t(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x401, 0x8, &(0x7f00000008c0)=[{0x0}, {0x0, 0x0, 0x9}, {&(0x7f0000000180)="5030a6b9906c95e36ee1b07f9e5698893307dd91cd0319578b614ed5f1873eb0", 0x20, 0xfffffffffffffffd}, {&(0x7f0000000340)="2df6157d4494279dde2031db3b2744b435271e65a343796db3da0bb347a3215e9b71", 0x22, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f5bf3f90b3d3e7d7132c3012ab7043e22a6f8edc5e516ee833a4fdcf825d9da3fed17cac003d9dd022d", 0xa4, 0x7fffffff}, {&(0x7f0000000500)="822171b91eb1498a4740794c5db7bc7a965f6bf8c7cf5baee0946ad2aa4b016a8a03bb30b092e47cd74a4fab60e1d1443c33c80fa2ef7af6514920209443a39077bb6a856f3c3e40bb7182a08692593ab13f04b516500ed3b3256325f48aafef3d8ca84cdce2b0609ed9c6346c356964614f21f9699436b6ca419197a0729a46ae7ae36fd203e577f2b03891ce7ba975aa5d47214e98c73647d20e757d1ce2d1990688090eee936562a1b4968deb59f6a2980feca28742afcaf376ab51294f57d6334c86538795c11e018be19db248ea75e1", 0xd2, 0x10000}, {&(0x7f0000000600)="4a6006458a4a1e3060e4cca0086f3b44f908e6941741cf7422f159df72a1cdb68c01ef3f102d2afb1e3e446c41bef79e359d62ed3155330d3b2f5207705e6dfa86f4f655d80ee44134bb9211fed0be8f7f86ff1f4b5abab22df6a1bfed2d66e51791fcbbf6f6926ce384fda7a7e86c17dcc2b2473f22c6d095ade56596ee656b3c596a038658b30895170a9ab2d4379f4f58cc6e", 0x94, 0x9}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f0000000ac0)={[{@dots}, {@fat=@sys_immutable}, {@nodots}, {@fat=@umask}], [{@measure}, {@appraise}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@seclabel}]}) openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f80)={0x1, &(0x7f0000000f40)=[{0x7f}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r8, &(0x7f0000000240)={&(0x7f0000000fc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000003940)=ANY=[@ANYBLOB="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", @ANYRES64=r7, @ANYRESHEX, @ANYRES32=r6, @ANYRESOCT=r3, @ANYRESOCT=r4, @ANYBLOB="16de71cf0766d82ab6b67f0cd79e8e3ee2643e2e5026c3ea1ccfde1fe0912c50f4450c9c7749b181ae244aa09bb447092b0b62871d5ab9b62bc1121905ff995d268176192bba6bbfe4ff322f3370ce1ac7b5dd004238de507070dc0002cfe8ca03a81158f62018fe98245631fc021061fec067e33a1c01f786dafad477a72fcf767c43d28917995da3bd4df41908d180cd9517f24d97f14674a9a15bb602dca6587204d6571e02a456eb415ea3208e6afe4ed4f3533d7cf074ed4bd702d74e242405fadcd0c73dbb590bb430b54691990800f66109473f3531c01f00"/234], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x40025) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r10, r9, 0x0, 0x100000002) 10:18:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000000fe00000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce0604000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00000f0f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:26 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x401, 0x8, &(0x7f00000008c0)=[{0x0}, {&(0x7f0000000980)="0742ddaa7cc41049626ab91bcec9573df69620c41245351201c534e6d1a0816b861a9c1dd2b2220dae14ee5de8a1d49d7692a5d0e70fa98f114ba55f8c832dc2e3d7aab7d6e14d3ed912a83baf74eb78e96ef1c3d8b04b9d478666c7cd3323bef12fb028a46198ba9d8a803c8f1d6462", 0x70, 0x9}, {&(0x7f0000000180)="5030a6b9906c95e36ee1b07f9e5698893307dd91cd0319578b614ed5f1873eb0", 0x20, 0xfffffffffffffffd}, {&(0x7f0000000340)="2df6157d4494279dde2031db3b2744b435271e65a343796db3da0bb347a3215e9b71", 0x22, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f5bf3f90b3d3e7d7132c3012ab7043e22a6f8edc5e516ee833a4fdcf825d9da3fed17cac003d9dd022d", 0xa4, 0x7fffffff}, {&(0x7f0000000500)="822171b91eb1498a4740794c5db7bc7a965f6bf8c7cf5baee0946ad2aa4b016a8a03bb30b092e47cd74a4fab60e1d1443c33c80fa2ef7af6514920209443a39077bb6a856f3c3e40bb7182a08692593ab13f04b516500ed3b3256325f48aafef3d8ca84cdce2b0609ed9c6346c356964614f21f9699436b6ca419197a0729a46ae7ae36fd203e577f2b03891ce7ba975aa5d47214e98c73647d20e757d1ce2d1990688090eee936562a1b4968deb59f6a2980feca28742afcaf376ab51294f57d6334c86538795c11e018be19db248ea75e1", 0xd2, 0x10000}, {&(0x7f0000000600)="4a6006458a4a1e3060e4cca0086f3b44f908e6941741cf7422f159df72a1cdb68c01ef3f102d2afb1e3e446c41bef79e359d62ed3155330d3b2f5207705e6dfa86f4f655d80ee44134bb9211fed0be8f7f86ff1f4b5abab22df6a1bfed2d66e51791fcbbf6f6926ce384fda7a7e86c", 0x6f, 0x9}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f0000000ac0)={[{@dots}, {@fat=@sys_immutable}, {@nodots}, {@fat=@umask}], [{@measure}, {@appraise}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@seclabel}]}) openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {}, {0x0}], 0x1, "2156816c73038c"}) r186 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f80)={0x1, &(0x7f0000000f40)=[{0x7f}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r186, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r189, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r189, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000240)={"2ee3ce170ba0dd2e3894d01225876c1c", r188, 0x0, {0x0, 0x9}, {0x3, 0x4}, 0x400, [0xa, 0x400, 0x4, 0x3, 0xe53, 0xdb2, 0x5, 0x8, 0x0, 0x8, 0x1, 0x2, 0x8, 0x6, 0x6, 0x3]}) r190 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r191 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r3, 0xd000943d, &(0x7f000004c240)={0x6050bac7, [{0x0, r33}, {0x0, r92}, {r90, r87}, {}, {r129, r174}, {}, {r78}, {r185, r179}, {0x0, r5}, {0x0, r13}, {r172, r72}, {}, {0x0, r71}, {r170, r89}, {0x0, r113}, {}, {0x0, r32}, {0x0, r173}, {0x0, r177}, {}, {}, {}, {0x0, r95}, {r55}, {}, {}, {0x0, r51}, {r22, r41}, {}, {r165, r42}, {r157}, {0x0, r163}, {}, {0x0, r11}, {r131}, {r114}, {0x0, r130}, {r31, r84}, {}, {r4}, {r180}, {}, {0x0, r6}, {}, {r151}, {0x0, r63}, {r102, r115}, {0x0, r113}, {0x0, r142}, {r99, r9}, {0x0, r150}, {r34, r61}, {}, {}, {0x0, r67}, {}, {0x0, r98}, {r85}, {}, {0x0, r108}, {r123}, {r7}, {0x0, r176}, {r16}, {0x0, r128}, {0x0, r181}, {0x0, r26}, {r124, r38}, {0x0, r148}, {r74, r106}, {0x0, r137}, {}, {r135}, {r65}, {0x0, r171}, {0x0, r81}, {r53}, {}, {}, {}, {0x0, r125}, {}, {r155}, {0x0, r45}, {r15, r152}, {}, {}, {0x0, r77}, {}, {}, {}, {r140}, {r52}, {r100, r175}, {r178}, {r25}, {r121}, {}, {}, {r138}, {r96}, {}, {r76, r152}, {}, {}, {}, {r82}, {r50, r174}, {r27, r30}, {}, {r56, r17}, {0x0, r43}, {}, {}, {r75}, {r119}, {0x0, r133}, {0x0, r110}, {0x0, r152}, {0x0, r105}, {}, {0x0, r95}, {r62, r110}, {}, {r112, r84}, {r12, r19}, {r82}, {r35, r59}, {r183, r83}, {0x0, r109}, {r21}, {0x0, r66}, {}, {0x0, r146}, {0x0, r175}, {}, {0x0, r84}, {}, {r158, r139}, {}, {r24}, {0x0, r104}, {r44}, {}, {0x0, r125}, {r164}, {r100, r161}, {}, {r184}, {0x0, r152}, {}, {}, {r162, r58}, {}, {r154}, {r28, r136}, {0x0, r122}, {r141, r36}, {r94, r153}, {}, {r182}, {r8, r166}, {r73}, {}, {r48, r72}, {r18, r69}, {}, {r29, r169}, {r116, r77}, {r168}, {0x0, r97}, {0x0, r145}, {}, {0x0, r58}, {}, {r149}, {r160, r80}, {r117, r134}, {0x0, r23}, {r39, r137}, {}, {0x0, r106}, {}, {}, {}, {}, {}, {r54, r63}, {r56, r93}, {0x0, r79}, {0x0, r46}, {}, {0x0, r87}, {}, {0x0, r187}, {0x0, r84}, {r68, r103}, {r70}, {}, {r20}, {}, {0x0, r127}, {r147}, {0x0, r37}, {r126}, {0x0, r33}, {}, {r14, r80}, {0x0, r40}, {r10, r40}, {r64, r156}, {}, {r107, r47}, {}, {}, {}, {}, {r86}, {0x0, r38}, {r151}, {r90}, {}, {r159, r171}, {}, {r111}, {r101}, {}, {}, {}, {r50}, {0x0, r144}, {r167}, {}, {r27}, {}, {r132, r120}, {r94}, {r162}, {r20}, {0x0, r47}, {}, {r140}, {r49}, {0x0, r57}, {r18, r30}, {}, {r60}, {}, {r75, r148}, {r118, r91}, {}, {r88}, {}, {r68, r143}, {0x0, r9}], 0x6, "bfc08462b2ff67"}) sendfile(r191, r190, 0x0, 0x100000002) 10:18:26 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {}, {r5}, {}, {r5}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {r4}, {}, {0x0, r6}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {0x0, r6}, {}, {r2}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {}, {r5}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {}, {}, {r4}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {}, {r1}, {0x0, r6}, {r4}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {r5}, {}, {}, {r5}, {r5}, {}, {}, {}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {}, {r5, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5, r6}, {r5}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4, r6}], 0x1, "2156816c73038c"}) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) 10:18:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce1004000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000402000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1063.908754][T29647] loop4: detected capacity change from 0 to 512 [ 1063.923743][T29647] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1063.925877][T29648] loop5: detected capacity change from 0 to 512 10:18:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000003000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1063.968980][T29648] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1063.979186][T29648] EXT4-fs (loop5): group descriptors corrupted! [ 1064.023282][T29648] loop5: detected capacity change from 0 to 512 [ 1064.034381][T29648] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1064.044482][T29648] EXT4-fs (loop5): group descriptors corrupted! [ 1064.063582][T29676] loop4: detected capacity change from 0 to 512 [ 1064.071094][ C0] scsi_io_completion_action: 2 callbacks suppressed [ 1064.071138][ C0] sd 0:0:1:0: tag#4936 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1064.087952][ C0] sd 0:0:1:0: tag#4936 CDB: opcode=0xe5 (vendor) [ 1064.094303][ C0] sd 0:0:1:0: tag#4936 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1064.103356][ C0] sd 0:0:1:0: tag#4936 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1064.104668][ C1] sd 0:0:1:0: tag#4937 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s 10:18:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000204000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1064.112394][ C0] sd 0:0:1:0: tag#4936 CDB[20]: ba [ 1064.122190][ C1] sd 0:0:1:0: tag#4937 CDB: opcode=0xe5 (vendor) [ 1064.133628][ C1] sd 0:0:1:0: tag#4937 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1064.142852][ C1] sd 0:0:1:0: tag#4937 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1064.152163][ C1] sd 0:0:1:0: tag#4937 CDB[20]: ba [ 1064.152566][T29680] loop2: detected capacity change from 0 to 264192 10:18:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000604000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1064.178716][T29676] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1064.195237][T29680] msdos filesystem being mounted at /root/syzkaller-testdir156917949/syzkaller.TDnRSM/2019/file1 supports timestamps until 2107 (0x10391447e) 10:18:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000100f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) [ 1064.284509][T29676] loop4: detected capacity change from 0 to 512 [ 1064.285763][T29701] loop5: detected capacity change from 0 to 512 [ 1064.304596][T29676] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1064.324572][T29701] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1064.334700][T29701] EXT4-fs (loop5): group descriptors corrupted! 10:18:26 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {}, {r5}, {}, {r5}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {r4}, {}, {0x0, r6}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {0x0, r6}, {}, {r2, r6}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {}, {r5}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {}, {}, {r4}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r5}, {}, {r1}, {0x0, r6}, {r4}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {r5}, {}, {}, {r5}, {r5}, {}, {}, {}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {}, {r5, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5, r6}, {r5}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4, r6}], 0x1, "2156816c73038c"}) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) 10:18:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000008004000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000110f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce0005000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) [ 1064.504930][T29723] loop5: detected capacity change from 0 to 512 [ 1064.513256][T29723] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1064.513769][T29722] loop4: detected capacity change from 0 to 512 [ 1064.523450][T29723] EXT4-fs (loop5): group descriptors corrupted! [ 1064.539403][T29722] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1064.565825][T29723] loop5: detected capacity change from 0 to 512 [ 1064.583110][T29723] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1064.593241][T29723] EXT4-fs (loop5): group descriptors corrupted! 10:18:27 executing program 1: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r5}, {}, {r4}, {}, {r4}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {r3, r5}, {0x0, r5}, {}, {r4, r5}, {0x0, r5}, {}, {}, {}, {0x0, r5}, {}, {0x0, r5}, {0x0, r5}, {}, {}, {}, {}, {r3}, {0x0, r5}, {}, {}, {r3, r5}, {r4}, {}, {0x0, r5}, {r4, r5}, {0x0, r5}, {r3}, {}, {0x0, r5}, {r4}, {}, {}, {r4}, {0x0, r5}, {}, {0x0, r5}, {}, {r1, r5}, {0x0, r5}, {r3}, {}, {r4}, {r3}, {}, {r4}, {}, {0x0, r5}, {0x0, r5}, {}, {}, {r4}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {r4}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {0x0, r5}, {r3}, {0x0, r5}, {}, {}, {r3, r5}, {}, {}, {}, {}, {}, {}, {}, {r4}, {0x0, r5}, {0x0, r5}, {r3}, {r4, r5}, {0x0, r5}, {0x0, r5}, {}, {}, {}, {r3}, {0x0, r5}, {}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {r4, r5}, {r3, r5}, {r4}, {}, {r3, r5}, {r3}, {}, {}, {r3}, {}, {}, {}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {0x0, r5}, {}, {}, {r3, r5}, {0x0, r5}, {0x0, r5}, {r3, r5}, {0x0, r5}, {}, {}, {r4}, {}, {}, {0x0, r5}, {r3}, {}, {r4}, {}, {}, {r4}, {0x0, r5}, {0x0, r5}, {}, {0x0, r5}, {}, {0x0, r5}, {}, {r3}, {}, {}, {}, {0x0, r5}, {r3, r5}, {r4}, {}, {}, {}, {r4}, {}, {}, {}, {r3}, {r3}, {}, {r3}, {r4}, {0x0, r5}, {r3}, {}, {r3}, {0x0, r5}, {r4}, {r3, r5}, {}, {}, {0x0, r5}, {}, {}, {0x0, r5}, {r4}, {}, {}, {r3}, {}, {0x0, r5}, {r4, r5}, {0x0, r5}, {0x0, r5}, {}, {}, {0x0, r5}, {r3}, {r4}, {r4, r5}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {r4}, {}, {}, {r4}, {r4}, {}, {}, {}, {0x0, r5}, {}, {r3, r5}, {r3}, {}, {}, {0x0, r5}, {}, {r4, r5}, {r3}, {0x0, r5}, {}, {}, {r3, r5}, {r4, r5}, {r4}, {r3, r5}, {}, {}, {r4}, {r3, r5}, {0x0, r5}, {}, {0x0, r5}, {r4}, {r4}, {r3}, {}, {0x0, r5}, {r4}, {0x0, r5}, {}, {}, {}, {r3, r5}], 0x1, "2156816c73038c"}) r6 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r6, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) 10:18:27 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {}, {r5}, {}, {r5}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {r4}, {}, {0x0, r6}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {}, {}, {r2, r6}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {}, {r5}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {}, {}, {r4}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {}, {r1}, {0x0, r6}, {r4}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {r5}, {}, {}, {r5}, {r5}, {}, {}, {}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {}, {r5, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5, r6}, {r5}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4, r6}], 0x1, "2156816c73038c"}) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) 10:18:27 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000005000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce0006000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000120f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) [ 1064.969108][T29750] loop5: detected capacity change from 0 to 512 [ 1064.981080][T29754] loop4: detected capacity change from 0 to 512 [ 1065.007062][T29750] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! 10:18:27 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000002b05000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1065.017453][T29750] EXT4-fs (loop5): group descriptors corrupted! 10:18:27 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000006000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1065.043741][T29754] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1065.059398][T29767] loop2: detected capacity change from 0 to 264192 [ 1065.093798][T29750] loop5: detected capacity change from 0 to 512 [ 1065.094247][T29754] loop4: detected capacity change from 0 to 512 [ 1065.108385][T29767] msdos filesystem being mounted at /root/syzkaller-testdir156917949/syzkaller.TDnRSM/2020/file1 supports timestamps until 2107 (0x10391447e) [ 1065.123855][T29750] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1065.134098][T29750] EXT4-fs (loop5): group descriptors corrupted! 10:18:27 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000406000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1065.156320][T29754] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:18:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000010100000c000000ce0000000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000140f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:27 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000007000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce0406000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) [ 1065.438583][T29799] loop4: detected capacity change from 0 to 512 [ 1065.448483][T29800] loop5: detected capacity change from 0 to 512 [ 1065.470502][T29799] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1065.482736][T29800] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1065.492921][T29800] EXT4-fs (loop5): group descriptors corrupted! [ 1065.568722][T29799] loop4: detected capacity change from 0 to 512 [ 1065.575963][T29800] loop5: detected capacity change from 0 to 512 [ 1065.582809][T29799] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1065.591550][T29800] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1065.601655][T29800] EXT4-fs (loop5): group descriptors corrupted! 