12:03 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:12:03 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='\t', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:12:03 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="130000", 0x3, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 159.074606][ T5713] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 159.596391][ T8658] ACPI: Preparing to enter system sleep state S3 [ 159.596473][ T8658] PM: Saving platform NVS memory [ 159.596479][ T8658] Disabling non-boot CPUs ... [ 159.598868][ T8658] smpboot: CPU 1 is now offline [ 159.602458][ T8658] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 159.602520][ T8658] ACPI: Low-level resume complete [ 159.602626][ T8658] PM: Restoring platform NVS memory [ 159.602635][ T8658] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 159.616317][ T8658] Enabling non-boot CPUs ... [ 159.616559][ T8658] x86: Booting SMP configuration: [ 159.616563][ T8658] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 159.616755][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 159.617793][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 159.619300][ T8658] CPU1 is up [ 159.619499][ T8658] ACPI: Waking up from system sleep state S3 [ 160.498451][ T8658] OOM killer enabled. [ 160.499149][ T8658] Restarting tasks ... [ 160.510985][ T1037] synth uevent: /devices/virtual/block/loop3: failed to send uevent [ 160.513665][ T1037] block loop3: uevent: failed to send synthetic uevent [ 160.517175][ T8671] EXT4-fs (loop2): fragment/cluster size (65536) != block size (4096) 16:12:03 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x318, 0x8) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0x7, 0x3) 16:12:03 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)="10", 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:12:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:12:03 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="130000", 0x3, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:12:03 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 160.537968][ T8658] done. [ 160.538683][ T8658] PM: suspend exit [ 160.552329][ T8680] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 160.557068][ T8683] loop3: detected capacity change from 0 to 65608 [ 160.566760][ T8683] EXT4-fs (loop3): fragment/cluster size (65536) != block size (4096) 16:12:03 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfc}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) 16:12:03 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)="86", 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:12:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 160.620959][ T8697] loop2: detected capacity change from 0 to 65608 [ 160.625055][ T8697] EXT4-fs (loop2): fragment/cluster size (65536) != block size (4096) [ 160.639469][ T8705] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 160.655560][ T8703] loop3: detected capacity change from 0 to 65608 [ 160.659657][ T8703] EXT4-fs (loop3): fragment/cluster size (65536) != block size (4096) [ 160.665765][ T8714] netlink: 90 bytes leftover after parsing attributes in process `syz-executor.4'. 16:12:03 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0xf, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:12:03 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="130000", 0x3, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 160.672447][ T8713] PM: suspend entry (deep) [ 160.699502][ T8713] Filesystems sync: 0.025 seconds [ 160.701058][ T8713] Freezing user space processes ... (elapsed 0.007 seconds) done. [ 160.710141][ T8713] OOM killer disabled. [ 160.710760][ T8713] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 160.713055][ T8713] printk: Suspending console(s) (use no_console_suspend to debug) 16:12:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 161.152201][ T1768] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 161.668910][ T8713] ACPI: Preparing to enter system sleep state S3 [ 161.668977][ T8713] PM: Saving platform NVS memory [ 161.669032][ T8713] Disabling non-boot CPUs ... [ 161.672437][ T8713] smpboot: CPU 1 is now offline [ 161.675985][ T8713] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 161.676044][ T8713] ACPI: Low-level resume complete [ 161.676138][ T8713] PM: Restoring platform NVS memory [ 161.676148][ T8713] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 161.688355][ T8713] Enabling non-boot CPUs ... [ 161.688578][ T8713] x86: Booting SMP configuration: [ 161.688582][ T8713] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 161.688781][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 161.689783][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 161.691255][ T8713] CPU1 is up [ 161.691580][ T8713] ACPI: Waking up from system sleep state S3 [ 161.796250][ T8713] OOM killer enabled. [ 161.796875][ T8713] Restarting tasks ... [ 161.797700][ T1037] synth uevent: /devices/virtual/block/loop2: failed to send uevent [ 161.799914][ T1037] block loop2: uevent: failed to send synthetic uevent [ 161.819436][ T8713] done. [ 161.820065][ T8713] PM: suspend exit [ 161.820445][ T8726] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 161.826973][ T8725] loop2: detected capacity change from 0 to 65608 [ 161.829219][ T8713] PM: suspend entry (deep) [ 161.834151][ T8725] EXT4-fs (loop2): fragment/cluster size (65536) != block size (4096) [ 161.841174][ T8729] loop3: detected capacity change from 0 to 65608 [ 161.845693][ T8729] EXT4-fs (loop3): fragment/cluster size (65536) != block size (4096) [ 161.853951][ T8713] Filesystems sync: 0.023 seconds [ 161.855026][ T8713] Freezing user space processes ... (elapsed 0.020 seconds) done. [ 161.878396][ T8713] OOM killer disabled. [ 161.879168][ T8713] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 161.882310][ T8713] printk: Suspending console(s) (use no_console_suspend to debug) 16:12:05 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x318, 0x10) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0x7, 0x3) 16:12:05 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfc00}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) 16:12:05 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:12:05 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="13000000", 0x4, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 161.987578][ T22] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 162.496457][ T8713] ACPI: Preparing to enter system sleep state S3 [ 162.496526][ T8713] PM: Saving platform NVS memory [ 162.496529][ T8713] Disabling non-boot CPUs ... [ 162.499001][ T8713] smpboot: CPU 1 is now offline [ 162.502423][ T8713] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 162.502481][ T8713] ACPI: Low-level resume complete [ 162.502575][ T8713] PM: Restoring platform NVS memory [ 162.502584][ T8713] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 162.514499][ T8713] Enabling non-boot CPUs ... [ 162.514714][ T8713] x86: Booting SMP configuration: [ 162.514718][ T8713] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 162.514899][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 162.515970][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 162.517602][ T8713] CPU1 is up [ 162.517798][ T8713] ACPI: Waking up from system sleep state S3 [ 162.731562][ T8713] OOM killer enabled. [ 162.732238][ T8713] Restarting tasks ... done. [ 162.737707][ T8713] PM: suspend exit 16:12:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:12:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:12:06 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="13000000", 0x4, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:12:06 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x45, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:12:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:12:06 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x48, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 162.787626][ T8748] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 162.791747][ T8747] loop2: detected capacity change from 0 to 65608 [ 162.795194][ T8747] EXT4-fs (loop2): fragment/cluster size (65536) != block size (4096) [ 162.807368][ T8753] loop3: detected capacity change from 0 to 65608 [ 162.811643][ T8753] EXT4-fs (loop3): fragment/cluster size (65536) != block size (4096) [ 162.824835][ T8761] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 162.833608][ T8763] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.4'. 16:12:06 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="13000000", 0x4, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:12:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 162.865248][ T8768] PM: suspend entry (deep) [ 162.886222][ T8768] Filesystems sync: 0.019 seconds [ 162.888536][ T8772] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.4'. [ 162.890613][ T8768] Freezing user space processes ... (elapsed 0.001 seconds) done. [ 162.894457][ T8768] OOM killer disabled. [ 162.895473][ T8768] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 162.898167][ T8768] printk: Suspending console(s) (use no_console_suspend to debug) [ 162.972547][ T5713] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 163.482122][ T1039] psmouse serio1: Failed to reset mouse on isa0060/serio1: -5 [ 163.500974][ T8768] ACPI: Preparing to enter system sleep state S3 [ 163.501156][ T8768] PM: Saving platform NVS memory [ 163.501160][ T8768] Disabling non-boot CPUs ... [ 163.504270][ T8768] smpboot: CPU 1 is now offline [ 163.507668][ T8768] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 163.507730][ T8768] ACPI: Low-level resume complete [ 163.507823][ T8768] PM: Restoring platform NVS memory [ 163.507832][ T8768] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 163.524697][ T8768] Enabling non-boot CPUs ... [ 163.524862][ T8768] x86: Booting SMP configuration: [ 163.524866][ T8768] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 163.525080][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 163.526055][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 163.527669][ T8768] CPU1 is up [ 163.527867][ T8768] ACPI: Waking up from system sleep state S3 [ 163.954472][ T8768] OOM killer enabled. [ 163.955186][ T8768] Restarting tasks ... [ 163.961591][ T1037] synth uevent: /devices/virtual/block/loop3: failed to send uevent [ 163.963927][ T1037] block loop3: uevent: failed to send synthetic uevent [ 163.971326][ T8768] done. [ 163.972451][ T8768] PM: suspend exit [ 163.973941][ T8773] loop2: detected capacity change from 0 to 65608 [ 163.976461][ T8773] EXT4-fs (loop2): fragment/cluster size (65536) != block size (4096) [ 163.982296][ T8780] loop3: detected capacity change from 0 to 65608 16:12:07 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x318, 0x11) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0x7, 0x3) 16:12:07 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xff00}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) 16:12:07 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0xec0, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:12:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:12:07 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 163.995142][ T8779] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 164.002171][ T8780] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 16:12:07 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:12:07 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10ac0, 0x0, 0x0, 0x4b6ae4f95a5de35b) [ 164.072235][ T8799] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.4'. [ 164.076304][ T8795] loop2: detected capacity change from 0 to 65608 [ 164.082278][ T8800] PM: suspend entry (deep) [ 164.088757][ T8795] EXT4-fs (loop2): fragment/cluster size (65536) != block size (4096) [ 164.089155][ T8801] loop3: detected capacity change from 0 to 65608 [ 164.100111][ T8801] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 164.107982][ T8800] Filesystems sync: 0.024 seconds [ 164.109452][ T8800] Freezing user space processes ... (elapsed 0.030 seconds) done. [ 164.141688][ T8800] OOM killer disabled. [ 164.142628][ T8800] Freezing remaining freezable tasks ... (elapsed 0.000 seconds) done. [ 164.145250][ T8800] printk: Suspending console(s) (use no_console_suspend to debug) 16:12:08 executing program 5: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e00000011000a"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b"], 0x1}}, 0x0) socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)='E', 0x10a86, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:12:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) 16:12:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 164.203682][ T7292] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 164.724187][ T8800] ACPI: Preparing to enter system sleep state S3 [ 164.724387][ T8800] PM: Saving platform NVS memory [ 164.724395][ T8800] Disabling non-boot CPUs ... [ 164.727655][ T8800] smpboot: CPU 1 is now offline [ 164.731147][ T8800] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 164.731202][ T8800] ACPI: Low-level resume complete [ 164.731339][ T8800] PM: Restoring platform NVS memory [ 164.731348][ T8800] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 164.742550][ T8800] Enabling non-boot CPUs ... [ 164.742788][ T8800] x86: Booting SMP configuration: [ 164.742792][ T8800] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 164.742985][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 164.744123][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 164.745411][ T8800] CPU1 is up [ 164.745630][ T8800] ACPI: Waking up from system sleep state S3 [ 165.615502][ T8800] OOM killer enabled. [ 165.616136][ T8800] Restarting tasks ... done. [ 165.633077][ T8800] PM: suspend exit [ 165.634439][ T8812] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.4'. 16:12:08 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000000a00000000000000000000000000000e"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000090600000001400000000000000000000500010007000000100007770c002b80080003"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9559b0d1b849ac00200a578020000", 0x17, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1300000013", 0x5, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x33fe0, 0x0, 0x0, 0x4b6ae4f95a5de35b) 16:12:08 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) 16:12:08 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x318, 0xc0) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0x7, 0x3) 16:12:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02", 0x1, 0x1002}, {0x0, 0x0, 0x1004800}], 0x0, 0x0) [ 165.680768][ T8826] loop2: detected capacity change from 0 to 65608 [ 165.683009][ T8825] loop3: detected capacity change from 0 to 65608 [ 165.687561][ T8826] EXT4-fs (loop2): fragment/cluster size (65536) != block size (4096) [ 165.690140][ T8825] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 165.740835][ T8839] PM: suspend entry (deep) [ 165.747371][ T8835] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.4'. [ 165.754785][ T8839] Filesystems sync: 0.013 seconds [ 165.755875][ T8839] Freezing user space processes ... (elapsed 0.012 seconds) done. [ 165.770198][ T8839] OOM killer disabled. [ 165.770835][ T8839] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 165.773624][ T8839] printk: Suspending console(s) (use no_console_suspend to debug)