10:18:28 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x401, 0x7, &(0x7f00000008c0)=[{0x0, 0x0, 0x9}, {&(0x7f0000000180)="5030a6b9906c95e36ee1b07f9e5698893307dd91cd0319578b614ed5f1873eb0", 0x20, 0xfffffffffffffffd}, {&(0x7f0000000340)="2df6157d4494279dde2031db3b2744b435271e65a343796db3da0bb347a3215e9b71", 0x22, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f5bf3f90b3d3e7d7132c3012ab7043e22a6f8edc5e516ee833a4fdcf825d9da3fed17cac003d9dd022d", 0xa4, 0x7fffffff}, {&(0x7f0000000500)="822171b91eb1498a4740794c5db7bc7a965f6bf8c7cf5baee0946ad2aa4b016a8a03bb30b092e47cd74a4fab60e1d1443c33c80fa2ef7af6514920209443a39077bb6a856f3c3e40bb7182a08692593ab13f04b516500ed3b3256325f48aafef3d8ca84cdce2b0609ed9c6346c356964614f21f9699436b6ca419197a0729a46ae7ae36fd203e577f2b03891ce7ba975aa5d47214e98c73647d20e757d1ce2d1990688090eee936562a1b4968deb59f6a2980feca28742afcaf376ab51294f57d6334c86538795c11e018be19db248ea75e1", 0xd2, 0x10000}, {&(0x7f0000000600)="4a6006458a4a1e3060e4cca0086f3b44f908e6941741cf7422f159df72a1cdb68c01ef3f102d2afb1e3e446c41bef79e359d62ed3155330d3b2f5207705e6dfa86f4f655d80ee44134bb9211fed0be8f7f86ff1f4b5abab22df6a1bfed2d66e51791fcbbf6f6926ce384fda7a7e86c17dcc2b2473f22c6d095ade56596ee656b3c596a038658b30895170a9ab2d4379f4f58cc6e", 0x94, 0x9}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f0000000ac0)={[{@dots}, {@fat=@sys_immutable}, {@nodots}, {@fat=@umask}], [{@measure}, {@appraise}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@seclabel}]}) openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f80)={0x1, &(0x7f0000000f40)=[{0x7f}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r8, &(0x7f0000000240)={&(0x7f0000000fc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000003940)=ANY=[@ANYBLOB="a676084547ef559e3b608b39e17e1d9f0e82de5f223294d7eeb16908925651d9944d36163cce9de0d5b22963bad7d29dabb4eb59bb331c5bb0d12259b041c8912938c958096ed965ccf6c6aa43b476bab7fe780982567193a54abf30df429ea5ae2d38fe074f50e957eb13d8c7f8da754691e46b02e20182a85a913572dd4b7eb4bbee44c37f898fe283bf190601e787d6d2003b5a0dded53b65d964f31684c31ab6834c43d9aa67c846d0c482e92f4c5dd6052ae838fd10e34afc44f3f7f5e16d36fff4f120c4382f0b4c6b57d7522e3c59f0d436edf65eef78229ad47cc8b83ee1faf2ae4aa9f730284996387ab992459e74db80ae53dd9c2949916759cccbcdc0dd5082e0055207257bbc6395a5dc597601f7aba686e04e16c0bdeccc129f1deac21905ec92be893fa308a69823e8f0217a30b8e2f3a688eecc49e5f2e5de2e4f4403ee579ac9599c6c54e0e0bdca620194ab15b9a85f2264a136ba8c25a2fee890b26233ea8922d702f6c402f44616a19ca821f3d889d1c3c7b9abcdfa22dca627136ae1360ae518d8ba58b9347b421b559c1d4d4f2033625c6866c7ae1b3b7329f238971b9e3d169fba1e7f88dbae9f09bcd18c7e13cd7ad7df100ce3b20705aa31cd9f6038a65f14c77fc01344018e928658f631d0ce4c42426ff3b8ea2b8cc5727da9cc1d13cfad7ca61fe04768878974a5ab18001988d16f23763483581683a168c8df1ec226d14e7aaf059b43e88c106024147243cb0bd439be21e84ea5f2eef5284117a8febe17b10a042fce1ae79f0e5a5d88621be4c5f28b648be26ff95b35317866867f937ae366bd2d5b46b9c1375d74d81c8782f9f7c02bf64491ab92f911ce94e27c3203b27ce54c8f789c85267f64416b47dc9a6a58e4bfae9d82b4d82c3424dd47b2e5f60ad93b8ce0944c15dc88934db7d876bed4ae3bfa2781907d6aa5d6c800e246863ce7dc087289fb214a5eb40b745f0bf6b31b16f90d9f1cdd82651ab37cac49a92bc1e8fd477ffcbd243708e79d110c2176d5ffe1529fd8eb822944ec71ad13cf220892389586a4cb3fc800f0cf5606e18514548d664843567a8ebd2cc81f805c7f0783ed33a0922ae2fbfeebd4cc4d5013e047ea4c545952c3915a5d406bda65d9c369bf6ac54639ac780b39b2130913de1d0174ac6e7f51ed530afbd952d2bc517bddae7d447524ee6f5961792edd24db97e577f27e347acaa3124df708304dd55d553fd6f9055fc4de8e7232ff130904830bc74bdb312b02d8da4363f282204ba6fb7f6b8a4ec7784a1ee7f74c9f78b49419df94862c70fecca90e7d70bb69655c9c07440d74765c98f51bcbee39e0509583485d5369b9ecad6048b78919b455d580b72fc82c4280814eaa66dfdf34334e98ebf30b82f0033ad8a58fbf04e4aa4799c69afe6cd20d5ed06cffdb8e4ada08216bf2ed40d94782e3558deca45501b877b0f5cd10f272b602e71e00b79bfabc1e22a752201b06909a07a8a559cc64e05a1ec95d613c05ca97048f0e0b3a9e7f227d86ea865a7dae039ebf0a093ae4ad6a43b61c62373b18e0d06d56fc9ed9654a8b2a2363566c56f6e2d51fdaf624f51fb7e715f469fe22b995ef60d1106c9784278e19c41034fe9cb05b81a501ff2dc422704a9a49dc0cddf62728e50d850700000000000000ded19e7a71300635e2ef5f9955be8ae4d7e8319077687c955ba12db3d6068545f17b714ecfa1b5c69c25fbe4e279e91d2d19a72452f4719814831e3ae4a05976a45f955d4bd6ea0d6fda797f3f215e799787907e063f000000000000007bd778e426d04e4562cb31b61093f5ee0e8a38fb8e58b498e2577117b2854f12aa92588d6a7f9368aae35de3b965a1a30f44520f783718b4c7cfa163c1acbda149e3664ab608b2a3dd2d4331b7b8042ab5c5227d9ed2f4c6eb8f4f383ad08bfa72dcc6f944a8f0edb37ba65c527e2cbc4e45516a42cbaf236fedd66cdf6c0c4068b8fb5880fa01c9c5aad3d556efecd55271893f374fc36495831f00a17190ef9b879de707b648f9e43689638507afedebaeef99404bcd58950b9d1a5ae1ddcdd0882ef725e03ac1c43ddaea9a7726b836cb64d363ae7062d8a539d16471d7160d7bc1f8707c9aa77240189393eea889ac19a4958c56e2fdc38a7e264e6effacb0202a22a505003a6fe2352fee85cebca1d8706d00f2be8826b261b5fe6ee75fa8fa38984445e1cd4c382cf2cfe14d7c542b14a637d05e729cde31f6ceac712394137e2bb408f61d9972173b295bab2a74564236b6b6e441eeb835659caaa54404fd4706d32bbf981ced48c6e82f9e9cede593c8e063a9a789ae38c47ff9d14cd855d6eb72ea7009efd3ce318aa8c96d7d6e82925d10090c04642af652ddd9732fd01f8cddf759cc9f79308a43588df227d79f7db8750d4498be9cd4eeaf2b12435704e67c156aa74eba00bdd241f7d23652895ea54743a12ffeb606cfaae88d14400cd230d55e112891ebc96ac90183be301564d7d2fdf3d4bb7160ea889fee98a47fb4f816a2fe0cb66809ebf8763306c71203f86d6d85e7c4bd3694f71354367c69b7053ed75ca15cd441e6caebdf4ec15f3eec4f86b1e3506048c52851406897d63fe54db0100ac6eed6cad0733c941c345da94d0c6f4eec92820dab06bc330e74f52c5858fc71862701ec3b690605fb460d1f6e46f99299b4cf3df8d65f87c4a2ef8d05fa4b3841482f4572fe4773cb548ae691f12a219de1902a644f238a9f38d9913790de484a1251e3b8399a10b3e73a4895e2ae57088f38524ebd5fd2be455ceeb16b5bcf5300cfedd1e326a862c0bf3e1bef531a6c7a5895c247b12b39d9952529de825f8a31282be28ede06b7a5062c4dfefee45c52a901504723c59983d8746e84c457f8fdd18f55379189b63e5b9baaadf9a117f98538c1015f5d1da113c74f63b59545658c1df48ff840a691efd84f835a92a0a6ba2d9a4fb09a0577bdb3f888fa5ddc0abe98cdda0f0a165878e19fb99372077a605cc91e91e0bfdbd09c7b6ffa9db203000000bc6d7e572b5b46decb2e28ff71593b5bc58d21f86ed46db4e0f142af07d53c1b405511da1c80d5db99b4957443ecaacfa6e66732bcdd609e9b4531f50f5619571aa738abf0cc61eb8973be69931a6fef7e52a19f70ad318d549b0c8c805922e81e6ada33a4b59a9af96b40e563b6b147d04fec6ef7029ae8246744cf2f803432223529ad6456b188f34c00ce0dc4863beb9be26ae19b590927612db57cde87f9aa13c23fca0d1ccdfb77eb2f987a8905627b294753124a4bd6c03df81bdf014d2ba8ad181e5ee6094635ec64f04d1932359bca717bf00101e06e23fd6aa73eecca651471d875b088b4fa5a4765a9ac30725ac4032cfa77ed55229d5efff09463913195d92c4956833f2c3132a9c08588882624839502b8e83b9f700fc95d38891c25cc0e47f5865005403907d75916a5b31694f627cd90dfa2878a6044b6283febda431180c84caf8b2dc73ea016124c668e9d650449c9d272b075aaa4fc2174ebc560c10db6a6c427086a498456b8a9adc05a67389e00d2dc429a865861fe241224d9d200e92dbb8605f76f347ea4bed15a0ebae4f434fad2069ee387465f96efd2d52affc44ab011b6aa8004393d59b7ef6fb0f13568eb20fb47d9007ca13267233b6862426565b75018d3bb63912d87053ed33ffd87c48ba6bf1d8c1c2fa7103b527077a83d00ffc5cb75a76bf8861090ff984a4de3354c0000000000000001fb11035ec8a525e7f73997e337b195c2ef4f36ecf498b939d47297bec7b41480c8ccb6736e523c42ce4016caf7f7883ab62b44cbfbed0e4a621d44c67027f1b5be2cec6f086c4a73148f05c0a08046d1cb991fe11c43bbaa28e0746ff121cfbae5e6c9c04a2794019bafe704e058e6020dfdce967a6b86b569b8721fc172f9ffbe9a77e70e7a998772b6de720230a40b7a5796af6188c800b7fa06c54dd6be660a050781f8e03edae98532fef635dee9917145d831519e4b1e432ad926225bc4922214658cd0615760e1aa90b1c371811e475cbb69a3ee5392336afd2b8accfc204754ef95b362b0b2a229f1857a118c74cde213571b42f3a6340cd0b165712d7b47532e65a299d2d0c9a5661adfac383b8bd2a3fa625fec436516a9147be525f05577e485dd3d70076d94d2fddfee253963e4d7f9e9af4b3948a6757033ab65cbaabe09e4c2ee4e2803b97c84a109a4aa82ed72a1994c7ac159e7e6f5c26c11728ef65503127866a4c668379f82e8db5b8934f479aaf5df687bcc7933633471ab79443d69740cd880a5375e5ece1b05c41ccb70c7ef718fcb3667260f93b4c24478ed1c2112d3fa959b421c7e4e8bd75efc1014f6c8f69b1dd7993c4d04700a475118536de33b142f1f6b21a349527ffc7ef678a7b567c78192d0cf1c1ef95bb2665eaca4f2e63a0c8ed6d5955b26931d98b8b190c36b54c6f8ae670e706a97965dec5881b070fb1341aa47ee181da6f85681c21b1bad7f8191881d920983c2ff0e523adaf3123b0773d561859a54a6a77c0eccccfef8abb808120ce27c43476b1c978985ae42c680147f092502bbb1f0e37570f876db7215b68ff453eee673519cb1d0adfcfcc477ed5663955e7d20228d0bdcb9a5a855c6a7eac601c79d91ba01f1d8575b721951e908fa72c295dcea1eb57531748875713cc6a32b3712e701b22b15d3e53337fff2271ce43c8023cab1c26130b017949a16e213e8186e6df3a1b7ba3dd63c668c3fa6542133cd30546fe519ee1dcb40f487066d2e6118e8f96705abe25f288789f38bcf8eb695e16a2c00e61f5ad1593d3c33e150ecf1d6f5a561b9698bca30a19cb71572146ff2dc771b5ae9f0e26ef2491f93d8605df6d849f4cce05e4687a5a4ed4cafb51ee94ed070aa9bbc9ea3edcbe457b518cebfa3d206dac8ec464c9a4ebc74bd951e6c38f197a915fa7b25d9d82fc2fccc36c782a249e79d73be2fa17b5929c723b88cda6b7b5e09e988ce68714fb650d8c394ca3608f101a9fb203a4c85273609343264b8e0dffd91be57f04ad2b845ac0a3b525a5160dbfd1e467f55ffb4f2543acb63855434ba7e6721aaa18c7497a6966809c0732f72a23f0de99e285a798cdfd6a59324a0969860715a06e99b338aaf99aa88d2198b99970f7d5efb123c4a66dc05c4d8cc9a53eff3bdf01a1a3202e63fe4f79a634279d95a574921f9f25466f47f59b230dbc34fd205ba57815f26e7083bd90419e21eb643f5ca893e2405118d5d6ac3dc2bdf5974cec29c824826c8197674096aa911d04fad7d149d82f6aa32c4a07ab2dcaceb575c83969e34410c4448b6cae5282cb5ca2449185985f68f66831f1eda1a722e1d036565034bf340c02999eb334ae5b79b2ca556511c2490413dd3d551a47e6a10d802d4effa55b4284c5967a479509f4efc41668e40573e6b7054f8ba005efb1fc7ca4ad7b67034fd0e4a52a2d8c78b6814560231b643df0e010422d215c73af5159d2dd51bf805b5d3642a21161e99d7966b7cfb09b1b15a63005b5dc86799b860fd048e130f084c430127494e31678f31daacb2ce8befe6e50dffd7e466448a1db97ad21086ef7cd69241ca9e49b6f18ac0f72ebec5b326ae8ffa38e7137325290fb8a60964f99893cb9924f514d9c17a79a4fbaad0b0bca44502c0ff8b7bfd4f939c6e6edb33e765a6f066a4b2a191b815ed216864e2a9fb5d29de541a092ce67e32093cf3e8d88617f77e37104a7812d056c449d299e5ae7548a1513333870bd74012efbf125b269488ed1f64223d16b2cbc13646ef03e4c016fdc2e68990e6a657600a5730169b33da458a5d736b65bcef0513a5bcd5106a44d33f5c1367e51bfc11c89386c4e492707db87887e5b86c1dba5538fbf5391f5f450a9064b6dfb04f5e7a462277cbf6810e1adf7d64acba3d5e296f5c868cac1cfd76016ca31f52d1169826cf2b4dc548fa348c4c877f9ab4c5cd8fe90452d486d455f3312fa90d3cf031abb0c9ce4fe21496de73c4453770625096a76e7ec42de4e1d12074c68d26a2a143bc762209e77244fb62b8660a62251490e0e68ffc578d27c943632f5462ffe56a0811757d7a2a9ad5c690fd7a2118b5a9d0b266493cef716ef8308d61f4d4c8f2947599294b98f0664c7ba67d5080a67d01dd227e02ed92ac5e06a3a10fed4ea3ea109bf0f23ea44c108a31c56a82c296522328198f30f528927b59a6b38a0738bc055559b83f5be231a9137f16d4fd49611fd0f205afaad2ebe2487abd230a3de428529e18bdf20c9fe6e856607cfa83e5ba0d3eed7f6ab508358604a8e762553a884e07ec2a3b60adf54318bf76d5e30fa066fa81cb0c63452d3f0ae1501f1087ed632aa5e9a325aa84233548e39730f5ff923b663b3ea6698f9a9fb8f24286f50c742c63a6d3fb5c4e00ad0bf6da64cd4c482fbe77ee2860a0", @ANYRES64=r7, @ANYRESHEX, @ANYRES32=r6, @ANYRESOCT=r3, @ANYRESOCT=r4, @ANYBLOB="16de71cf0766d82ab6b67f0cd79e8e3ee2643e2e5026c3ea1ccfde1fe0912c50f4450c9c7749b181ae244aa09bb447092b0b62871d5ab9b62bc1121905ff995d268176192bba6bbfe4ff322f3370ce1ac7b5dd004238de507070dc0002cfe8ca03a81158f62018fe98245631fc021061fec067e33a1c01f786dafad477a72fcf767c43d28917995da3bd4df41908d180cd9517f24d97f14674a9a15bb602dca6587204d6571e02a456eb415ea3208e6afe4ed4f3533d7cf074ed4bd702d74e242405fadcd0c73dbb590bb430b54691990800f66109473f3531c01f00"/234], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x40025) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r10, r9, 0x0, 0x100000002) [ 1065.814872][ C1] sd 0:0:1:0: tag#4976 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1065.824916][ C1] sd 0:0:1:0: tag#4976 CDB: opcode=0xe5 (vendor) [ 1065.831261][ C1] sd 0:0:1:0: tag#4976 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1065.840273][ C1] sd 0:0:1:0: tag#4976 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1065.849318][ C1] sd 0:0:1:0: tag#4976 CDB[20]: ba 10:18:28 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {}, {r5}, {}, {r5}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {r4}, {}, {0x0, r6}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {}, {}, {r2, r6}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {}, {r5}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {}, {}, {r4}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {}, {r1}, {0x0, r6}, {r4}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {r5}, {}, {}, {r5}, {r5}, {}, {}, {}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {}, {r5, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5, r6}, {r5}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4, r6}], 0x1, "2156816c73038c"}) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) 10:18:28 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x401, 0x8, &(0x7f00000008c0)=[{0x0}, {0x0, 0x0, 0x9}, {&(0x7f0000000180)="5030a6b9906c95e36ee1b07f9e5698893307dd91cd0319578b614ed5f1873eb0", 0x20, 0xfffffffffffffffd}, {&(0x7f0000000340)="2df6157d4494279dde2031db3b2744b435271e65a343796db3da0bb347a3215e9b71", 0x22, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f5bf3f90b3d3e7d7132c3012ab7043e22a6f8edc5e516ee833a4fdcf825d9da3fed17cac003d9dd022d", 0xa4, 0x7fffffff}, {&(0x7f0000000500)="822171b91eb1498a4740794c5db7bc7a965f6bf8c7cf5baee0946ad2aa4b016a8a03bb30b092e47cd74a4fab60e1d1443c33c80fa2ef7af6514920209443a39077bb6a856f3c3e40bb7182a08692593ab13f04b516500ed3b3256325f48aafef3d8ca84cdce2b0609ed9c6346c356964614f21f9699436b6ca419197a0729a46ae7ae36fd203e577f2b03891ce7ba975aa5d47214e98c73647d20e757d1ce2d1990688090eee936562a1b4968deb59f6a2980feca28742afcaf376ab51294f57d6334c86538795c11e018be19db248ea75e1", 0xd2, 0x10000}, {&(0x7f0000000600)="4a6006458a4a1e3060e4cca0086f3b44f908e6941741cf7422f159df72a1cdb68c01ef3f102d2afb1e3e446c41bef79e359d62ed3155330d3b2f5207705e6dfa86f4f655d80ee44134bb9211fed0be8f7f86ff1f4b5abab22df6a1bfed2d66e51791fcbbf6f6926ce384fda7a7e86c17dcc2b2473f22c6d095ade56596ee656b3c596a038658b30895170a9ab2d4379f4f58cc6e", 0x94, 0x9}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f0000000ac0)={[{@dots}, {@fat=@sys_immutable}, {@nodots}, {@fat=@umask}], [{@measure}, {@appraise}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@seclabel}]}) openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f80)={0x1, &(0x7f0000000f40)=[{0x7f}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000fc0), 0xc, &(0x7f0000000200)={&(0x7f0000003940)=ANY=[@ANYRES64=r7, @ANYRESHEX, @ANYRES32=r6, @ANYRESOCT=r3, @ANYRESOCT=r4, @ANYBLOB="16de71cf0766d82ab6b67f0cd79e8e3ee2643e2e5026c3ea1ccfde1fe0912c50f4450c9c7749b181ae244aa09bb447092b0b62871d5ab9b62bc1121905ff995d268176192bba6bbfe4ff322f3370ce1ac7b5dd004238de507070dc0002cfe8ca03a81158f62018fe98245631fc021061fec067e33a1c01f786dafad477a72fcf767c43d28917995da3bd4df41908d180cd9517f24d97f14674a9a15bb602dca6587204d6571e02a456eb415ea3208e6afe4ed4f3533d7cf074ed4bd702d74e242405fadcd0c73dbb590bb430b54691990800f66109473f3531c01f00"/234], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x40025) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r10, r9, 0x0, 0x100000002) (fail_nth: 1) 10:18:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce0007000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000220f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000018000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000000001c000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1065.925717][T29837] loop4: detected capacity change from 0 to 512 [ 1065.928265][T29839] loop5: detected capacity change from 0 to 512 [ 1065.947771][T29839] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1065.958764][T29839] EXT4-fs (loop5): group descriptors corrupted! [ 1065.985389][T29837] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1065.986610][ C0] sd 0:0:1:0: tag#4933 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1066.002449][ C0] sd 0:0:1:0: tag#4933 CDB: opcode=0xe5 (vendor) [ 1066.008778][ C0] sd 0:0:1:0: tag#4933 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1066.017842][ C0] sd 0:0:1:0: tag#4933 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1066.026921][ C0] sd 0:0:1:0: tag#4933 CDB[20]: ba 10:18:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000020000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1066.051185][T29840] FAULT_INJECTION: forcing a failure. [ 1066.051185][T29840] name failslab, interval 1, probability 0, space 0, times 0 [ 1066.063923][T29840] CPU: 0 PID: 29840 Comm: syz-executor.1 Not tainted 5.15.0-rc2-syzkaller #0 [ 1066.072695][T29840] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1066.082692][T29858] loop2: detected capacity change from 0 to 264192 [ 1066.082753][T29840] Call Trace: [ 1066.082760][T29840] dump_stack_lvl+0xd6/0x122 [ 1066.097433][T29840] dump_stack+0x11/0x1b [ 1066.101587][T29840] should_fail+0x23c/0x250 [ 1066.106058][T29840] __should_failslab+0x81/0x90 [ 1066.110831][T29840] ? alloc_pipe_info+0xac/0x350 [ 1066.115679][T29840] should_failslab+0x5/0x20 [ 1066.120180][T29840] kmem_cache_alloc_trace+0x52/0x320 [ 1066.125453][T29840] alloc_pipe_info+0xac/0x350 [ 1066.130123][T29840] splice_direct_to_actor+0x5f7/0x650 [ 1066.135507][T29840] ? security_file_permission+0x7c/0xa0 [ 1066.141250][T29840] ? do_splice_direct+0x190/0x190 [ 1066.146269][T29840] ? security_file_permission+0x87/0xa0 [ 1066.152856][T29840] do_splice_direct+0x106/0x190 [ 1066.158130][T29840] do_sendfile+0x63e/0xbb0 [ 1066.162584][T29840] __x64_sys_sendfile64+0x102/0x140 [ 1066.167862][T29840] do_syscall_64+0x44/0xa0 [ 1066.172274][T29840] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1066.178177][T29840] RIP: 0033:0x7f93f1038709 [ 1066.182675][T29840] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1066.202269][T29840] RSP: 002b:00007f93eedb0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1066.210678][T29840] RAX: ffffffffffffffda RBX: 00007f93f113cf60 RCX: 00007f93f1038709 [ 1066.218636][T29840] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000009 [ 1066.226593][T29840] RBP: 00007f93eedb01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1066.234548][T29840] R10: 0000000100000002 R11: 0000000000000246 R12: 0000000000000001 [ 1066.242592][T29840] R13: 00007ffc9c88ec6f R14: 00007f93eedb0300 R15: 0000000000022000 [ 1066.269819][T29858] msdos filesystem being mounted at /root/syzkaller-testdir156917949/syzkaller.TDnRSM/2021/file1 supports timestamps until 2107 (0x10391447e) [ 1066.302129][T29837] loop4: detected capacity change from 0 to 512 [ 1066.302149][T29839] loop5: detected capacity change from 0 to 512 10:18:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000026000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000000052b000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1066.304192][T29839] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1066.323108][T29837] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1066.324777][T29839] EXT4-fs (loop5): group descriptors corrupted! 10:18:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000000003f000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce0009000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) [ 1066.459547][T29890] loop4: detected capacity change from 0 to 512 [ 1066.477892][T29890] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1066.537819][T29890] loop4: detected capacity change from 0 to 512 [ 1066.545184][T29890] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:18:29 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x401, 0x7, &(0x7f00000008c0)=[{0x0, 0x0, 0x9}, {&(0x7f0000000180)="5030a6b9906c95e36ee1b07f9e5698893307dd91cd0319578b614ed5f1873eb0", 0x20, 0xfffffffffffffffd}, {&(0x7f0000000340)="2df6157d4494279dde2031db3b2744b435271e65a343796db3da0bb347a3215e9b71", 0x22, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f5bf3f90b3d3e7d7132c3012ab7043e22a6f8edc5e516ee833a4fdcf825d9da3fed17cac003d9dd022d", 0xa4, 0x7fffffff}, {&(0x7f0000000500)="822171b91eb1498a4740794c5db7bc7a965f6bf8c7cf5baee0946ad2aa4b016a8a03bb30b092e47cd74a4fab60e1d1443c33c80fa2ef7af6514920209443a39077bb6a856f3c3e40bb7182a08692593ab13f04b516500ed3b3256325f48aafef3d8ca84cdce2b0609ed9c6346c356964614f21f9699436b6ca419197a0729a46ae7ae36fd203e577f2b03891ce7ba975aa5d47214e98c73647d20e757d1ce2d1990688090eee936562a1b4968deb59f6a2980feca28742afcaf376ab51294f57d6334c86538795c11e018be19db248ea75e1", 0xd2, 0x10000}, {&(0x7f0000000600)="4a6006458a4a1e3060e4cca0086f3b44f908e6941741cf7422f159df72a1cdb68c01ef3f102d2afb1e3e446c41bef79e359d62ed3155330d3b2f5207705e6dfa86f4f655d80ee44134bb9211fed0be8f7f86ff1f4b5abab22df6a1bfed2d66e51791fcbbf6f6926ce384fda7a7e86c17dcc2b2473f22c6d095ade56596ee656b3c596a038658b30895170a9ab2d4379f4f58cc6e", 0x94, 0x9}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f0000000ac0)={[{@dots}, {@fat=@sys_immutable}, {@nodots}, {@fat=@umask}], [{@measure}, {@appraise}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@seclabel}]}) openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f80)={0x1, &(0x7f0000000f40)=[{0x7f}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r8, &(0x7f0000000240)={&(0x7f0000000fc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000003940)=ANY=[@ANYBLOB="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", @ANYRES64=r7, @ANYRESHEX, @ANYRES32=r6, @ANYRESOCT=r3, @ANYRESOCT=r4, @ANYBLOB="16de71cf0766d82ab6b67f0cd79e8e3ee2643e2e5026c3ea1ccfde1fe0912c50f4450c9c7749b181ae244aa09bb447092b0b62871d5ab9b62bc1121905ff995d268176192bba6bbfe4ff322f3370ce1ac7b5dd004238de507070dc0002cfe8ca03a81158f62018fe98245631fc021061fec067e33a1c01f786dafad477a72fcf767c43d28917995da3bd4df41908d180cd9517f24d97f14674a9a15bb602dca6587204d6571e02a456eb415ea3208e6afe4ed4f3533d7cf074ed4bd702d74e242405fadcd0c73dbb590bb430b54691990800f66109473f3531c01f00"/234], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x40025) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r10, r9, 0x0, 0x100000002) [ 1066.742664][ C1] sd 0:0:1:0: tag#4937 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1066.752520][ C1] sd 0:0:1:0: tag#4937 CDB: opcode=0xe5 (vendor) [ 1066.758847][ C1] sd 0:0:1:0: tag#4937 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1066.767915][ C1] sd 0:0:1:0: tag#4937 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1066.776951][ C1] sd 0:0:1:0: tag#4937 CDB[20]: ba 10:18:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000250f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:29 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000040000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:29 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x401, 0x8, &(0x7f00000008c0)=[{0x0}, {0x0, 0x0, 0x9}, {&(0x7f0000000180)="5030a6b9906c95e36ee1b07f9e5698893307dd91cd0319578b614ed5f1873eb0", 0x20, 0xfffffffffffffffd}, {&(0x7f0000000340)="2df6157d4494279dde2031db3b2744b435271e65a343796db3da0bb347a3215e9b71", 0x22, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f5bf3f90b3d3e7d7132c3012ab7043e22a6f8edc5e516ee833a4fdcf825d9da3fed17cac003d9dd022d", 0xa4, 0x7fffffff}, {&(0x7f0000000500)="822171b91eb1498a4740794c5db7bc7a965f6bf8c7cf5baee0946ad2aa4b016a8a03bb30b092e47cd74a4fab60e1d1443c33c80fa2ef7af6514920209443a39077bb6a856f3c3e40bb7182a08692593ab13f04b516500ed3b3256325f48aafef3d8ca84cdce2b0609ed9c6346c356964614f21f9699436b6ca419197a0729a46ae7ae36fd203e577f2b03891ce7ba975aa5d47214e98c73647d20e757d1ce2d1990688090eee936562a1b4968deb59f6a2980feca28742afcaf376ab51294f57d6334c86538795c11e018be19db248ea75e1", 0xd2, 0x10000}, {&(0x7f0000000600)="4a6006458a4a1e3060e4cca0086f3b44f908e6941741cf7422f159df72a1cdb68c01ef3f102d2afb1e3e446c41bef79e359d62ed3155330d3b2f5207705e6dfa86f4f655d80ee44134bb9211fed0be8f7f86ff1f4b5abab22df6a1bfed2d66e51791fcbbf6f6926ce384fda7a7e86c17dcc2b2473f22c6d095ade56596ee656b3c596a038658b30895170a9ab2d4379f4f58cc6e", 0x94, 0x9}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f0000000ac0)={[{@dots}, {@fat=@sys_immutable}, {@nodots}, {@fat=@umask}], [{@measure}, {@appraise}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@seclabel}]}) openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f80)={0x1, &(0x7f0000000f40)=[{0x7f}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000fc0), 0xc, &(0x7f0000000200)={&(0x7f0000003940)=ANY=[@ANYRES64=r7, @ANYRESHEX, @ANYRES32=r6, @ANYRESOCT=r3, @ANYRESOCT=r4, @ANYBLOB="16de71cf0766d82ab6b67f0cd79e8e3ee2643e2e5026c3ea1ccfde1fe0912c50f4450c9c7749b181ae244aa09bb447092b0b62871d5ab9b62bc1121905ff995d268176192bba6bbfe4ff322f3370ce1ac7b5dd004238de507070dc0002cfe8ca03a81158f62018fe98245631fc021061fec067e33a1c01f786dafad477a72fcf767c43d28917995da3bd4df41908d180cd9517f24d97f14674a9a15bb602dca6587204d6571e02a456eb415ea3208e6afe4ed4f3533d7cf074ed4bd702d74e242405fadcd0c73dbb590bb430b54691990800f66109473f3531c01f00"/234], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x40025) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r10, r9, 0x0, 0x100000002) (fail_nth: 2) 10:18:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce000a000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:29 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {}, {r5}, {}, {r5}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {r4}, {}, {0x0, r6}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {}, {}, {r2, r6}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {}, {r5}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {}, {}, {r4}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {}, {r1}, {0x0, r6}, {r4}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {r5}, {}, {}, {r5}, {r5}, {}, {}, {}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {}, {r5, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5, r6}, {r5}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4, r6}], 0x1, "2156816c73038c"}) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) [ 1066.918005][T29910] loop5: detected capacity change from 0 to 512 [ 1066.919838][T29915] loop4: detected capacity change from 0 to 512 [ 1066.953522][T29910] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! 10:18:29 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000480000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1066.963674][T29910] EXT4-fs (loop5): group descriptors corrupted! [ 1066.975997][T29915] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1067.000674][ C0] sd 0:0:1:0: tag#4984 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1067.010569][ C0] sd 0:0:1:0: tag#4984 CDB: opcode=0xe5 (vendor) 10:18:29 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000000fffe000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1067.016897][ C0] sd 0:0:1:0: tag#4984 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1067.025957][ C0] sd 0:0:1:0: tag#4984 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1067.035117][ C0] sd 0:0:1:0: tag#4984 CDB[20]: ba [ 1067.054542][T29930] loop2: detected capacity change from 0 to 264192 10:18:29 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000000feff000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1067.072984][T29930] msdos filesystem being mounted at /root/syzkaller-testdir156917949/syzkaller.TDnRSM/2022/file1 supports timestamps until 2107 (0x10391447e) [ 1067.089271][T29916] FAULT_INJECTION: forcing a failure. [ 1067.089271][T29916] name failslab, interval 1, probability 0, space 0, times 0 [ 1067.094711][T29910] loop5: detected capacity change from 0 to 512 [ 1067.101916][T29916] CPU: 0 PID: 29916 Comm: syz-executor.1 Not tainted 5.15.0-rc2-syzkaller #0 [ 1067.117014][T29916] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1067.127064][T29916] Call Trace: [ 1067.127754][T29910] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1067.130340][T29916] dump_stack_lvl+0xd6/0x122 [ 1067.130364][T29916] dump_stack+0x11/0x1b [ 1067.140421][T29910] EXT4-fs (loop5): group descriptors corrupted! [ 1067.145067][T29916] should_fail+0x23c/0x250 [ 1067.159919][T29916] ? kcalloc+0x32/0x40 [ 1067.163991][T29916] __should_failslab+0x81/0x90 [ 1067.168850][T29916] should_failslab+0x5/0x20 [ 1067.173969][T29916] __kmalloc+0x6f/0x350 [ 1067.178127][T29916] ? alloc_pipe_info+0xac/0x350 [ 1067.183054][T29916] kcalloc+0x32/0x40 [ 1067.186954][T29916] alloc_pipe_info+0x1be/0x350 [ 1067.191816][T29916] splice_direct_to_actor+0x5f7/0x650 [ 1067.197188][T29916] ? security_file_permission+0x7c/0xa0 [ 1067.202943][T29916] ? do_splice_direct+0x190/0x190 [ 1067.208053][T29916] ? security_file_permission+0x87/0xa0 [ 1067.213622][T29916] do_splice_direct+0x106/0x190 [ 1067.218459][T29916] do_sendfile+0x63e/0xbb0 [ 1067.222875][T29916] __x64_sys_sendfile64+0x102/0x140 [ 1067.228129][T29916] do_syscall_64+0x44/0xa0 [ 1067.232536][T29916] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1067.238435][T29916] RIP: 0033:0x7f93f1038709 [ 1067.242853][T29916] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1067.262509][T29916] RSP: 002b:00007f93eedb0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1067.270922][T29916] RAX: ffffffffffffffda RBX: 00007f93f113cf60 RCX: 00007f93f1038709 [ 1067.278893][T29916] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000009 [ 1067.286845][T29916] RBP: 00007f93eedb01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1067.294796][T29916] R10: 0000000100000002 R11: 0000000000000246 R12: 0000000000000001 [ 1067.302755][T29916] R13: 00007ffc9c88ec6f R14: 00007f93eedb0300 R15: 0000000000022000 [ 1067.316628][T29915] loop4: detected capacity change from 0 to 512 10:18:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00002e0f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:29 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000040000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1067.332867][T29915] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:18:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce000b000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) [ 1067.443370][T29959] loop4: detected capacity change from 0 to 512 [ 1067.476504][T29965] loop5: detected capacity change from 0 to 512 [ 1067.491803][T29959] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1067.513676][T29965] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1067.523835][T29965] EXT4-fs (loop5): group descriptors corrupted! 10:18:29 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x401, 0x7, &(0x7f00000008c0)=[{0x0, 0x0, 0x9}, {&(0x7f0000000180)="5030a6b9906c95e36ee1b07f9e5698893307dd91cd0319578b614ed5f1873eb0", 0x20, 0xfffffffffffffffd}, {&(0x7f0000000340)="2df6157d4494279dde2031db3b2744b435271e65a343796db3da0bb347a3215e9b71", 0x22, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f5bf3f90b3d3e7d7132c3012ab7043e22a6f8edc5e516ee833a4fdcf825d9da3fed17cac003d9dd022d", 0xa4, 0x7fffffff}, {&(0x7f0000000500)="822171b91eb1498a4740794c5db7bc7a965f6bf8c7cf5baee0946ad2aa4b016a8a03bb30b092e47cd74a4fab60e1d1443c33c80fa2ef7af6514920209443a39077bb6a856f3c3e40bb7182a08692593ab13f04b516500ed3b3256325f48aafef3d8ca84cdce2b0609ed9c6346c356964614f21f9699436b6ca419197a0729a46ae7ae36fd203e577f2b03891ce7ba975aa5d47214e98c73647d20e757d1ce2d1990688090eee936562a1b4968deb59f6a2980feca28742afcaf376ab51294f57d6334c86538795c11e018be19db248ea75e1", 0xd2, 0x10000}, {&(0x7f0000000600)="4a6006458a4a1e3060e4cca0086f3b44f908e6941741cf7422f159df72a1cdb68c01ef3f102d2afb1e3e446c41bef79e359d62ed3155330d3b2f5207705e6dfa86f4f655d80ee44134bb9211fed0be8f7f86ff1f4b5abab22df6a1bfed2d66e51791fcbbf6f6926ce384fda7a7e86c17dcc2b2473f22c6d095ade56596ee656b3c596a038658b30895170a9ab2d4379f4f58cc6e", 0x94, 0x9}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f0000000ac0)={[{@dots}, {@fat=@sys_immutable}, {@nodots}, {@fat=@umask}], [{@measure}, {@appraise}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@seclabel}]}) openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f80)={0x1, &(0x7f0000000f40)=[{0x7f}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r8, &(0x7f0000000240)={&(0x7f0000000fc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000003940)=ANY=[@ANYBLOB="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", @ANYRES64=r7, @ANYRESHEX, @ANYRES32=r6, @ANYRESOCT=r3, @ANYRESOCT=r4, @ANYBLOB="16de71cf0766d82ab6b67f0cd79e8e3ee2643e2e5026c3ea1ccfde1fe0912c50f4450c9c7749b181ae244aa09bb447092b0b62871d5ab9b62bc1121905ff995d268176192bba6bbfe4ff322f3370ce1ac7b5dd004238de507070dc0002cfe8ca03a81158f62018fe98245631fc021061fec067e33a1c01f786dafad477a72fcf767c43d28917995da3bd4df41908d180cd9517f24d97f14674a9a15bb602dca6587204d6571e02a456eb415ea3208e6afe4ed4f3533d7cf074ed4bd702d74e242405fadcd0c73dbb590bb430b54691990800f66109473f3531c01f00"/234], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x40025) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r10, r9, 0x0, 0x100000002) 10:18:29 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x401, 0x8, &(0x7f00000008c0)=[{0x0}, {0x0, 0x0, 0x9}, {&(0x7f0000000180)="5030a6b9906c95e36ee1b07f9e5698893307dd91cd0319578b614ed5f1873eb0", 0x20, 0xfffffffffffffffd}, {&(0x7f0000000340)="2df6157d4494279dde2031db3b2744b435271e65a343796db3da0bb347a3215e9b71", 0x22, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f5bf3f90b3d3e7d7132c3012ab7043e22a6f8edc5e516ee833a4fdcf825d9da3fed17cac003d9dd022d", 0xa4, 0x7fffffff}, {&(0x7f0000000500)="822171b91eb1498a4740794c5db7bc7a965f6bf8c7cf5baee0946ad2aa4b016a8a03bb30b092e47cd74a4fab60e1d1443c33c80fa2ef7af6514920209443a39077bb6a856f3c3e40bb7182a08692593ab13f04b516500ed3b3256325f48aafef3d8ca84cdce2b0609ed9c6346c356964614f21f9699436b6ca419197a0729a46ae7ae36fd203e577f2b03891ce7ba975aa5d47214e98c73647d20e757d1ce2d1990688090eee936562a1b4968deb59f6a2980feca28742afcaf376ab51294f57d6334c86538795c11e018be19db248ea75e1", 0xd2, 0x10000}, {&(0x7f0000000600)="4a6006458a4a1e3060e4cca0086f3b44f908e6941741cf7422f159df72a1cdb68c01ef3f102d2afb1e3e446c41bef79e359d62ed3155330d3b2f5207705e6dfa86f4f655d80ee44134bb9211fed0be8f7f86ff1f4b5abab22df6a1bfed2d66e51791fcbbf6f6926ce384fda7a7e86c17dcc2b2473f22c6d095ade56596ee656b3c596a038658b30895170a9ab2d4379f4f58cc6e", 0x94, 0x9}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f0000000ac0)={[{@dots}, {@fat=@sys_immutable}, {@nodots}, {@fat=@umask}], [{@measure}, {@appraise}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@seclabel}]}) openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f80)={0x1, &(0x7f0000000f40)=[{0x7f}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000fc0), 0xc, &(0x7f0000000200)={&(0x7f0000003940)=ANY=[@ANYRES64=r7, @ANYRESHEX, @ANYRES32=r6, @ANYRESOCT=r3, @ANYRESOCT=r4, @ANYBLOB="16de71cf0766d82ab6b67f0cd79e8e3ee2643e2e5026c3ea1ccfde1fe0912c50f4450c9c7749b181ae244aa09bb447092b0b62871d5ab9b62bc1121905ff995d268176192bba6bbfe4ff322f3370ce1ac7b5dd004238de507070dc0002cfe8ca03a81158f62018fe98245631fc021061fec067e33a1c01f786dafad477a72fcf767c43d28917995da3bd4df41908d180cd9517f24d97f14674a9a15bb602dca6587204d6571e02a456eb415ea3208e6afe4ed4f3533d7cf074ed4bd702d74e242405fadcd0c73dbb590bb430b54691990800f66109473f3531c01f00"/234], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x40025) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r10, r9, 0x0, 0x100000002) (fail_nth: 3) 10:18:29 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000080000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000480f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) [ 1067.541572][T29959] loop4: detected capacity change from 0 to 512 [ 1067.548647][T29959] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:18:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce000c000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000004000080000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:30 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {}, {r5}, {}, {r5}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {r4}, {}, {0x0, r6}, {r5}, {}, {}, {r5}, {}, {}, {0x0, r6}, {}, {r2, r6}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {}, {r5}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {}, {}, {r4}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {}, {r1}, {0x0, r6}, {r4}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {r5}, {}, {}, {r5}, {r5}, {}, {}, {}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {}, {r5, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5, r6}, {r5}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4, r6}], 0x1, "2156816c73038c"}) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) [ 1067.640998][T29987] loop5: detected capacity change from 0 to 512 [ 1067.666237][T29991] loop4: detected capacity change from 0 to 512 [ 1067.690762][T29991] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1067.701161][T29987] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1067.705843][ C1] sd 0:0:1:0: tag#4969 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1067.711315][T29987] EXT4-fs (loop5): group descriptors corrupted! [ 1067.721122][ C1] sd 0:0:1:0: tag#4969 CDB: opcode=0xe5 (vendor) 10:18:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000200000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1067.733670][ C1] sd 0:0:1:0: tag#4969 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1067.742731][ C1] sd 0:0:1:0: tag#4969 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1067.751759][ C1] sd 0:0:1:0: tag#4969 CDB[20]: ba [ 1067.773875][ C0] sd 0:0:1:0: tag#4970 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1067.775476][T29985] FAULT_INJECTION: forcing a failure. 10:18:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000100002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000200002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1067.775476][T29985] name failslab, interval 1, probability 0, space 0, times 0 [ 1067.783784][ C0] sd 0:0:1:0: tag#4970 CDB: opcode=0xe5 (vendor) [ 1067.783804][ C0] sd 0:0:1:0: tag#4970 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1067.783824][ C0] sd 0:0:1:0: tag#4970 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1067.783840][ C0] sd 0:0:1:0: tag#4970 CDB[20]: ba [ 1067.826336][T29985] CPU: 1 PID: 29985 Comm: syz-executor.1 Not tainted 5.15.0-rc2-syzkaller #0 10:18:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000040200002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000300002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1067.835222][T29985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1067.845279][T29985] Call Trace: [ 1067.848616][T29985] dump_stack_lvl+0xd6/0x122 [ 1067.853207][T29985] dump_stack+0x11/0x1b [ 1067.857367][T29985] should_fail+0x23c/0x250 [ 1067.861774][T29985] __should_failslab+0x81/0x90 [ 1067.866541][T29985] ? __iomap_dio_rw+0x139/0x1010 [ 1067.871649][T29985] should_failslab+0x5/0x20 [ 1067.876189][T29985] kmem_cache_alloc_trace+0x52/0x320 [ 1067.881545][T29985] __iomap_dio_rw+0x139/0x1010 [ 1067.886403][T29985] ? perf_output_begin_forward+0x62d/0x750 [ 1067.892290][T29985] ? __perf_event_header__init_id+0x28b/0x2d0 [ 1067.898348][T29985] iomap_dio_rw+0x30/0x70 [ 1067.902683][T29985] ext4_file_read_iter+0x21a/0x290 [ 1067.907820][T29985] generic_file_splice_read+0x24f/0x330 [ 1067.913340][T29985] ? splice_shrink_spd+0x60/0x60 [ 1067.918334][T29985] splice_direct_to_actor+0x2aa/0x650 [ 1067.923684][T29985] ? do_splice_direct+0x190/0x190 [ 1067.928694][T29985] do_splice_direct+0x106/0x190 [ 1067.933542][T29985] do_sendfile+0x63e/0xbb0 [ 1067.937956][T29985] __x64_sys_sendfile64+0x102/0x140 [ 1067.943173][T29985] do_syscall_64+0x44/0xa0 [ 1067.947582][T29985] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1067.953543][T29985] RIP: 0033:0x7f93f1038709 [ 1067.957943][T29985] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1067.977614][T29985] RSP: 002b:00007f93eedb0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1067.986108][T29985] RAX: ffffffffffffffda RBX: 00007f93f113cf60 RCX: 00007f93f1038709 [ 1067.994057][T29985] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000009 [ 1068.002006][T29985] RBP: 00007f93eedb01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1068.009986][T29985] R10: 0000000100000002 R11: 0000000000000246 R12: 0000000000000001 [ 1068.018365][T29985] R13: 00007ffc9c88ec6f R14: 00007f93eedb0300 R15: 0000000000022000 [ 1068.050233][T29991] loop4: detected capacity change from 0 to 512 [ 1068.059369][T29987] loop5: detected capacity change from 0 to 512 [ 1068.070809][T29987] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1068.080923][T29987] EXT4-fs (loop5): group descriptors corrupted! [ 1068.084796][T30026] loop2: detected capacity change from 0 to 264192 [ 1068.093893][T29991] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1068.122122][T30026] msdos filesystem being mounted at /root/syzkaller-testdir156917949/syzkaller.TDnRSM/2023/file1 supports timestamps until 2107 (0x10391447e) 10:18:30 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {}, {r5}, {}, {r5}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {r4}, {}, {0x0, r6}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {}, {}, {r2, r6}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {}, {r5}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {}, {}, {r4}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {}, {r1}, {0x0, r6}, {r4}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {r5}, {}, {}, {r5}, {r5}, {}, {}, {}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {}, {r5, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5, r6}, {r5}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4, r6}], 0x1, "2156816c73038c"}) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) 10:18:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000400002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:30 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x401, 0x8, &(0x7f00000008c0)=[{0x0}, {0x0, 0x0, 0x9}, {&(0x7f0000000180)="5030a6b9906c95e36ee1b07f9e5698893307dd91cd0319578b614ed5f1873eb0", 0x20, 0xfffffffffffffffd}, {&(0x7f0000000340)="2df6157d4494279dde2031db3b2744b435271e65a343796db3da0bb347a3215e9b71", 0x22, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f5bf3f90b3d3e7d7132c3012ab7043e22a6f8edc5e516ee833a4fdcf825d9da3fed17cac003d9dd022d", 0xa4, 0x7fffffff}, {&(0x7f0000000500)="822171b91eb1498a4740794c5db7bc7a965f6bf8c7cf5baee0946ad2aa4b016a8a03bb30b092e47cd74a4fab60e1d1443c33c80fa2ef7af6514920209443a39077bb6a856f3c3e40bb7182a08692593ab13f04b516500ed3b3256325f48aafef3d8ca84cdce2b0609ed9c6346c356964614f21f9699436b6ca419197a0729a46ae7ae36fd203e577f2b03891ce7ba975aa5d47214e98c73647d20e757d1ce2d1990688090eee936562a1b4968deb59f6a2980feca28742afcaf376ab51294f57d6334c86538795c11e018be19db248ea75e1", 0xd2, 0x10000}, {&(0x7f0000000600)="4a6006458a4a1e3060e4cca0086f3b44f908e6941741cf7422f159df72a1cdb68c01ef3f102d2afb1e3e446c41bef79e359d62ed3155330d3b2f5207705e6dfa86f4f655d80ee44134bb9211fed0be8f7f86ff1f4b5abab22df6a1bfed2d66e51791fcbbf6f6926ce384fda7a7e86c17dcc2b2473f22c6d095ade56596ee656b3c596a038658b30895170a9ab2d4379f4f58cc6e", 0x94, 0x9}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f0000000ac0)={[{@dots}, {@fat=@sys_immutable}, {@nodots}, {@fat=@umask}], [{@measure}, {@appraise}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@seclabel}]}) openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f80)={0x1, &(0x7f0000000f40)=[{0x7f}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000fc0), 0xc, &(0x7f0000000200)={&(0x7f0000003940)=ANY=[@ANYRES64=r7, @ANYRESHEX, @ANYRES32=r6, @ANYRESOCT=r3, @ANYRESOCT=r4, @ANYBLOB="16de71cf0766d82ab6b67f0cd79e8e3ee2643e2e5026c3ea1ccfde1fe0912c50f4450c9c7749b181ae244aa09bb447092b0b62871d5ab9b62bc1121905ff995d268176192bba6bbfe4ff322f3370ce1ac7b5dd004238de507070dc0002cfe8ca03a81158f62018fe98245631fc021061fec067e33a1c01f786dafad477a72fcf767c43d28917995da3bd4df41908d180cd9517f24d97f14674a9a15bb602dca6587204d6571e02a456eb415ea3208e6afe4ed4f3533d7cf074ed4bd702d74e242405fadcd0c73dbb590bb430b54691990800f66109473f3531c01f00"/234], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x40025) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r10, r9, 0x0, 0x100000002) (fail_nth: 4) 10:18:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce000d000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00004c0f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:30 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {}, {r5}, {}, {r5}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {r4}, {}, {0x0, r6}, {r5}, {}, {}, {r5}, {}, {}, {0x0, r6}, {}, {r2, r6}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {}, {r5}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {}, {}, {r4}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {}, {r1}, {0x0, r6}, {r4}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {r5}, {}, {}, {r5}, {r5}, {}, {}, {}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {}, {r5, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5, r6}, {r5}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4, r6}], 0x1, "2156816c73038c"}) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) 10:18:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000500002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1068.367718][T30047] loop4: detected capacity change from 0 to 512 [ 1068.374290][T30048] loop5: detected capacity change from 0 to 512 [ 1068.383541][T30047] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1068.415421][T30048] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1068.425642][T30048] EXT4-fs (loop5): group descriptors corrupted! [ 1068.440300][ C0] sd 0:0:1:0: tag#4961 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1068.450167][ C0] sd 0:0:1:0: tag#4961 CDB: opcode=0xe5 (vendor) [ 1068.456508][ C0] sd 0:0:1:0: tag#4961 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c 10:18:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000600002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1068.465561][ C0] sd 0:0:1:0: tag#4961 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1068.474601][ C0] sd 0:0:1:0: tag#4961 CDB[20]: ba [ 1068.489588][T30062] loop2: detected capacity change from 0 to 264192 [ 1068.496449][T30047] loop4: detected capacity change from 0 to 512 [ 1068.517970][T30045] FAULT_INJECTION: forcing a failure. [ 1068.517970][T30045] name failslab, interval 1, probability 0, space 0, times 0 [ 1068.518351][T30047] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1068.530708][T30045] CPU: 0 PID: 30045 Comm: syz-executor.1 Not tainted 5.15.0-rc2-syzkaller #0 [ 1068.542100][T30062] msdos filesystem being mounted at /root/syzkaller-testdir156917949/syzkaller.TDnRSM/2024/file1 supports timestamps until 2107 (0x10391447e) [ 1068.546570][T30045] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1068.546584][T30045] Call Trace: [ 1068.546591][T30045] dump_stack_lvl+0xd6/0x122 [ 1068.579571][T30045] dump_stack+0x11/0x1b [ 1068.583867][T30045] should_fail+0x23c/0x250 [ 1068.588293][T30045] ? ext4_init_io_end+0x2d/0xa0 [ 1068.593215][T30045] __should_failslab+0x81/0x90 [ 1068.598051][T30045] should_failslab+0x5/0x20 [ 1068.602573][T30045] kmem_cache_alloc+0x4f/0x300 [ 1068.607466][T30045] ext4_init_io_end+0x2d/0xa0 [ 1068.612671][T30045] ext4_writepages+0x6e5/0x1d70 [ 1068.617535][T30045] ? put_dec_trunc8+0x10e/0x130 [ 1068.622467][T30045] ? sysvec_apic_timer_interrupt+0x3e/0x80 [ 1068.628273][T30045] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1068.634431][T30045] ? should_fail+0x2a/0x250 [ 1068.638937][T30045] ? should_fail+0x2a/0x250 [ 1068.643474][T30045] ? sysvec_apic_timer_interrupt+0x3e/0x80 [ 1068.649447][T30045] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1068.655926][T30045] ? ext4_readpage+0x140/0x140 [ 1068.660691][T30045] do_writepages+0x26b/0x3c0 [ 1068.665487][T30045] ? kcsan_begin_scoped_access+0xc0/0xc0 [ 1068.671121][T30045] ? should_fail+0xd6/0x250 [ 1068.675657][T30045] filemap_write_and_wait_range+0x238/0x3c0 [ 1068.682083][T30045] __iomap_dio_rw+0x4ca/0x1010 [ 1068.686856][T30045] iomap_dio_rw+0x30/0x70 [ 1068.691257][T30045] ext4_file_read_iter+0x21a/0x290 [ 1068.696589][T30045] generic_file_splice_read+0x24f/0x330 [ 1068.702132][T30045] ? splice_shrink_spd+0x60/0x60 [ 1068.707068][T30045] splice_direct_to_actor+0x2aa/0x650 [ 1068.712723][T30045] ? do_splice_direct+0x190/0x190 [ 1068.717743][T30045] do_splice_direct+0x106/0x190 [ 1068.722614][T30045] do_sendfile+0x63e/0xbb0 [ 1068.727119][T30045] __x64_sys_sendfile64+0x102/0x140 [ 1068.732351][T30045] do_syscall_64+0x44/0xa0 [ 1068.736774][T30045] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1068.742792][T30045] RIP: 0033:0x7f93f1038709 [ 1068.747217][T30045] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 10:18:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce000e000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) [ 1068.766998][T30045] RSP: 002b:00007f93eedb0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1068.775513][T30045] RAX: ffffffffffffffda RBX: 00007f93f113cf60 RCX: 00007f93f1038709 [ 1068.783485][T30045] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000009 [ 1068.791453][T30045] RBP: 00007f93eedb01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1068.799423][T30045] R10: 0000000100000002 R11: 0000000000000246 R12: 0000000000000001 [ 1068.807391][T30045] R13: 00007ffc9c88ec6f R14: 00007f93eedb0300 R15: 0000000000022000 [ 1068.824307][T30048] loop5: detected capacity change from 0 to 512 [ 1068.850343][T30048] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1068.860456][T30048] EXT4-fs (loop5): group descriptors corrupted! 10:18:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000040600002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1068.873600][T30085] loop4: detected capacity change from 0 to 512 10:18:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000600f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000700002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1068.902407][T30085] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1068.968324][T30096] loop5: detected capacity change from 0 to 512 [ 1068.988198][T30085] loop4: detected capacity change from 0 to 512 [ 1068.994830][T30096] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1069.004946][T30096] EXT4-fs (loop5): group descriptors corrupted! [ 1069.011470][T30085] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1069.059636][T30096] loop5: detected capacity change from 0 to 512 [ 1069.069773][T30096] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1069.079880][T30096] EXT4-fs (loop5): group descriptors corrupted! 10:18:31 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {}, {r5}, {r5}, {r5}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {r4}, {}, {0x0, r6}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {0x0, r6}, {}, {r2, r6}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {}, {r5}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {}, {}, {r4}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {}, {r1}, {0x0, r6}, {r4}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {r5}, {}, {}, {r5}, {r5}, {}, {}, {}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {}, {r5, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5, r6}, {r5}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4, r6}], 0x1, "2156816c73038c"}) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, 0x0, 0x8400fffffffa) (fail_nth: 1) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) 10:18:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000800002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1069.251173][T30119] FAULT_INJECTION: forcing a failure. [ 1069.251173][T30119] name failslab, interval 1, probability 0, space 0, times 0 [ 1069.264094][T30119] CPU: 1 PID: 30119 Comm: syz-executor.3 Not tainted 5.15.0-rc2-syzkaller #0 [ 1069.272984][T30119] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1069.283190][T30119] Call Trace: [ 1069.286464][T30119] dump_stack_lvl+0xd6/0x122 [ 1069.291051][T30119] dump_stack+0x11/0x1b [ 1069.295219][T30119] should_fail+0x23c/0x250 [ 1069.299631][T30119] __should_failslab+0x81/0x90 [ 1069.304403][T30119] ? alloc_pipe_info+0xac/0x350 [ 1069.309260][T30119] should_failslab+0x5/0x20 [ 1069.313762][T30119] kmem_cache_alloc_trace+0x52/0x320 [ 1069.319045][T30119] alloc_pipe_info+0xac/0x350 [ 1069.323761][T30119] splice_direct_to_actor+0x5f7/0x650 [ 1069.329220][T30119] ? security_file_permission+0x7c/0xa0 [ 1069.334794][T30119] ? do_splice_direct+0x190/0x190 [ 1069.339796][T30119] ? security_file_permission+0x87/0xa0 [ 1069.345333][T30119] do_splice_direct+0x106/0x190 [ 1069.350173][T30119] do_sendfile+0x63e/0xbb0 [ 1069.354628][T30119] __x64_sys_sendfile64+0x102/0x140 [ 1069.359811][T30119] do_syscall_64+0x44/0xa0 [ 1069.364245][T30119] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1069.370123][T30119] RIP: 0033:0x7f309bcd8709 [ 1069.374522][T30119] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 10:18:31 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x401, 0x8, &(0x7f00000008c0)=[{0x0}, {0x0, 0x0, 0x9}, {&(0x7f0000000180)="5030a6b9906c95e36ee1b07f9e5698893307dd91cd0319578b614ed5f1873eb0", 0x20, 0xfffffffffffffffd}, {&(0x7f0000000340)="2df6157d4494279dde2031db3b2744b435271e65a343796db3da0bb347a3215e9b71", 0x22, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f5bf3f90b3d3e7d7132c3012ab7043e22a6f8edc5e516ee833a4fdcf825d9da3fed17cac003d9dd022d", 0xa4, 0x7fffffff}, {&(0x7f0000000500)="822171b91eb1498a4740794c5db7bc7a965f6bf8c7cf5baee0946ad2aa4b016a8a03bb30b092e47cd74a4fab60e1d1443c33c80fa2ef7af6514920209443a39077bb6a856f3c3e40bb7182a08692593ab13f04b516500ed3b3256325f48aafef3d8ca84cdce2b0609ed9c6346c356964614f21f9699436b6ca419197a0729a46ae7ae36fd203e577f2b03891ce7ba975aa5d47214e98c73647d20e757d1ce2d1990688090eee936562a1b4968deb59f6a2980feca28742afcaf376ab51294f57d6334c86538795c11e018be19db248ea75e1", 0xd2, 0x10000}, {&(0x7f0000000600)="4a6006458a4a1e3060e4cca0086f3b44f908e6941741cf7422f159df72a1cdb68c01ef3f102d2afb1e3e446c41bef79e359d62ed3155330d3b2f5207705e6dfa86f4f655d80ee44134bb9211fed0be8f7f86ff1f4b5abab22df6a1bfed2d66e51791fcbbf6f6926ce384fda7a7e86c17dcc2b2473f22c6d095ade56596ee656b3c596a038658b30895170a9ab2d4379f4f58cc6e", 0x94, 0x9}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f0000000ac0)={[{@dots}, {@fat=@sys_immutable}, {@nodots}, {@fat=@umask}], [{@measure}, {@appraise}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@seclabel}]}) openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f80)={0x1, &(0x7f0000000f40)=[{0x7f}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000fc0), 0xc, &(0x7f0000000200)={&(0x7f0000003940)=ANY=[@ANYRES64=r7, @ANYRESHEX, @ANYRES32=r6, @ANYRESOCT=r3, @ANYRESOCT=r4, @ANYBLOB="16de71cf0766d82ab6b67f0cd79e8e3ee2643e2e5026c3ea1ccfde1fe0912c50f4450c9c7749b181ae244aa09bb447092b0b62871d5ab9b62bc1121905ff995d268176192bba6bbfe4ff322f3370ce1ac7b5dd004238de507070dc0002cfe8ca03a81158f62018fe98245631fc021061fec067e33a1c01f786dafad477a72fcf767c43d28917995da3bd4df41908d180cd9517f24d97f14674a9a15bb602dca6587204d6571e02a456eb415ea3208e6afe4ed4f3533d7cf074ed4bd702d74e242405fadcd0c73dbb590bb430b54691990800f66109473f3531c01f00"/234], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x40025) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r10, r9, 0x0, 0x100000002) 10:18:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce000f000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000680f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000001800002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:31 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {}, {r5}, {}, {r5}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {r4}, {}, {0x0, r6}, {r5}, {}, {}, {r5}, {}, {}, {0x0, r6}, {}, {r2, r6}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {}, {r5}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {}, {}, {r4}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {}, {r1}, {0x0, r6}, {r4}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {r5}, {}, {}, {r5}, {r5}, {}, {}, {}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {}, {r5, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5, r6}, {r5}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4, r6}], 0x1, "2156816c73038c"}) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) 10:18:31 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {}, {r5}, {r5}, {r5}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {r4}, {}, {0x0, r6}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {0x0, r6}, {}, {r2, r6}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {}, {r5}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {}, {}, {r4}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {}, {r1}, {0x0, r6}, {r4}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {r5}, {}, {}, {r5}, {r5}, {}, {}, {}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {}, {r5, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5, r6}, {r5}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4, r6}], 0x1, "2156816c73038c"}) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, 0x0, 0x8400fffffffa) (fail_nth: 2) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) [ 1069.394304][T30119] RSP: 002b:00007f3099a50188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1069.402763][T30119] RAX: ffffffffffffffda RBX: 00007f309bddcf60 RCX: 00007f309bcd8709 [ 1069.410713][T30119] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000003 [ 1069.418668][T30119] RBP: 00007f3099a501d0 R08: 0000000000000000 R09: 0000000000000000 [ 1069.426631][T30119] R10: 00008400fffffffa R11: 0000000000000246 R12: 0000000000000001 [ 1069.434580][T30119] R13: 00007ffe0e04899f R14: 00007f3099a50300 R15: 0000000000022000 [ 1069.484822][T30128] FAULT_INJECTION: forcing a failure. [ 1069.484822][T30128] name failslab, interval 1, probability 0, space 0, times 0 [ 1069.487813][T30127] loop5: detected capacity change from 0 to 512 [ 1069.497699][T30128] CPU: 1 PID: 30128 Comm: syz-executor.3 Not tainted 5.15.0-rc2-syzkaller #0 [ 1069.512598][T30128] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1069.521026][T30130] loop4: detected capacity change from 0 to 512 [ 1069.522665][T30128] Call Trace: [ 1069.522674][T30128] dump_stack_lvl+0xd6/0x122 [ 1069.536745][T30128] dump_stack+0x11/0x1b [ 1069.541032][T30128] should_fail+0x23c/0x250 [ 1069.545446][T30128] ? kcalloc+0x32/0x40 [ 1069.549712][T30128] __should_failslab+0x81/0x90 [ 1069.554474][T30128] should_failslab+0x5/0x20 [ 1069.558993][T30128] __kmalloc+0x6f/0x350 [ 1069.563190][T30128] ? alloc_pipe_info+0xac/0x350 [ 1069.568037][T30128] kcalloc+0x32/0x40 [ 1069.571918][T30128] alloc_pipe_info+0x1be/0x350 [ 1069.576665][T30128] splice_direct_to_actor+0x5f7/0x650 [ 1069.582084][T30128] ? security_file_permission+0x7c/0xa0 [ 1069.587801][T30128] ? do_splice_direct+0x190/0x190 [ 1069.592847][T30128] ? security_file_permission+0x87/0xa0 [ 1069.598410][T30128] do_splice_direct+0x106/0x190 [ 1069.603244][T30128] do_sendfile+0x63e/0xbb0 [ 1069.607739][T30128] __x64_sys_sendfile64+0x102/0x140 [ 1069.613533][T30128] do_syscall_64+0x44/0xa0 [ 1069.617942][T30128] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1069.623841][T30128] RIP: 0033:0x7f309bcd8709 [ 1069.628236][T30128] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1069.647926][T30128] RSP: 002b:00007f3099a50188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1069.656333][T30128] RAX: ffffffffffffffda RBX: 00007f309bddcf60 RCX: 00007f309bcd8709 [ 1069.664289][T30128] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000003 [ 1069.672331][T30128] RBP: 00007f3099a501d0 R08: 0000000000000000 R09: 0000000000000000 [ 1069.680283][T30128] R10: 00008400fffffffa R11: 0000000000000246 R12: 0000000000000001 [ 1069.688334][T30128] R13: 00007ffe0e04899f R14: 00007f3099a50300 R15: 0000000000022000 10:18:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000001c00002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:32 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {}, {r5}, {r5}, {r5}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {r4}, {}, {0x0, r6}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {0x0, r6}, {}, {r2, r6}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {}, {r5}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {}, {}, {r4}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {}, {r1}, {0x0, r6}, {r4}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {r5}, {}, {}, {r5}, {r5}, {}, {}, {}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {}, {r5, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5, r6}, {r5}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4, r6}], 0x1, "2156816c73038c"}) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, 0x0, 0x8400fffffffa) (fail_nth: 3) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) [ 1069.729300][T30127] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1069.730210][T30140] loop2: detected capacity change from 0 to 264192 [ 1069.739428][T30127] EXT4-fs (loop5): group descriptors corrupted! [ 1069.760840][T30140] msdos filesystem being mounted at /root/syzkaller-testdir156917949/syzkaller.TDnRSM/2025/file1 supports timestamps until 2107 (0x10391447e) [ 1069.780952][T30130] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1069.802940][T30149] FAULT_INJECTION: forcing a failure. [ 1069.802940][T30149] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1069.816352][T30149] CPU: 0 PID: 30149 Comm: syz-executor.3 Not tainted 5.15.0-rc2-syzkaller #0 [ 1069.825120][T30149] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1069.828758][ C1] sd 0:0:1:0: tag#4964 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1069.835264][T30149] Call Trace: [ 1069.835272][T30149] dump_stack_lvl+0xd6/0x122 [ 1069.845153][ C1] sd 0:0:1:0: tag#4964 CDB: opcode=0xe5 (vendor) [ 1069.848395][T30149] dump_stack+0x11/0x1b [ 1069.852987][ C1] sd 0:0:1:0: tag#4964 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1069.859266][T30149] should_fail+0x23c/0x250 [ 1069.863437][ C1] sd 0:0:1:0: tag#4964 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1069.872420][T30149] __alloc_pages+0x102/0x320 [ 1069.876823][ C1] sd 0:0:1:0: tag#4964 CDB[20]: ba [ 1069.885812][T30149] alloc_pages+0x382/0x3d0 [ 1069.899864][T30149] __page_cache_alloc+0x4d/0xf0 [ 1069.904795][T30149] page_cache_ra_unbounded+0x1be/0x430 [ 1069.910258][T30149] ondemand_readahead+0x58c/0x7c0 [ 1069.915381][T30149] ? filemap_get_read_batch+0x3e2/0x410 [ 1069.920939][T30149] page_cache_sync_ra+0xaf/0xe0 [ 1069.925840][T30149] filemap_read+0x3ad/0x1220 [ 1069.930521][T30149] generic_file_read_iter+0x75/0x2c0 [ 1069.935817][T30149] ? __fsnotify_parent+0x340/0x440 [ 1069.940932][T30149] ext4_file_read_iter+0x1db/0x290 [ 1069.946401][T30149] generic_file_splice_read+0x24f/0x330 [ 1069.952024][T30149] ? splice_shrink_spd+0x60/0x60 [ 1069.957120][T30149] splice_direct_to_actor+0x2aa/0x650 [ 1069.962496][T30149] ? do_splice_direct+0x190/0x190 [ 1069.967571][T30149] do_splice_direct+0x106/0x190 [ 1069.972492][T30149] do_sendfile+0x63e/0xbb0 [ 1069.976919][T30149] __x64_sys_sendfile64+0x102/0x140 [ 1069.982156][T30149] do_syscall_64+0x44/0xa0 [ 1069.986580][T30149] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1069.992516][T30149] RIP: 0033:0x7f309bcd8709 [ 1069.996996][T30149] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1070.016634][T30149] RSP: 002b:00007f3099a50188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 10:18:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000002600002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1070.025140][T30149] RAX: ffffffffffffffda RBX: 00007f309bddcf60 RCX: 00007f309bcd8709 [ 1070.033148][T30149] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000003 [ 1070.041128][T30149] RBP: 00007f3099a501d0 R08: 0000000000000000 R09: 0000000000000000 [ 1070.049529][T30149] R10: 00008400fffffffa R11: 0000000000000246 R12: 0000000000000001 [ 1070.057628][T30149] R13: 00007ffe0e04899f R14: 00007f3099a50300 R15: 0000000000022000 [ 1070.071227][T30130] loop4: detected capacity change from 0 to 512 10:18:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000052b00002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1070.083830][T30127] loop5: detected capacity change from 0 to 512 [ 1070.112440][T30130] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1070.120290][T30127] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! 10:18:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000003f00002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce0410000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) [ 1070.130565][T30127] EXT4-fs (loop5): group descriptors corrupted! [ 1070.199121][T30177] loop4: detected capacity change from 0 to 512 [ 1070.222774][T30177] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1070.277514][T30177] loop4: detected capacity change from 0 to 512 [ 1070.292133][T30177] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:18:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00006c0f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce2010000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000004000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:32 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x401, 0x8, &(0x7f00000008c0)=[{0x0}, {0x0, 0x0, 0x9}, {&(0x7f0000000180)="5030a6b9906c95e36ee1b07f9e5698893307dd91cd0319578b614ed5f1873eb0", 0x20, 0xfffffffffffffffd}, {&(0x7f0000000340)="2df6157d4494279dde2031db3b2744b435271e65a343796db3da0bb347a3215e9b71", 0x22, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f5bf3f90b3d3e7d7132c3012ab7043e22a6f8edc5e516ee833a4fdcf825d9da3fed17cac003d9dd022d", 0xa4, 0x7fffffff}, {&(0x7f0000000500)="822171b91eb1498a4740794c5db7bc7a965f6bf8c7cf5baee0946ad2aa4b016a8a03bb30b092e47cd74a4fab60e1d1443c33c80fa2ef7af6514920209443a39077bb6a856f3c3e40bb7182a08692593ab13f04b516500ed3b3256325f48aafef3d8ca84cdce2b0609ed9c6346c356964614f21f9699436b6ca419197a0729a46ae7ae36fd203e577f2b03891ce7ba975aa5d47214e98c73647d20e757d1ce2d1990688090eee936562a1b4968deb59f6a2980feca28742afcaf376ab51294f57d6334c86538795c11e018be19db248ea75e1", 0xd2, 0x10000}, {&(0x7f0000000600)="4a6006458a4a1e3060e4cca0086f3b44f908e6941741cf7422f159df72a1cdb68c01ef3f102d2afb1e3e446c41bef79e359d62ed3155330d3b2f5207705e6dfa86f4f655d80ee44134bb9211fed0be8f7f86ff1f4b5abab22df6a1bfed2d66e51791fcbbf6f6926ce384fda7a7e86c17dcc2b2473f22c6d095ade56596ee656b3c596a038658b30895170a9ab2d4379f4f58cc6e", 0x94, 0x9}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f0000000ac0)={[{@dots}, {@fat=@sys_immutable}, {@nodots}, {@fat=@umask}], [{@measure}, {@appraise}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@seclabel}]}) openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f80)={0x1, &(0x7f0000000f40)=[{0x7f}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000fc0), 0xc, &(0x7f0000000200)={&(0x7f0000003940)=ANY=[@ANYRES64=r7, @ANYRESHEX, @ANYRES32=r6, @ANYRESOCT=r3, @ANYRESOCT=r4, @ANYBLOB="16de71cf0766d82ab6b67f0cd79e8e3ee2643e2e5026c3ea1ccfde1fe0912c50f4450c9c7749b181ae244aa09bb447092b0b62871d5ab9b62bc1121905ff995d268176192bba6bbfe4ff322f3370ce1ac7b5dd004238de507070dc0002cfe8ca03a81158f62018fe98245631fc021061fec067e33a1c01f786dafad477a72fcf767c43d28917995da3bd4df41908d180cd9517f24d97f14674a9a15bb602dca6587204d6571e02a456eb415ea3208e6afe4ed4f3533d7cf074ed4bd702d74e242405fadcd0c73dbb590bb430b54691990800f66109473f3531c01f00"/234], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x40025) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r10, r9, 0x0, 0x7ffff000) [ 1070.394245][T30193] loop5: detected capacity change from 0 to 512 [ 1070.423925][T30199] loop4: detected capacity change from 0 to 512 [ 1070.433306][T30193] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1070.443450][T30193] EXT4-fs (loop5): group descriptors corrupted! [ 1070.465673][T30199] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1070.496352][ C0] sd 0:0:1:0: tag#4955 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1070.506248][ C0] sd 0:0:1:0: tag#4955 CDB: opcode=0xe5 (vendor) 10:18:32 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {}, {r5}, {}, {r5}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {r4}, {}, {0x0, r6}, {r5}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r2, r6}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {}, {r5}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {}, {}, {r4}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {}, {r1}, {0x0, r6}, {r4}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {r5}, {}, {}, {r5}, {r5}, {}, {}, {}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {}, {r5, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5, r6}, {r5}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4, r6}], 0x1, "2156816c73038c"}) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) 10:18:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000008004000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1070.512613][ C0] sd 0:0:1:0: tag#4955 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1070.521656][ C0] sd 0:0:1:0: tag#4955 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1070.530735][ C0] sd 0:0:1:0: tag#4955 CDB[20]: ba 10:18:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000048000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1070.573226][T30193] loop5: detected capacity change from 0 to 512 [ 1070.580053][T30199] loop4: detected capacity change from 0 to 512 [ 1070.597375][T30199] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1070.605489][T30193] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1070.615724][T30193] EXT4-fs (loop5): group descriptors corrupted! 10:18:33 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {}, {r5}, {r5}, {r5}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {r4}, {}, {0x0, r6}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {0x0, r6}, {}, {r2, r6}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {}, {r5}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {}, {}, {r4}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {}, {r1}, {0x0, r6}, {r4}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {r5}, {}, {}, {r5}, {r5}, {}, {}, {}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {}, {r5, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5, r6}, {r5}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4, r6}], 0x1, "2156816c73038c"}) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) 10:18:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce0011000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:33 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000000fffffff600002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1070.674285][T30229] loop2: detected capacity change from 0 to 264192 [ 1070.717817][T30229] msdos filesystem being mounted at /root/syzkaller-testdir156917949/syzkaller.TDnRSM/2026/file1 supports timestamps until 2107 (0x10391447e) [ 1070.744276][T30239] loop4: detected capacity change from 0 to 512 10:18:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000740f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:33 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000000fffffffe00002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1070.765204][T30239] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:18:33 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000000f6ffffff00002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1070.833782][T30248] loop5: detected capacity change from 0 to 512 [ 1070.845298][T30239] loop4: detected capacity change from 0 to 512 [ 1070.868861][T30239] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:18:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce0012000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) [ 1070.895243][T30248] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1070.905375][T30248] EXT4-fs (loop5): group descriptors corrupted! 10:18:33 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000000feffffff00002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:33 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x401, 0x8, &(0x7f00000008c0)=[{0x0}, {0x0, 0x0, 0x9}, {&(0x7f0000000180)="5030a6b9906c95e36ee1b07f9e5698893307dd91cd0319578b614ed5f1873eb0", 0x20, 0xfffffffffffffffd}, {&(0x7f0000000340)="2df6157d4494279dde2031db3b2744b435271e65a343796db3da0bb347a3215e9b71", 0x22, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f5bf3f90b3d3e7d7132c3012ab7043e22a6f8edc5e516ee833a4fdcf825d9da3fed17cac003d9dd022d", 0xa4, 0x7fffffff}, {&(0x7f0000000500)="822171b91eb1498a4740794c5db7bc7a965f6bf8c7cf5baee0946ad2aa4b016a8a03bb30b092e47cd74a4fab60e1d1443c33c80fa2ef7af6514920209443a39077bb6a856f3c3e40bb7182a08692593ab13f04b516500ed3b3256325f48aafef3d8ca84cdce2b0609ed9c6346c356964614f21f9699436b6ca419197a0729a46ae7ae36fd203e577f2b03891ce7ba975aa5d47214e98c73647d20e757d1ce2d1990688090eee936562a1b4968deb59f6a2980feca28742afcaf376ab51294f57d6334c86538795c11e018be19db248ea75e1", 0xd2, 0x10000}, {&(0x7f0000000600)="4a6006458a4a1e3060e4cca0086f3b44f908e6941741cf7422f159df72a1cdb68c01ef3f102d2afb1e3e446c41bef79e359d62ed3155330d3b2f5207705e6dfa86f4f655d80ee44134bb9211fed0be8f7f86ff1f4b5abab22df6a1bfed2d66e51791fcbbf6f6926ce384fda7a7e86c17dcc2b2473f22c6d095ade56596ee656b3c596a038658b30895170a9ab2d4379f4f58cc6e", 0x94, 0x9}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f0000000ac0)={[{@dots}, {@fat=@sys_immutable}, {@nodots}, {@fat=@umask}], [{@measure}, {@appraise}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@seclabel}]}) openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f80)={0x1, &(0x7f0000000f40)=[{0x7f}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000fc0), 0xc, &(0x7f0000000200)={&(0x7f0000003940)=ANY=[@ANYRES64=r7, @ANYRESHEX, @ANYRES32=r6, @ANYRESOCT=r3, @ANYRESOCT=r4, @ANYBLOB="16de71cf0766d82ab6b67f0cd79e8e3ee2643e2e5026c3ea1ccfde1fe0912c50f4450c9c7749b181ae244aa09bb447092b0b62871d5ab9b62bc1121905ff995d268176192bba6bbfe4ff322f3370ce1ac7b5dd004238de507070dc0002cfe8ca03a81158f62018fe98245631fc021061fec067e33a1c01f786dafad477a72fcf767c43d28917995da3bd4df41908d180cd9517f24d97f14674a9a15bb602dca6587204d6571e02a456eb415ea3208e6afe4ed4f3533d7cf074ed4bd702d74e242405fadcd0c73dbb590bb430b54691990800f66109473f3531c01f00"/234], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x40025) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r10, r9, 0x0, 0x100000003) [ 1070.982349][T30267] loop4: detected capacity change from 0 to 512 [ 1070.996381][T30248] loop5: detected capacity change from 0 to 512 [ 1071.007658][T30248] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1071.017772][T30248] EXT4-fs (loop5): group descriptors corrupted! [ 1071.024311][T30267] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:18:33 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {}, {r5}, {}, {r5}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {r4}, {}, {0x0, r6}, {r5}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r2, r6}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {}, {r5}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {}, {}, {r4}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {}, {r1}, {0x0, r6}, {r4}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {r5}, {}, {}, {r5}, {r5}, {}, {}, {}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {}, {r5, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5, r6}, {r5}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4, r6}], 0x1, "2156816c73038c"}) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) 10:18:33 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000002000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00007a0f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) [ 1071.143573][ C1] sd 0:0:1:0: tag#4946 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1071.153702][ C1] sd 0:0:1:0: tag#4946 CDB: opcode=0xe5 (vendor) [ 1071.160049][ C1] sd 0:0:1:0: tag#4946 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1071.169226][ C1] sd 0:0:1:0: tag#4946 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1071.178258][ C1] sd 0:0:1:0: tag#4946 CDB[20]: ba [ 1071.223285][T30290] loop5: detected capacity change from 0 to 512 [ 1071.253951][T30290] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1071.264234][T30290] EXT4-fs (loop5): group descriptors corrupted! [ 1071.293352][T30301] loop2: detected capacity change from 0 to 264192 [ 1071.310106][T30290] loop5: detected capacity change from 0 to 512 [ 1071.325765][T30290] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1071.335885][T30290] EXT4-fs (loop5): group descriptors corrupted! [ 1071.365600][T30301] msdos filesystem being mounted at /root/syzkaller-testdir156917949/syzkaller.TDnRSM/2027/file1 supports timestamps until 2107 (0x10391447e) 10:18:33 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {}, {r5}, {r5}, {r5}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {r4}, {}, {0x0, r6}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {0x0, r6}, {}, {r2, r6}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {}, {r5}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {}, {}, {r4}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {}, {r1}, {0x0, r6}, {r4}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {r5}, {}, {}, {r5}, {r5}, {}, {}, {}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {}, {r5, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5, r6}, {r5}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4, r6}], 0x1, "2156816c73038c"}) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, 0x0, 0x7ffff000) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) 10:18:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce0014000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:33 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000003000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000fe0f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) [ 1071.633674][T30324] loop4: detected capacity change from 0 to 512 [ 1071.637406][T30322] loop5: detected capacity change from 0 to 512 [ 1071.664075][T30324] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1071.673060][T30322] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! 10:18:34 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000004000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:34 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x401, 0x8, &(0x7f00000008c0)=[{0x0}, {0x0, 0x0, 0x9}, {&(0x7f0000000180)="5030a6b9906c95e36ee1b07f9e5698893307dd91cd0319578b614ed5f1873eb0", 0x20, 0xfffffffffffffffd}, {&(0x7f0000000340)="2df6157d4494279dde2031db3b2744b435271e65a343796db3da0bb347a3215e9b71", 0x22, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f5bf3f90b3d3e7d7132c3012ab7043e22a6f8edc5e516ee833a4fdcf825d9da3fed17cac003d9dd022d", 0xa4, 0x7fffffff}, {&(0x7f0000000500)="822171b91eb1498a4740794c5db7bc7a965f6bf8c7cf5baee0946ad2aa4b016a8a03bb30b092e47cd74a4fab60e1d1443c33c80fa2ef7af6514920209443a39077bb6a856f3c3e40bb7182a08692593ab13f04b516500ed3b3256325f48aafef3d8ca84cdce2b0609ed9c6346c356964614f21f9699436b6ca419197a0729a46ae7ae36fd203e577f2b03891ce7ba975aa5d47214e98c73647d20e757d1ce2d1990688090eee936562a1b4968deb59f6a2980feca28742afcaf376ab51294f57d6334c86538795c11e018be19db248ea75e1", 0xd2, 0x10000}, {&(0x7f0000000600)="4a6006458a4a1e3060e4cca0086f3b44f908e6941741cf7422f159df72a1cdb68c01ef3f102d2afb1e3e446c41bef79e359d62ed3155330d3b2f5207705e6dfa86f4f655d80ee44134bb9211fed0be8f7f86ff1f4b5abab22df6a1bfed2d66e51791fcbbf6f6926ce384fda7a7e86c17dcc2b2473f22c6d095ade56596ee656b3c596a038658b30895170a9ab2d4379f4f58cc6e", 0x94, 0x9}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f0000000ac0)={[{@dots}, {@fat=@sys_immutable}, {@nodots}, {@fat=@umask}], [{@measure}, {@appraise}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@seclabel}]}) openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f80)={0x1, &(0x7f0000000f40)=[{0x7f}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000fc0), 0xc, &(0x7f0000000200)={&(0x7f0000003940)=ANY=[@ANYRES64=r7, @ANYRESHEX, @ANYRES32=r6, @ANYRESOCT=r3, @ANYRESOCT=r4, @ANYBLOB="16de71cf0766d82ab6b67f0cd79e8e3ee2643e2e5026c3ea1ccfde1fe0912c50f4450c9c7749b181ae244aa09bb447092b0b62871d5ab9b62bc1121905ff995d268176192bba6bbfe4ff322f3370ce1ac7b5dd004238de507070dc0002cfe8ca03a81158f62018fe98245631fc021061fec067e33a1c01f786dafad477a72fcf767c43d28917995da3bd4df41908d180cd9517f24d97f14674a9a15bb602dca6587204d6571e02a456eb415ea3208e6afe4ed4f3533d7cf074ed4bd702d74e242405fadcd0c73dbb590bb430b54691990800f66109473f3531c01f00"/234], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x40025) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r10, r9, 0x0, 0x100000004) 10:18:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce0020000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) [ 1071.683257][T30322] EXT4-fs (loop5): group descriptors corrupted! 10:18:34 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000005000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1071.762556][T30341] loop4: detected capacity change from 0 to 512 [ 1071.794887][T30322] loop5: detected capacity change from 0 to 512 [ 1071.806151][T30322] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1071.806852][T30341] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1071.816294][T30322] EXT4-fs (loop5): group descriptors corrupted! [ 1071.832681][ C0] sd 0:0:1:0: tag#4949 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1071.842549][ C0] sd 0:0:1:0: tag#4949 CDB: opcode=0xe5 (vendor) [ 1071.849099][ C0] sd 0:0:1:0: tag#4949 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c 10:18:34 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000006000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1071.858144][ C0] sd 0:0:1:0: tag#4949 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1071.867172][ C0] sd 0:0:1:0: tag#4949 CDB[20]: ba [ 1071.915919][T30341] loop4: detected capacity change from 0 to 512 [ 1071.940663][T30341] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:18:34 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {}, {r5}, {}, {r5}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {r4}, {}, {0x0, r6}, {r5}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r2, r6}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {}, {r5}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {}, {}, {r4}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {}, {r1}, {0x0, r6}, {r4}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {r5}, {}, {}, {r5}, {r5}, {}, {}, {}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {}, {r5, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5, r6}, {r5}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4, r6}], 0x1, "2156816c73038c"}) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) 10:18:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00000011000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:34 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000007000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1072.148913][T30374] loop5: detected capacity change from 0 to 512 [ 1072.173766][T30374] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1072.183907][T30374] EXT4-fs (loop5): group descriptors corrupted! [ 1072.200602][T30383] loop2: detected capacity change from 0 to 264192 [ 1072.211519][T30383] msdos filesystem being mounted at /root/syzkaller-testdir156917949/syzkaller.TDnRSM/2028/file1 supports timestamps until 2107 (0x10391447e) [ 1072.235817][T30374] loop5: detected capacity change from 0 to 512 [ 1072.247242][T30374] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1072.257355][T30374] EXT4-fs (loop5): group descriptors corrupted! 10:18:34 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {}, {r5}, {r5}, {r5}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {r4}, {}, {0x0, r6}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {0x0, r6}, {}, {r2, r6}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {}, {r5}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {}, {}, {r4}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {}, {r1}, {0x0, r6}, {r4}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {r5}, {}, {}, {r5}, {r5}, {}, {}, {}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {}, {r5, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5, r6}, {r5}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4, r6}], 0x1, "2156816c73038c"}) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, 0x0, 0xffffffffffffffff) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) 10:18:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce1020000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:34 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x401, 0x8, &(0x7f00000008c0)=[{0x0}, {0x0, 0x0, 0x9}, {&(0x7f0000000180)="5030a6b9906c95e36ee1b07f9e5698893307dd91cd0319578b614ed5f1873eb0", 0x20, 0xfffffffffffffffd}, {&(0x7f0000000340)="2df6157d4494279dde2031db3b2744b435271e65a343796db3da0bb347a3215e9b71", 0x22, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f5bf3f90b3d3e7d7132c3012ab7043e22a6f8edc5e516ee833a4fdcf825d9da3fed17cac003d9dd022d", 0xa4, 0x7fffffff}, {&(0x7f0000000500)="822171b91eb1498a4740794c5db7bc7a965f6bf8c7cf5baee0946ad2aa4b016a8a03bb30b092e47cd74a4fab60e1d1443c33c80fa2ef7af6514920209443a39077bb6a856f3c3e40bb7182a08692593ab13f04b516500ed3b3256325f48aafef3d8ca84cdce2b0609ed9c6346c356964614f21f9699436b6ca419197a0729a46ae7ae36fd203e577f2b03891ce7ba975aa5d47214e98c73647d20e757d1ce2d1990688090eee936562a1b4968deb59f6a2980feca28742afcaf376ab51294f57d6334c86538795c11e018be19db248ea75e1", 0xd2, 0x10000}, {&(0x7f0000000600)="4a6006458a4a1e3060e4cca0086f3b44f908e6941741cf7422f159df72a1cdb68c01ef3f102d2afb1e3e446c41bef79e359d62ed3155330d3b2f5207705e6dfa86f4f655d80ee44134bb9211fed0be8f7f86ff1f4b5abab22df6a1bfed2d66e51791fcbbf6f6926ce384fda7a7e86c17dcc2b2473f22c6d095ade56596ee656b3c596a038658b30895170a9ab2d4379f4f58cc6e", 0x94, 0x9}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f0000000ac0)={[{@dots}, {@fat=@sys_immutable}, {@nodots}, {@fat=@umask}], [{@measure}, {@appraise}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@seclabel}]}) openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f80)={0x1, &(0x7f0000000f40)=[{0x7f}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000fc0), 0xc, &(0x7f0000000200)={&(0x7f0000003940)=ANY=[@ANYRES64=r7, @ANYRESHEX, @ANYRES32=r6, @ANYRESOCT=r3, @ANYRESOCT=r4, @ANYBLOB="16de71cf0766d82ab6b67f0cd79e8e3ee2643e2e5026c3ea1ccfde1fe0912c50f4450c9c7749b181ae244aa09bb447092b0b62871d5ab9b62bc1121905ff995d268176192bba6bbfe4ff322f3370ce1ac7b5dd004238de507070dc0002cfe8ca03a81158f62018fe98245631fc021061fec067e33a1c01f786dafad477a72fcf767c43d28917995da3bd4df41908d180cd9517f24d97f14674a9a15bb602dca6587204d6571e02a456eb415ea3208e6afe4ed4f3533d7cf074ed4bd702d74e242405fadcd0c73dbb590bb430b54691990800f66109473f3531c01f00"/234], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x40025) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r10, r9, 0x0, 0x100000005) 10:18:34 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000008000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00000012000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:34 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {}, {r5}, {}, {r5}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {r4}, {}, {0x0, r6}, {}, {}, {}, {r5}, {0x0, r6}, {}, {0x0, r6}, {}, {r2, r6}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {}, {r5}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {}, {}, {r4}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {}, {r1}, {0x0, r6}, {r4}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {r5}, {}, {}, {r5}, {r5}, {}, {}, {}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {}, {r5, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5, r6}, {r5}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4, r6}], 0x1, "2156816c73038c"}) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) [ 1072.551090][T30403] loop4: detected capacity change from 0 to 512 [ 1072.563418][T30406] loop5: detected capacity change from 0 to 512 [ 1072.585522][T30403] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:18:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000018000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000000001c000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1072.608875][T30406] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1072.616730][T30420] loop2: detected capacity change from 0 to 264192 [ 1072.619163][T30406] EXT4-fs (loop5): group descriptors corrupted! [ 1072.635496][ C1] sd 0:0:1:0: tag#4970 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1072.645377][ C1] sd 0:0:1:0: tag#4970 CDB: opcode=0xe5 (vendor) 10:18:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000026000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1072.651728][ C1] sd 0:0:1:0: tag#4970 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1072.660802][ C1] sd 0:0:1:0: tag#4970 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1072.669859][ C1] sd 0:0:1:0: tag#4970 CDB[20]: ba [ 1072.705196][T30403] loop4: detected capacity change from 0 to 512 [ 1072.711979][T30420] msdos filesystem being mounted at /root/syzkaller-testdir156917949/syzkaller.TDnRSM/2029/file1 supports timestamps until 2107 (0x10391447e) [ 1072.729989][T30403] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:18:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000fe000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce0022000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) [ 1072.772238][T30406] loop5: detected capacity change from 0 to 512 [ 1072.805880][T30406] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1072.816018][T30406] EXT4-fs (loop5): group descriptors corrupted! 10:18:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000004020000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:35 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') lseek(0xffffffffffffffff, 0x0, 0x2) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x8, "7e6830ead6b793"}) r7 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r7, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r7, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r11, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r11, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r10}, {}, {r9}, {r9}, {r9}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {r8, r10}, {0x0, r10}, {}, {r9, r10}, {0x0, r10}, {}, {}, {}, {0x0, r10}, {}, {0x0, r10}, {0x0, r10}, {}, {}, {}, {}, {r8}, {0x0, r10}, {}, {}, {r8, r10}, {r9}, {0x0, r13}, {0x0, r10}, {r9, r10}, {0x0, r10}, {r8}, {}, {0x0, r10}, {r9}, {}, {}, {r9}, {0x0, r10}, {}, {0x0, r10}, {}, {r5, r10}, {0x0, r10}, {r8}, {}, {r9}, {r8}, {}, {r9}, {}, {0x0, r10}, {0x0, r10}, {}, {}, {r9}, {0x0, r10}, {0x0, r10}, {0x0, r10}, {r9}, {0x0, r10}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {0x0, r10}, {r8}, {0x0, r10}, {}, {}, {r8, r10}, {}, {}, {}, {}, {}, {}, {}, {r9}, {0x0, r10}, {0x0, r10}, {r8}, {r9, r10}, {0x0, r10}, {0x0, r10}, {}, {}, {}, {r8}, {0x0, r10}, {}, {0x0, r10}, {0x0, r10}, {0x0, r10}, {r9, r10}, {r8, r10}, {r9}, {}, {r8, r10}, {r8}, {}, {}, {r8}, {}, {}, {}, {0x0, r10}, {0x0, r10}, {0x0, r10}, {0x0, r10}, {}, {}, {r8, r10}, {0x0, r10}, {0x0, r10}, {r8, r10}, {0x0, r10}, {}, {}, {r9}, {}, {r1}, {0x0, r10}, {r8}, {}, {r9}, {}, {}, {r9}, {0x0, r10}, {0x0, r10}, {}, {0x0, r10}, {}, {0x0, r10}, {}, {r8}, {}, {}, {}, {0x0, r10}, {r8, r10}, {r9}, {}, {}, {}, {r9}, {}, {}, {}, {r8}, {r8}, {}, {r8}, {r9}, {0x0, r10}, {r8}, {}, {r8}, {0x0, r10}, {r9}, {r8, r10}, {0x0, r10}, {}, {0x0, r10}, {}, {}, {0x0, r10}, {r9}, {}, {}, {r8}, {}, {0x0, r10}, {r9, r10}, {0x0, r10}, {0x0, r10}, {}, {}, {0x0, r10}, {r8}, {r9}, {r9, r10}, {}, {}, {}, {}, {r3}, {}, {}, {0x0, r10}, {}, {}, {}, {r9}, {}, {}, {r9}, {r9}, {}, {}, {}, {0x0, r10}, {}, {r8, r10}, {r8}, {}, {}, {0x0, r10}, {}, {r9, r12}, {r8}, {0x0, r10}, {}, {}, {r8, r10}, {r9, r10}, {r9}, {r8, r10}, {}, {}, {r9}, {r8, r10}, {0x0, r10}, {}, {0x0, r10}, {r9}, {r9, r6}, {}, {}, {0x0, r10}, {r9}, {0x0, r4}, {}, {}, {}, {r8, r10}], 0x1, "2156816c73038c"}) r14 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r14, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) [ 1072.846318][T30449] loop4: detected capacity change from 0 to 512 [ 1072.880120][T30449] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:18:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000030000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1072.902131][ C0] sd 0:0:1:0: tag#4989 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1072.911996][ C0] sd 0:0:1:0: tag#4989 CDB: opcode=0xe5 (vendor) [ 1072.918353][ C0] sd 0:0:1:0: tag#4989 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1072.927401][ C0] sd 0:0:1:0: tag#4989 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1072.936432][ C0] sd 0:0:1:0: tag#4989 CDB[20]: ba [ 1072.977328][T30449] loop4: detected capacity change from 0 to 512 [ 1072.996953][T30449] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:18:35 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x401, 0x8, &(0x7f00000008c0)=[{0x0}, {0x0, 0x0, 0x9}, {&(0x7f0000000180)="5030a6b9906c95e36ee1b07f9e5698893307dd91cd0319578b614ed5f1873eb0", 0x20, 0xfffffffffffffffd}, {&(0x7f0000000340)="2df6157d4494279dde2031db3b2744b435271e65a343796db3da0bb347a3215e9b71", 0x22, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f5bf3f90b3d3e7d7132c3012ab7043e22a6f8edc5e516ee833a4fdcf825d9da3fed17cac003d9dd022d", 0xa4, 0x7fffffff}, {&(0x7f0000000500)="822171b91eb1498a4740794c5db7bc7a965f6bf8c7cf5baee0946ad2aa4b016a8a03bb30b092e47cd74a4fab60e1d1443c33c80fa2ef7af6514920209443a39077bb6a856f3c3e40bb7182a08692593ab13f04b516500ed3b3256325f48aafef3d8ca84cdce2b0609ed9c6346c356964614f21f9699436b6ca419197a0729a46ae7ae36fd203e577f2b03891ce7ba975aa5d47214e98c73647d20e757d1ce2d1990688090eee936562a1b4968deb59f6a2980feca28742afcaf376ab51294f57d6334c86538795c11e018be19db248ea75e1", 0xd2, 0x10000}, {&(0x7f0000000600)="4a6006458a4a1e3060e4cca0086f3b44f908e6941741cf7422f159df72a1cdb68c01ef3f102d2afb1e3e446c41bef79e359d62ed3155330d3b2f5207705e6dfa86f4f655d80ee44134bb9211fed0be8f7f86ff1f4b5abab22df6a1bfed2d66e51791fcbbf6f6926ce384fda7a7e86c17dcc2b2473f22c6d095ade56596ee656b3c596a038658b30895170a9ab2d4379f4f58cc6e", 0x94, 0x9}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f0000000ac0)={[{@dots}, {@fat=@sys_immutable}, {@nodots}, {@fat=@umask}], [{@measure}, {@appraise}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@seclabel}]}) openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f80)={0x1, &(0x7f0000000f40)=[{0x7f}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000fc0), 0xc, &(0x7f0000000200)={&(0x7f0000003940)=ANY=[@ANYRES64=r7, @ANYRESHEX, @ANYRES32=r6, @ANYRESOCT=r3, @ANYRESOCT=r4, @ANYBLOB="16de71cf0766d82ab6b67f0cd79e8e3ee2643e2e5026c3ea1ccfde1fe0912c50f4450c9c7749b181ae244aa09bb447092b0b62871d5ab9b62bc1121905ff995d268176192bba6bbfe4ff322f3370ce1ac7b5dd004238de507070dc0002cfe8ca03a81158f62018fe98245631fc021061fec067e33a1c01f786dafad477a72fcf767c43d28917995da3bd4df41908d180cd9517f24d97f14674a9a15bb602dca6587204d6571e02a456eb415ea3208e6afe4ed4f3533d7cf074ed4bd702d74e242405fadcd0c73dbb590bb430b54691990800f66109473f3531c01f00"/234], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x40025) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r10, r9, 0x0, 0x100000006) 10:18:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000002040000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce000007cd000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) [ 1073.213991][T30480] loop5: detected capacity change from 0 to 512 [ 1073.242954][T30480] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1073.253180][T30480] EXT4-fs (loop5): group descriptors corrupted! [ 1073.286443][ C1] sd 0:0:1:0: tag#4950 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1073.296333][ C1] sd 0:0:1:0: tag#4950 CDB: opcode=0xe5 (vendor) [ 1073.302692][ C1] sd 0:0:1:0: tag#4950 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1073.311727][ C1] sd 0:0:1:0: tag#4950 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1073.320765][ C1] sd 0:0:1:0: tag#4950 CDB[20]: ba [ 1073.354668][T30480] loop5: detected capacity change from 0 to 512 [ 1073.365399][T30480] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1073.375650][T30480] EXT4-fs (loop5): group descriptors corrupted! 10:18:35 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {}, {r5}, {}, {r5}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {r4}, {}, {0x0, r6}, {}, {}, {}, {r5}, {0x0, r6}, {}, {0x0, r6}, {}, {r2, r6}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {}, {r5}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {}, {}, {r4}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {}, {r1}, {0x0, r6}, {r4}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {r5}, {}, {}, {r5}, {r5}, {}, {}, {}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {}, {r5, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5, r6}, {r5}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4, r6}], 0x1, "2156816c73038c"}) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) 10:18:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce0025000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000006040000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00000000000800010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:35 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x401, 0x8, &(0x7f00000008c0)=[{0x0}, {0x0, 0x0, 0x9}, {&(0x7f0000000180)="5030a6b9906c95e36ee1b07f9e5698893307dd91cd0319578b614ed5f1873eb0", 0x20, 0xfffffffffffffffd}, {&(0x7f0000000340)="2df6157d4494279dde2031db3b2744b435271e65a343796db3da0bb347a3215e9b71", 0x22, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f5bf3f90b3d3e7d7132c3012ab7043e22a6f8edc5e516ee833a4fdcf825d9da3fed17cac003d9dd022d", 0xa4, 0x7fffffff}, {&(0x7f0000000500)="822171b91eb1498a4740794c5db7bc7a965f6bf8c7cf5baee0946ad2aa4b016a8a03bb30b092e47cd74a4fab60e1d1443c33c80fa2ef7af6514920209443a39077bb6a856f3c3e40bb7182a08692593ab13f04b516500ed3b3256325f48aafef3d8ca84cdce2b0609ed9c6346c356964614f21f9699436b6ca419197a0729a46ae7ae36fd203e577f2b03891ce7ba975aa5d47214e98c73647d20e757d1ce2d1990688090eee936562a1b4968deb59f6a2980feca28742afcaf376ab51294f57d6334c86538795c11e018be19db248ea75e1", 0xd2, 0x10000}, {&(0x7f0000000600)="4a6006458a4a1e3060e4cca0086f3b44f908e6941741cf7422f159df72a1cdb68c01ef3f102d2afb1e3e446c41bef79e359d62ed3155330d3b2f5207705e6dfa86f4f655d80ee44134bb9211fed0be8f7f86ff1f4b5abab22df6a1bfed2d66e51791fcbbf6f6926ce384fda7a7e86c17dcc2b2473f22c6d095ade56596ee656b3c596a038658b30895170a9ab2d4379f4f58cc6e", 0x94, 0x9}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f0000000ac0)={[{@dots}, {@fat=@sys_immutable}, {@nodots}, {@fat=@umask}], [{@measure}, {@appraise}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@seclabel}]}) openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f80)={0x1, &(0x7f0000000f40)=[{0x7f}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000fc0), 0xc, &(0x7f0000000200)={&(0x7f0000003940)=ANY=[@ANYRES64=r7, @ANYRESHEX, @ANYRES32=r6, @ANYRESOCT=r3, @ANYRESOCT=r4, @ANYBLOB="16de71cf0766d82ab6b67f0cd79e8e3ee2643e2e5026c3ea1ccfde1fe0912c50f4450c9c7749b181ae244aa09bb447092b0b62871d5ab9b62bc1121905ff995d268176192bba6bbfe4ff322f3370ce1ac7b5dd004238de507070dc0002cfe8ca03a81158f62018fe98245631fc021061fec067e33a1c01f786dafad477a72fcf767c43d28917995da3bd4df41908d180cd9517f24d97f14674a9a15bb602dca6587204d6571e02a456eb415ea3208e6afe4ed4f3533d7cf074ed4bd702d74e242405fadcd0c73dbb590bb430b54691990800f66109473f3531c01f00"/234], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x40025) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r10, r9, 0x0, 0x100000007) 10:18:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000080040000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1073.530490][T30503] loop5: detected capacity change from 0 to 512 [ 1073.556880][T30504] loop4: detected capacity change from 0 to 512 [ 1073.568831][T30503] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1073.579166][T30503] EXT4-fs (loop5): group descriptors corrupted! [ 1073.588052][T30504] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1073.616992][T30519] loop2: detected capacity change from 0 to 264192 10:18:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000050000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1073.653282][T30504] loop4: detected capacity change from 0 to 512 [ 1073.668004][ C1] sd 0:0:1:0: tag#4961 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1073.677943][ C1] sd 0:0:1:0: tag#4961 CDB: opcode=0xe5 (vendor) [ 1073.684279][ C1] sd 0:0:1:0: tag#4961 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1073.693413][ C1] sd 0:0:1:0: tag#4961 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d 10:18:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000000002b050000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1073.702475][ C1] sd 0:0:1:0: tag#4961 CDB[20]: ba [ 1073.716410][T30503] loop5: detected capacity change from 0 to 512 [ 1073.729221][T30504] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1073.742678][T30503] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1073.752864][T30503] EXT4-fs (loop5): group descriptors corrupted! [ 1073.760438][T30519] msdos filesystem being mounted at /root/syzkaller-testdir156917949/syzkaller.TDnRSM/2030/file1 supports timestamps until 2107 (0x10391447e) 10:18:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce002e000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000060000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00000000001000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000004060000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1073.861282][T30550] loop4: detected capacity change from 0 to 512 [ 1073.889995][T30550] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1073.947576][T30550] loop4: detected capacity change from 0 to 512 [ 1073.963835][T30550] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1074.002825][T30566] loop5: detected capacity change from 0 to 512 [ 1074.028147][T30566] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1074.038301][T30566] EXT4-fs (loop5): group descriptors corrupted! [ 1074.113793][T30566] loop5: detected capacity change from 0 to 512 [ 1074.123820][T30566] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1074.133941][T30566] EXT4-fs (loop5): group descriptors corrupted! 10:18:36 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {}, {r5}, {}, {r5}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {r4}, {}, {0x0, r6}, {}, {}, {}, {r5}, {0x0, r6}, {}, {0x0, r6}, {}, {r2, r6}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {}, {r5}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {}, {}, {r4}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {}, {r1}, {0x0, r6}, {r4}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {r5}, {}, {}, {r5}, {r5}, {}, {}, {}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {}, {r5, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5, r6}, {r5}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4, r6}], 0x1, "2156816c73038c"}) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) 10:18:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000070000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce003f000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:36 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x401, 0x8, &(0x7f00000008c0)=[{0x0}, {0x0, 0x0, 0x9}, {&(0x7f0000000180)="5030a6b9906c95e36ee1b07f9e5698893307dd91cd0319578b614ed5f1873eb0", 0x20, 0xfffffffffffffffd}, {&(0x7f0000000340)="2df6157d4494279dde2031db3b2744b435271e65a343796db3da0bb347a3215e9b71", 0x22, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f5bf3f90b3d3e7d7132c3012ab7043e22a6f8edc5e516ee833a4fdcf825d9da3fed17cac003d9dd022d", 0xa4, 0x7fffffff}, {&(0x7f0000000500)="822171b91eb1498a4740794c5db7bc7a965f6bf8c7cf5baee0946ad2aa4b016a8a03bb30b092e47cd74a4fab60e1d1443c33c80fa2ef7af6514920209443a39077bb6a856f3c3e40bb7182a08692593ab13f04b516500ed3b3256325f48aafef3d8ca84cdce2b0609ed9c6346c356964614f21f9699436b6ca419197a0729a46ae7ae36fd203e577f2b03891ce7ba975aa5d47214e98c73647d20e757d1ce2d1990688090eee936562a1b4968deb59f6a2980feca28742afcaf376ab51294f57d6334c86538795c11e018be19db248ea75e1", 0xd2, 0x10000}, {&(0x7f0000000600)="4a6006458a4a1e3060e4cca0086f3b44f908e6941741cf7422f159df72a1cdb68c01ef3f102d2afb1e3e446c41bef79e359d62ed3155330d3b2f5207705e6dfa86f4f655d80ee44134bb9211fed0be8f7f86ff1f4b5abab22df6a1bfed2d66e51791fcbbf6f6926ce384fda7a7e86c17dcc2b2473f22c6d095ade56596ee656b3c596a038658b30895170a9ab2d4379f4f58cc6e", 0x94, 0x9}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f0000000ac0)={[{@dots}, {@fat=@sys_immutable}, {@nodots}, {@fat=@umask}], [{@measure}, {@appraise}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@seclabel}]}) openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f80)={0x1, &(0x7f0000000f40)=[{0x7f}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000fc0), 0xc, &(0x7f0000000200)={&(0x7f0000003940)=ANY=[@ANYRES64=r7, @ANYRESHEX, @ANYRES32=r6, @ANYRESOCT=r3, @ANYRESOCT=r4, @ANYBLOB="16de71cf0766d82ab6b67f0cd79e8e3ee2643e2e5026c3ea1ccfde1fe0912c50f4450c9c7749b181ae244aa09bb447092b0b62871d5ab9b62bc1121905ff995d268176192bba6bbfe4ff322f3370ce1ac7b5dd004238de507070dc0002cfe8ca03a81158f62018fe98245631fc021061fec067e33a1c01f786dafad477a72fcf767c43d28917995da3bd4df41908d180cd9517f24d97f14674a9a15bb602dca6587204d6571e02a456eb415ea3208e6afe4ed4f3533d7cf074ed4bd702d74e242405fadcd0c73dbb590bb430b54691990800f66109473f3531c01f00"/234], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x40025) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r10, r9, 0x0, 0x100000008) 10:18:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00000002000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) [ 1074.476028][T30590] loop4: detected capacity change from 0 to 512 [ 1074.483006][T30592] loop5: detected capacity change from 0 to 512 [ 1074.496415][T30590] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1074.511213][T30592] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! 10:18:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000180000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1074.521338][T30592] EXT4-fs (loop5): group descriptors corrupted! [ 1074.562629][ C0] sd 0:0:1:0: tag#4944 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1074.572489][ C0] sd 0:0:1:0: tag#4944 CDB: opcode=0xe5 (vendor) [ 1074.578854][ C0] sd 0:0:1:0: tag#4944 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1074.587905][ C0] sd 0:0:1:0: tag#4944 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1074.597141][ C0] sd 0:0:1:0: tag#4944 CDB[20]: ba 10:18:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000001c0000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1074.609116][T30607] loop2: detected capacity change from 0 to 264192 [ 1074.619519][T30590] loop4: detected capacity change from 0 to 512 [ 1074.636791][T30592] loop5: detected capacity change from 0 to 512 [ 1074.636801][T30590] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1074.638050][T30607] msdos filesystem being mounted at /root/syzkaller-testdir156917949/syzkaller.TDnRSM/2031/file1 supports timestamps until 2107 (0x10391447e) [ 1074.653772][T30592] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1074.674966][T30592] EXT4-fs (loop5): group descriptors corrupted! 10:18:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce0040000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:37 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000200000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1074.782766][T30635] loop4: detected capacity change from 0 to 512 10:18:37 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000260000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1074.823762][T30635] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:18:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00000003000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:37 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000052b0000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1074.897241][T30635] loop4: detected capacity change from 0 to 512 [ 1074.917292][T30635] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1074.940927][T30652] loop5: detected capacity change from 0 to 512 [ 1074.979045][T30652] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1074.989163][T30652] EXT4-fs (loop5): group descriptors corrupted! 10:18:37 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {}, {r5}, {}, {r5}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {r4}, {}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {0x0, r6}, {}, {r2, r6}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {}, {r5}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {}, {}, {r4}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {}, {r1}, {0x0, r6}, {r4}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {r5}, {}, {}, {r5}, {r5}, {}, {}, {}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {}, {r5, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5, r6}, {r5}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4, r6}], 0x1, "2156816c73038c"}) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) 10:18:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce0048000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:37 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000003f0000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00000004000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:37 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x401, 0x8, &(0x7f00000008c0)=[{0x0}, {0x0, 0x0, 0x9}, {&(0x7f0000000180)="5030a6b9906c95e36ee1b07f9e5698893307dd91cd0319578b614ed5f1873eb0", 0x20, 0xfffffffffffffffd}, {&(0x7f0000000340)="2df6157d4494279dde2031db3b2744b435271e65a343796db3da0bb347a3215e9b71", 0x22, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f5bf3f90b3d3e7d7132c3012ab7043e22a6f8edc5e516ee833a4fdcf825d9da3fed17cac003d9dd022d", 0xa4, 0x7fffffff}, {&(0x7f0000000500)="822171b91eb1498a4740794c5db7bc7a965f6bf8c7cf5baee0946ad2aa4b016a8a03bb30b092e47cd74a4fab60e1d1443c33c80fa2ef7af6514920209443a39077bb6a856f3c3e40bb7182a08692593ab13f04b516500ed3b3256325f48aafef3d8ca84cdce2b0609ed9c6346c356964614f21f9699436b6ca419197a0729a46ae7ae36fd203e577f2b03891ce7ba975aa5d47214e98c73647d20e757d1ce2d1990688090eee936562a1b4968deb59f6a2980feca28742afcaf376ab51294f57d6334c86538795c11e018be19db248ea75e1", 0xd2, 0x10000}, {&(0x7f0000000600)="4a6006458a4a1e3060e4cca0086f3b44f908e6941741cf7422f159df72a1cdb68c01ef3f102d2afb1e3e446c41bef79e359d62ed3155330d3b2f5207705e6dfa86f4f655d80ee44134bb9211fed0be8f7f86ff1f4b5abab22df6a1bfed2d66e51791fcbbf6f6926ce384fda7a7e86c17dcc2b2473f22c6d095ade56596ee656b3c596a038658b30895170a9ab2d4379f4f58cc6e", 0x94, 0x9}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f0000000ac0)={[{@dots}, {@fat=@sys_immutable}, {@nodots}, {@fat=@umask}], [{@measure}, {@appraise}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@seclabel}]}) openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f80)={0x1, &(0x7f0000000f40)=[{0x7f}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000fc0), 0xc, &(0x7f0000000200)={&(0x7f0000003940)=ANY=[@ANYRES64=r7, @ANYRESHEX, @ANYRES32=r6, @ANYRESOCT=r3, @ANYRESOCT=r4, @ANYBLOB="16de71cf0766d82ab6b67f0cd79e8e3ee2643e2e5026c3ea1ccfde1fe0912c50f4450c9c7749b181ae244aa09bb447092b0b62871d5ab9b62bc1121905ff995d268176192bba6bbfe4ff322f3370ce1ac7b5dd004238de507070dc0002cfe8ca03a81158f62018fe98245631fc021061fec067e33a1c01f786dafad477a72fcf767c43d28917995da3bd4df41908d180cd9517f24d97f14674a9a15bb602dca6587204d6571e02a456eb415ea3208e6afe4ed4f3533d7cf074ed4bd702d74e242405fadcd0c73dbb590bb430b54691990800f66109473f3531c01f00"/234], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x40025) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r10, r9, 0x0, 0x100000009) 10:18:37 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000400000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1075.419669][T30667] loop4: detected capacity change from 0 to 512 [ 1075.433230][T30667] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:18:37 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000004800000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1075.475577][T30676] loop5: detected capacity change from 0 to 512 [ 1075.496764][T30667] loop4: detected capacity change from 0 to 512 [ 1075.514357][T30676] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1075.521220][ C0] sd 0:0:1:0: tag#4987 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1075.524628][T30676] EXT4-fs (loop5): group descriptors corrupted! [ 1075.534497][ C0] sd 0:0:1:0: tag#4987 CDB: opcode=0xe5 (vendor) [ 1075.547631][ C0] sd 0:0:1:0: tag#4987 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1075.556785][ C0] sd 0:0:1:0: tag#4987 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1075.559760][T30693] loop2: detected capacity change from 0 to 264192 [ 1075.565830][ C0] sd 0:0:1:0: tag#4987 CDB[20]: ba 10:18:37 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000fffe0000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce004c000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000feff0000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1075.601092][T30667] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1075.620265][T30693] msdos filesystem being mounted at /root/syzkaller-testdir156917949/syzkaller.TDnRSM/2032/file1 supports timestamps until 2107 (0x10391447e) [ 1075.660048][T30676] loop5: detected capacity change from 0 to 512 [ 1075.671287][T30676] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1075.681717][T30676] EXT4-fs (loop5): group descriptors corrupted! 10:18:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000400002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00000005000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) [ 1075.732847][T30715] loop4: detected capacity change from 0 to 512 [ 1075.766301][T30715] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1075.827657][T30726] loop5: detected capacity change from 0 to 512 [ 1075.854926][T30726] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1075.865273][T30726] EXT4-fs (loop5): group descriptors corrupted! [ 1075.943323][T30726] loop5: detected capacity change from 0 to 512 [ 1075.951959][T30726] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1075.962155][T30726] EXT4-fs (loop5): group descriptors corrupted! 10:18:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00000006000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000800002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce0060000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:38 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x401, 0x8, &(0x7f00000008c0)=[{0x0}, {0x0, 0x0, 0x9}, {&(0x7f0000000180)="5030a6b9906c95e36ee1b07f9e5698893307dd91cd0319578b614ed5f1873eb0", 0x20, 0xfffffffffffffffd}, {&(0x7f0000000340)="2df6157d4494279dde2031db3b2744b435271e65a343796db3da0bb347a3215e9b71", 0x22, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f5bf3f90b3d3e7d7132c3012ab7043e22a6f8edc5e516ee833a4fdcf825d9da3fed17cac003d9dd022d", 0xa4, 0x7fffffff}, {&(0x7f0000000500)="822171b91eb1498a4740794c5db7bc7a965f6bf8c7cf5baee0946ad2aa4b016a8a03bb30b092e47cd74a4fab60e1d1443c33c80fa2ef7af6514920209443a39077bb6a856f3c3e40bb7182a08692593ab13f04b516500ed3b3256325f48aafef3d8ca84cdce2b0609ed9c6346c356964614f21f9699436b6ca419197a0729a46ae7ae36fd203e577f2b03891ce7ba975aa5d47214e98c73647d20e757d1ce2d1990688090eee936562a1b4968deb59f6a2980feca28742afcaf376ab51294f57d6334c86538795c11e018be19db248ea75e1", 0xd2, 0x10000}, {&(0x7f0000000600)="4a6006458a4a1e3060e4cca0086f3b44f908e6941741cf7422f159df72a1cdb68c01ef3f102d2afb1e3e446c41bef79e359d62ed3155330d3b2f5207705e6dfa86f4f655d80ee44134bb9211fed0be8f7f86ff1f4b5abab22df6a1bfed2d66e51791fcbbf6f6926ce384fda7a7e86c17dcc2b2473f22c6d095ade56596ee656b3c596a038658b30895170a9ab2d4379f4f58cc6e", 0x94, 0x9}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f0000000ac0)={[{@dots}, {@fat=@sys_immutable}, {@nodots}, {@fat=@umask}], [{@measure}, {@appraise}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@seclabel}]}) openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f80)={0x1, &(0x7f0000000f40)=[{0x7f}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000fc0), 0xc, &(0x7f0000000200)={&(0x7f0000003940)=ANY=[@ANYRES64=r7, @ANYRESHEX, @ANYRES32=r6, @ANYRESOCT=r3, @ANYRESOCT=r4, @ANYBLOB="16de71cf0766d82ab6b67f0cd79e8e3ee2643e2e5026c3ea1ccfde1fe0912c50f4450c9c7749b181ae244aa09bb447092b0b62871d5ab9b62bc1121905ff995d268176192bba6bbfe4ff322f3370ce1ac7b5dd004238de507070dc0002cfe8ca03a81158f62018fe98245631fc021061fec067e33a1c01f786dafad477a72fcf767c43d28917995da3bd4df41908d180cd9517f24d97f14674a9a15bb602dca6587204d6571e02a456eb415ea3208e6afe4ed4f3533d7cf074ed4bd702d74e242405fadcd0c73dbb590bb430b54691990800f66109473f3531c01f00"/234], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x40025) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r10, r9, 0x0, 0x10000000a) 10:18:38 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {}, {r5}, {}, {r5}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {r4}, {}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {0x0, r6}, {}, {r2, r6}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {}, {r5}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {}, {}, {r4}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {}, {r1}, {0x0, r6}, {r4}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {r5}, {}, {}, {r5}, {r5}, {}, {}, {}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {}, {r5, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5, r6}, {r5}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4, r6}], 0x1, "2156816c73038c"}) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) [ 1076.441366][T30745] loop5: detected capacity change from 0 to 512 [ 1076.454979][T30749] loop4: detected capacity change from 0 to 512 [ 1076.471148][T30745] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1076.481263][T30745] EXT4-fs (loop5): group descriptors corrupted! 10:18:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000040000800002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1076.497744][T30749] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1076.539238][T30749] loop4: detected capacity change from 0 to 512 [ 1076.542849][T30762] loop2: detected capacity change from 0 to 264192 [ 1076.557121][T30749] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1076.565131][T30745] loop5: detected capacity change from 0 to 512 [ 1076.579971][ C1] sd 0:0:1:0: tag#4952 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1076.580239][T30745] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1076.589990][ C1] sd 0:0:1:0: tag#4952 CDB: opcode=0xe5 (vendor) [ 1076.600135][T30745] EXT4-fs (loop5): group descriptors corrupted! [ 1076.606460][ C1] sd 0:0:1:0: tag#4952 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1076.621695][ C1] sd 0:0:1:0: tag#4952 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1076.630735][ C1] sd 0:0:1:0: tag#4952 CDB[20]: ba 10:18:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000002000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1076.637980][T30762] msdos filesystem being mounted at /root/syzkaller-testdir156917949/syzkaller.TDnRSM/2033/file1 supports timestamps until 2107 (0x10391447e) 10:18:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000001002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00000007000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000002002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1076.786343][T30789] loop5: detected capacity change from 0 to 512 [ 1076.822953][T30789] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! 10:18:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce0068000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000402002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1076.833192][T30789] EXT4-fs (loop5): group descriptors corrupted! 10:18:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00000008000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000003002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1076.936630][T30801] loop4: detected capacity change from 0 to 512 [ 1076.971479][T30801] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1076.985683][T30807] loop5: detected capacity change from 0 to 512 10:18:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000004002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1077.020812][T30807] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1077.030944][T30807] EXT4-fs (loop5): group descriptors corrupted! [ 1077.053689][T30801] loop4: detected capacity change from 0 to 512 [ 1077.062711][T30801] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1077.114400][T30807] loop5: detected capacity change from 0 to 512 [ 1077.127944][T30807] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1077.138069][T30807] EXT4-fs (loop5): group descriptors corrupted! 10:18:39 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x401, 0x8, &(0x7f00000008c0)=[{0x0}, {0x0, 0x0, 0x9}, {&(0x7f0000000180)="5030a6b9906c95e36ee1b07f9e5698893307dd91cd0319578b614ed5f1873eb0", 0x20, 0xfffffffffffffffd}, {&(0x7f0000000340)="2df6157d4494279dde2031db3b2744b435271e65a343796db3da0bb347a3215e9b71", 0x22, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f5bf3f90b3d3e7d7132c3012ab7043e22a6f8edc5e516ee833a4fdcf825d9da3fed17cac003d9dd022d", 0xa4, 0x7fffffff}, {&(0x7f0000000500)="822171b91eb1498a4740794c5db7bc7a965f6bf8c7cf5baee0946ad2aa4b016a8a03bb30b092e47cd74a4fab60e1d1443c33c80fa2ef7af6514920209443a39077bb6a856f3c3e40bb7182a08692593ab13f04b516500ed3b3256325f48aafef3d8ca84cdce2b0609ed9c6346c356964614f21f9699436b6ca419197a0729a46ae7ae36fd203e577f2b03891ce7ba975aa5d47214e98c73647d20e757d1ce2d1990688090eee936562a1b4968deb59f6a2980feca28742afcaf376ab51294f57d6334c86538795c11e018be19db248ea75e1", 0xd2, 0x10000}, {&(0x7f0000000600)="4a6006458a4a1e3060e4cca0086f3b44f908e6941741cf7422f159df72a1cdb68c01ef3f102d2afb1e3e446c41bef79e359d62ed3155330d3b2f5207705e6dfa86f4f655d80ee44134bb9211fed0be8f7f86ff1f4b5abab22df6a1bfed2d66e51791fcbbf6f6926ce384fda7a7e86c17dcc2b2473f22c6d095ade56596ee656b3c596a038658b30895170a9ab2d4379f4f58cc6e", 0x94, 0x9}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f0000000ac0)={[{@dots}, {@fat=@sys_immutable}, {@nodots}, {@fat=@umask}], [{@measure}, {@appraise}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@seclabel}]}) openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f80)={0x1, &(0x7f0000000f40)=[{0x7f}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000fc0), 0xc, &(0x7f0000000200)={&(0x7f0000003940)=ANY=[@ANYRES64=r7, @ANYRESHEX, @ANYRES32=r6, @ANYRESOCT=r3, @ANYRESOCT=r4, @ANYBLOB="16de71cf0766d82ab6b67f0cd79e8e3ee2643e2e5026c3ea1ccfde1fe0912c50f4450c9c7749b181ae244aa09bb447092b0b62871d5ab9b62bc1121905ff995d268176192bba6bbfe4ff322f3370ce1ac7b5dd004238de507070dc0002cfe8ca03a81158f62018fe98245631fc021061fec067e33a1c01f786dafad477a72fcf767c43d28917995da3bd4df41908d180cd9517f24d97f14674a9a15bb602dca6587204d6571e02a456eb415ea3208e6afe4ed4f3533d7cf074ed4bd702d74e242405fadcd0c73dbb590bb430b54691990800f66109473f3531c01f00"/234], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x40025) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r10, r9, 0x0, 0x10000000c) 10:18:39 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {}, {r5}, {}, {r5}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {r4}, {}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {0x0, r6}, {}, {r2, r6}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {}, {r5}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {}, {}, {r4}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {}, {r1}, {0x0, r6}, {r4}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {r5}, {}, {}, {r5}, {r5}, {}, {}, {}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {}, {r5, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5, r6}, {r5}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4, r6}], 0x1, "2156816c73038c"}) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) 10:18:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000005002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce006c000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00000009000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:39 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') mkdir(&(0x7f0000000100)='./file1\x00', 0x20) r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}], 0x8, "7e6830ead6b793"}) r392 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r392, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r392, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000000a40)={r79, r83, "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", "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"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r392, 0xd000943e, &(0x7f000005fc40)={r396, r223, "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", "e4c8e9053b5f0b6bc1e5b006ce65bc51225008ca0a7b3e5a4fceb642a4cc271bc619c641a2bfad7f0b1e60bf15dbfb303b4fd75a0b5b2937d5d968f5c573e11454f49450b51829b88d4ba759db50821f2014e1eecc56fbf1d733806ab1545e2948ad05d300a06a58bc35b5d9ba9ca7434bfb6e1a07d0a1bb19c72260a23a37a1db9014a94c14aa8c9ae13172c1154f466e594cb6c4ec9cbacc09e0bd48c13a881aacc8d786a42a55010925d4ad500a29e029f3c5468998267a18a3c8da46198c1ed415db62ac426cee932ef9e5ee124002026b5f6d187ea9d852ead0eb21f7c4461a2b89268c737ae08f26dcead9c80a5d70f7d67da153adf52b996145e5650f38b2bd2a8b63915498ce9cf0a42672a1af14df26302615acaaee4ed6b98a88c5f11d655cebbee28e95f63be347322c600387bf744199463230326e735a3ee10db653edd6c0bf78dd003d1a3ad9ef2f2c0c20bb1e9b78f46cf4881d523de87946d5fcff99f766d7ec35a5be3c8c89a86ee45f66073371292dc60525a1fc74e53b0c85694962bd3b34e6164e64f2f59553eb694258712c4a1688855d26d3517aef36d2629742773e779b0963d2304b2275a99e2ae6825f98783a03ff50ae799ec0117262382c0997d93c3006ca4f5afab0d512d55ce2ddf66b251798f17ceed323ab3d5e3edc27bd800f56ab26602e1e21cba1aefdaf6634b3b1936589e3ee6894a2ee9025c5539ae5b185576007ef1b6f3b00ef18d959e8e78ea3704005ce4ffdd1f30e9972a4fef01812e2e56e37fbd8205eef1bb7bb48e3c77b4c8c144bfb7414f4907faee8213eb3b3febc6ef4808cbff9431397b3e4752e82d6576e3bc113f4f625f67da7e3b552a48eebb7f93a9c96dec6091436c127baebe76308b3a46e87aba109c6e1f1344b26c43b7df7a5208ae3e074a58cf4100e4f0b13d7d40aea477fbaf7719ae5d7612fde397655709a0417c02fed3e6816ab1b7315278e756a23ae712a86edb754adf0ddbaec55bde9bb808d6a08cdc5b1a15f90a80487fcd641eabb22708d69914c56895906cb34417cf8f4222a79e1898aef13f3e89ab738ce947834a2dabc35bcd66813daee1848be95b4d7af5e7a15fd544d31a7207b394451dc52c41cc5d77bbd9d552f170e52ff3d527bb2f04ed74303e2cd0765fc41f34be715a82a352873ee573666dd5559e50cca0e210196166a4c1543a1d304b83f7d23ce7629077d44ca737b7de0dd7028d31d551c93548ea4a07a487640bf2bb9fb3bb2c7f7c4571df6cf2f963513a8f64620e2a30c132167ba9a1f795f045b7378baa1331e69f54e2989e5030600160b029d56706506d95f7f811b21ef9b469703b0b895c52b9ebb6a58ff9ed0fc59ca89b6a59caf1b7e5ad292d92ed291c96f24c9f0274402abc8f0c3829e9adae73f83432c4fbaa3f216a97d5cab81bb6b13df8f369969f17d93eec2433f0b1060d6f87bfb933a52f638bb26168c78ae29bb20cde1e04738b645041f9d8ca2d1514b1aadbf30bb87ebee13ae1943023bba8f5e7b2fa36f715d2dee2a43fc2587c8e2a249977cdcdee6bcd8783b24ce71f74875329062bbe7479bc1ad1d32bc4340b92f96fd285e119520b40b7949cdddaf63366d8ffa1b836da08686e9807119df8aa917f26e0fdb8cd26982e47a91aa289c87c5cecbc44bc7d565760814f9ebc454b68b5254189398782480f720c41af40c31f91afe531b587dee6b39155c8b31255e0dc5ef57ece68aa3cd60b2433f83056b927c868de467a41e0d10d0d3f21cad4f986e7c1c5511fbd3049a57a8842166f97ab4c634920522f5e2f3b21b1cbf82d40e7d75027f9c980603ead1b576330f472301e94b8f00e71576136c496269aa498bd6afa5f9da16d5ad23248878123c073c1d4d994cd342776db5e47844b7b28480a6a884f9fb4d40e213ddb35d555d5bd7eb7238129abc24eb52293c172f8dfc4ce1efdcd0e59ce9f3543daef5879195815b1aee368c52bd0a3a91581fdcecb5b21f7f48f2c77083548e4f7cb30d2b72bfbf1da3384e7b2aa0e9c1d0ea8f346796e6d061dab513eba917db18b22b417885027c5b95d763eb9ffed8fe3442c8298715ad52e2bff8f836e17ad487452d6011d4bdb4ae09dc5ad26396c6eb35c9254d368999af4b213f3d876fd52f669467f0cb8ce611a33a84b807a157bf90240450ea1acd0df285a41004e24d62b3c3338da442a0a13a06f106a1bace0f40bdc5ecc0b104c9e9d27aefa4e5fd13d18d7339b21ab151c1cad9584bbefe70b7967f338cd8f08c637dbfd418379fe3589642bb1a0f99018cea1084221eee14344ed8576b26c52f4b56e33a77cad766d2505add2d29289316eabb867ff60f0041a23e55b116a1d924a001d74e3dcc12af3b67e4558ef1a61fb59bc650b3d64595af75093b9cfb8af427f365c4b832c8320466f8f8a2b7a97677c008dbd31e586b5ad775ad618df1b68c6e65e8ccb5ad977935b9813031c083467fe2b65393b412ee44537fe4984181735f3e4df440ef88bd8ff318fad56085b0974752805b99831c1fba44e4207f8ac7bb7cd9cbbb4ccbc11d1f4e3e35268be0f0dd26606e7f8811d0f97cfb2f862cded352b9e5f95114ab5042724d956b6e08e08abf78d819c02126e2b6cf70c34c95cf74b0f44320d7b11034fac06af6ae585fb28634535f662ca4bf301d8e369a93edfa56d79422237b71da40b6b5c51761ccf7a6c12c41101cdb308cd32302a9ec97dfab086e223c48df5ca24b63751c9b0eb7bbc68183c533bb0d8dda88edf36097aea403112ca2f186607c73af96471912458f01cf61552f5148e7d4729d455f6a15468ac9a6e901db338f9b971a447496a8f641eb929a4d2c5538ca22f831069a0d313306a0e084ad0371221ce7bcab1348ff1ddfcf24f05376c47ad48b747159af236a3386dbfba22236a079f8e27566ba54d800fe15f54832cda121f51f8416d258fbe8b3ace822a5b631aa386286b037e880d12f1b39f886cb0cfde18cad4667f995a73ead2811f26f9de113fdd14ed61507b3d344db01fb4ec8ce5d7b52686395d49706229aba4802d0bec93c8b998fb424e7d4dfe968318b45809e97915071dda4d4fecf84558e4b3e25e4cd8344e39daa7826b8bc7b6b3593d7c6f2dc7026ef5ba9d91a07eed61d26dc14d703e4b9cd9218467b7b48f18741a3fbed2a548a0f6668a2b2af0d7f720f67898701e5ea0b568b0a4828578d493175bbba464be5e6c3539bcd013282e4297142aecccdeac108789c4f558ee9a06dad110eaf11d80131e512d48be84c187c234a023579358342c39fe0b3715083c4912f8550db4f860a8598784aaeca63fe61a43b9e66cc25ebb0faa2f03ca1894f722bacc2c4fe2c287059edaa2d1080a16d839124f598e8542e2b5bcde256d6901c6bdab94e28a2d1547f9561fa503a83ee5a3d6b308fc303541f18f39336443157eaa710dd5374ae75fb7f302bdb7f21b0efa7781b10eab5bd941ff5660c5dbb02727a9cf7f5d8e0ca4fd8c9f0762ba089851e528ef75b42ba1006bec71ef3ab5c76a7c4fd3b9161b43bc2ec5589a83c06ba5cba21fb4c3ca878be8de09a53951211751fe091f37a78c7522784f9d8ada79157c8fd06ab674618ce890fbf5c6c1665a3457b71eed3351a8dd5b60a5d5004f42a21f4a0dad0933b4226d4d0208b1969aa6d4ac0c04ce8aca1bce601eb1aded5a31bf9d290719c1fe5a49fe79586f793abd6ab98ff2c8c907e50f4aec4a5362ed7bf0ac31b0cf8944a4121f18b552ce2f4ebd318021cda0a27fdef18f75088fee14173a300a2cf6974de94c7f15b790dde533e888aabb700083a984a68ee6ab9715847c5d345dd913578b6f7e87d023d9dede014a591f46bbd31e8d6a93fcfff44c8730cfd8bb40f2bd9c43e3ef9fd04d787b524ccf249ddaac007c9efb27599024153b25f783694242a1ee1ce28db9e4bad2bff9f203b77fd141b2cd97879df94b9027d3b6ba13184ce92b98cb0739a6ec7efed6255416120bd5f2ce53880ee6887ff48040619b095d6c63d4b004bf11e7eac0407427345eb4fa546e08814a06a905855164b5731d4f849303261d6991bee01df95e40d6a211826831107c9a55f78c06ca178c8dbe60c39951b71b644dde9980cf5011ecd1f338d396daea02e176d21565bc5bbbbbd984d73dd88800d4fbc91f9ae853b47b423a9f8c653ffb4ac452064733aa55af144dc2199da1a167c355774ee449fca3c63893798560094629385c869d4bd4f389f88be66c5aaaab992f015dd510a4971252affc22c543a7008167928201161d03ef74bfb469d1da9e095c860d574b6c450069e027f18821666bd15b45cb55a6c642078e7dbeaf47b8baeda5e06bb79fb7444be59163591ecfdbe4a2f1d654720e7dc53d842af28b266c390a9b942db9deb5f6e7a51bba7ab4079f841afbb32d2cbeaf8dbf29989bf4b214bd08f13a95959f222dddaf32d6219f5ac47dcfddbf331d783ef276c6cebdbeaaf40d69356b19c1696e51f65e166d28a72dc883c61f3f403aec587184b9c612ee1a344725d77a499398ebb5e2429488e216b4aa520ec540a3e7ebde6aa8a58de2090ffcb24aae5f2a0c7d008f1d586f87280e7d8ea0c5d54148dc438f47f36ac88e443dee54d28b87f0fefc48beb2c36f1b8adbb7f2705ed1b5a3b3a338dae90a125e020199b69885f3a65000e76f1a6690e3e66a92e7b47ef1b05bdb670f67b62a7a9c8728c553ac9b7b7db2ebdee98ab661216e653c0b382b8561a0d19a2218b3d78fa0f0827b0cb064edbb26a06192209e04e6706bbcc2e9755ef0654d63f19187c27b846edf7c37155d22e43c2c85db772c09778ec137ed2507461f551065802883d1d98535ebdbc7015d4f4ea23efb65987292d78da62973010845f12d692b550ce27b1993ae436d92882dbf4b7442cfa754755c1d4cc9a65557a132b28240578b5c73912d81b45486346234bc57f9859dbb130e47a0e117e15e6db6e92ed749fb4f81d9997c2c32ef35062a08c074ea0ff9c7d9a9c95078ffd13487c25e477f3f46fa3d0feb46f59f0e778ae1304dcca3a115e778b2239547b7c43cd6594adad09a30cb7b2df451c991f49f5bfe43764f801121414a18f626194c1ae0475fd705b870c7dbf75af0c918b16301b49ab4ed9cb4eff73ab12a36c8592ffcf79f87d9612b70c5acfaeb0d8066d12ecf476ced7941c6766df9e5b494db9f29c276472ebbc0cbcaa6d9408e2605eb49c367568d05d0474a637ff6b98c83bb77bcda9f93424148de754b352d8bcc4d90a18427082a0f39b9216d7d063e8cefd3f87d340a4cfa047e4b2a68e92b79408d76f000254a8f81096c843b2b44e210efb05562bb08d4e477a602d775f7bb865e06f76b100a7ec"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000060c40)={0x8d60, [{0x0, r187}, {}, {r171, r238}, {0x0, r389}, {r246}, {r265}, {}, {}, {}, {0x0, r389}, {r162}, {}, {r166}, {}, {}, {r244}, {r335, r177}, {r229, r298}, {}, {r196}, {}, {r324, r271}, {r380, r351}, {r274, r65}, {r251, r224}, {0x0, r323}, {r161, r211}, {r221, r187}, {0x0, r236}, {}, {0x0, r205}, {r382, r109}, {}, {0x0, r168}, {0x0, r205}, {r393}, {0x0, r257}, {0x0, r119}, {r70}, {}, {}, {0x0, r240}, {r314}, {r253}, {r57}, {r164, r191}, {0x0, r342}, {}, {}, {0x0, r58}, {r354, r119}, {}, {0x0, r147}, {}, {0x0, r385}, {0x0, r261}, {0x0, r23}, {r321, r129}, {r174}, {0x0, r271}, {}, {r83}, {0x0, r243}, {}, {r22}, {}, {r304, r99}, {}, {r16, r203}, {0x0, r149}, {0x0, r271}, {r126}, {}, {}, {}, {}, {r96}, {r235, r317}, {0x0, r6}, {r113, r280}, {}, {0x0, r297}, {}, {}, {r59}, {}, {r186}, {r92, r273}, {}, {0x0, r116}, {}, {r312}, {0x0, r359}, {r302, r24}, {r239, r338}, {r29, r370}, {}, {r276}, {r369}, {0x0, r238}, {}, {0x0, r236}, {r122, r309}, {}, {r188}, {0x0, r51}, {r326}, {0x0, r114}, {r237, r53}, {r83}, {}, {0x0, r165}, {}, {0x0, r252}, {r294}, {r179, r47}, {r134, r242}, {}, {r108}, {}, {0x0, r48}, {r181}, {r7}, {0x0, r89}, {0x0, r135}, {r299}, {}, {}, {0x0, r191}, {}, {r117, r357}, {r384, r298}, {r369, r129}, {}, {0x0, r222}, {0x0, r172}, {}, {r369}, {r77}, {}, {0x0, r255}, {r343}, {r293, r217}, {r80, r395}, {}, {r394}, {r244}, {r199, r3}, {r179}, {r92}, {0x0, r151}, {r296, r230}, {r82}, {}, {}, {r197}, {r36}, {r61, r212}, {0x0, r30}, {}, {0x0, r323}, {}, {}, {}, {}, {r82}, {}, {r98, r93}, {r394}, {0x0, r95}, {}, {r128, r33}, {}, {0x0, r379}, {r92, r105}, {}, {0x0, r33}, {}, {0x0, r344}, {r78}, {}, {}, {}, {}, {r132}, {0x0, r54}, {r384, r286}, {}, {r188}, {0x0, r15}, {0x0, r170}, {r310}, {0x0, r358}, {}, {}, {r299}, {r46, r344}, {r221}, {0x0, r368}, {r20, r245}, {0x0, r170}, {r164}, {r371}, {}, {}, {r260}, {}, {0x0, r71}, {0x0, r205}, {0x0, r74}, {0x0, r104}, {0x0, r131}, {0x0, r395}, {r138}, {0x0, r264}, {0x0, r195}, {0x0, r89}, {r340, r266}, {}, {0x0, r156}, {r157}, {r106}, {}, {r216, r99}, {r63, r111}, {r32}, {0x0, r191}, {0x0, r279}, {r199, r143}, {0x0, r28}, {r122}, {}, {0x0, r200}, {0x0, r240}, {r98, r95}, {r142, r87}, {r50, r43}, {}, {r331, r93}, {r333}, {r220, r60}, {0x0, r387}, {r208, r195}, {0x0, r175}, {r82}, {0x0, r376}, {0x0, r145}, {0x0, r273}, {r192}, {r270, r255}, {r260, r95}, {}, {0x0, r332}, {r57, r398}, {r117, r320}], 0xfd, "14e0c4ad0f7d72"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000001a40)={0x7, [{r18, r396}, {r287, r232}, {r341, r104}, {r218, r137}, {r324, r191}, {r110, r26}, {r283, r357}, {r32, r86}, {r234, r387}, {r57, r112}, {r352, r79}, {0x0, r189}, {r360, r133}, {r283}, {r117, r232}, {r276, r292}, {r166, r72}, {r132, r10}, {0x0, r95}, {r223, r28}, {r228, r330}, {r281, r109}, {r229, r381}, {r146}, {r348, r240}, {r144}, {r363}, {r302}, {0x0, r344}, {r61, r114}, {r7, r238}, {r213, r116}, {r388, r315}, {r159, r121}, {r160, r336}, {r75, r68}, {r285, r277}, {r22, r364}, {r34, r105}, {r106, r269}, {r163, r344}, {r167, r143}, {r341, r21}, {r164, r305}, {r322, r180}, {r154}, {r44, r332}, {r223, r209}, {r251, r86}, {r113, r361}, {r321, r158}, {r102, r236}, {0x0, r107}, {r63}, {r46, r200}, {r126, r261}, {r159, r121}, {r128, r211}, {r276, r5}, {r4, r91}, {r80}, {r210, r364}, {r46, r178}, {0x0, r137}, {r221, r3}, {r299, r62}, {r123, r366}, {r18, r247}, {r233, r99}, {0x0, r255}, {r120, r139}, {r44, r69}, {r291, r315}, {r253, r284}, {r83, r280}, {r84, r358}, {r94, r267}, {r31, r86}, {r70, r198}, {r100}, {r27, r344}, {r173, r211}, {r306, r12}, {r291, r54}, {r369, r282}, {r167, r14}, {r350, r240}, {r352, r396}, {r66, r184}, {0x0, r151}, {r341, r230}, {r234, r377}, {r185, r325}, {r18, r172}, {r67, r85}, {r39}, {0x0, r118}, {r260, r23}, {r340, r172}, {r362, r5}, {r382, r357}, {r237, r184}, {r283, r288}, {r120}, {r291, r284}, {r49, r74}, {r308, r81}, {r268, r290}, {0x0, r214}, {r130, r124}, {r7}, {r229, r391}, {r120, r151}, {r31, r292}, {r55}, {r155}, {r256, r217}, {r386, r193}, {r157}, {0x0, r48}, {r138, r330}, {r166, r93}, {r258}, {r285, r395}, {r367, r259}, {r302, r238}, {r345, r315}, {r231, r175}, {r316, r383}, {r326, r349}, {0x0, r374}, {r233, r226}, {r13, r118}, {r299, r344}, {r70, r153}, {r176, r318}, {r155, r238}, {r210, r334}, {0x0, r17}, {r202, r74}, {r265, r305}, {r356}, {r262}, {r82}, {r88, r28}, {r130, r217}, {r329, r172}, {r329}, {r340}, {r346, r101}, {r335, r141}, {0x0, r133}, {r319, r38}, {r234, r269}, {r278, r172}, {r340, r212}, {r41, r311}, {r199, r65}, {r274, r19}, {r132, r40}, {r9, r313}, {r150}, {r152, r377}, {r167, r353}, {r221, r91}, {r169, r182}, {r27}, {0x0, r137}, {}, {r229, r131}, {r46, r227}, {r302, r374}, {r123, r327}, {r146, r195}, {r179, r307}, {r194, r275}, {r55, r91}, {r251}, {r291, r339}, {r348, r286}, {r115}, {r201, r151}, {r138, r45}, {r250, r280}, {r375, r289}, {r183, r33}, {r148, r139}, {0x0, r42}, {r152, r137}, {r25, r158}, {r225, r42}, {r125, r254}, {r316, r85}, {0x0, r58}, {r2, r269}, {r365, r104}, {0x0, r35}, {0x0, r313}, {r204, r390}, {0x0, r255}, {r369, r215}, {r11, r280}, {r115, r205}, {r73, r372}, {r76, r275}, {r41, r339}, {r244}, {0x0, r54}, {r378, r349}, {0x0, r85}, {r49, r328}, {0x0, r104}, {r310, r207}, {r373}, {r44}, {r11, r47}, {r59, r358}, {r308, r347}, {r90, r300}, {r128, r295}, {r11, r143}, {r248, r145}, {0x0, r198}, {r140, r93}, {r75, r374}, {r136, r263}, {r362, r209}, {0x0, r97}, {r159, r355}, {r251, r53}, {r106, r366}, {r59, r14}, {r210}, {r241, r103}, {r176, r8}, {r324, r64}, {r59, r127}, {r27, r124}, {r221, r271}, {0x0, r303}, {r96, r211}, {r272, r129}, {0x0, r332}, {r164, r219}, {r80, r342}, {r265, r301}, {r206, r127}, {r337, r347}, {r352, r195}, {r52}, {r399, r47}, {r237, r249}, {r199, r56}, {r37, r187}, {r132, r297}], 0xce, "7c3f244000163c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r395}, {r397}, {r394}, {r394}, {r394}, {}, {}, {0x0, r395}, {}, {}, {}, {}, {r393, r395}, {0x0, r395}, {}, {r394, r395}, {0x0, r395}, {}, {}, {}, {0x0, r395}, {}, {0x0, r395}, {0x0, r395}, {}, {}, {}, {}, {r393}, {0x0, r395}, {}, {}, {r393, r395}, {r394}, {}, {0x0, r395}, {r394, r395}, {0x0, r395}, {r393}, {}, {0x0, r395}, {r394}, {}, {}, {r394}, {0x0, r395}, {}, {0x0, r395}, {}, {r190, r395}, {0x0, r395}, {r393}, {}, {r394}, {r393}, {}, {r394}, {}, {0x0, r395}, {0x0, r395}, {}, {}, {r394}, {0x0, r395}, {0x0, r395}, {0x0, r395}, {r394}, {0x0, r395}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r395}, {}, {}, {}, {0x0, r395}, {r393}, {0x0, r395}, {}, {}, {r393, r395}, {}, {}, {}, {}, {}, {}, {}, {r394}, {0x0, r395}, {0x0, r395}, {r393}, {r394, r395}, {0x0, r395}, {0x0, r395}, {}, {}, {}, {r401}, {0x0, r395}, {}, {0x0, r395}, {0x0, r395}, {0x0, r395}, {r394, r395}, {r393, r395}, {r394}, {}, {r393, r395}, {r393}, {}, {}, {r393}, {}, {}, {}, {0x0, r395}, {0x0, r395}, {0x0, r395}, {0x0, r395}, {}, {}, {r393, r395}, {0x0, r395}, {0x0, r395}, {r393, r395}, {0x0, r395}, {}, {}, {r394}, {}, {r34}, {0x0, r395}, {r393}, {}, {r394}, {}, {}, {r394}, {0x0, r395}, {0x0, r395}, {}, {0x0, r395}, {}, {0x0, r395}, {}, {r393}, {}, {}, {}, {0x0, r395}, {r393, r395}, {r394}, {}, {}, {}, {r394}, {}, {}, {}, {r393}, {r400}, {}, {r393}, {r394}, {0x0, r395}, {r393}, {}, {r393}, {0x0, r395}, {r394}, {r393, r395}, {0x0, r395}, {}, {0x0, r395}, {}, {}, {0x0, r395}, {r394}, {}, {}, {r393}, {}, {0x0, r395}, {r394, r395}, {0x0, r395}, {0x0, r395}, {}, {}, {0x0, r395}, {r393}, {r394}, {r394, r395}, {}, {}, {}, {}, {}, {}, {}, {0x0, r395}, {}, {}, {}, {r394}, {}, {}, {r394}, {r394}, {}, {}, {}, {0x0, r395}, {}, {r393, r395}, {r393}, {}, {}, {0x0, r395}, {}, {r394, r395}, {r393}, {0x0, r395}, {}, {}, {r393, r395}, {r394, r395}, {r394}, {r393, r395}, {}, {}, {r394}, {r393, r395}, {0x0, r395}, {}, {0x0, r395}, {r394}, {r394}, {r393}, {}, {0x0, r395}, {r394}, {0x0, r395}, {}, {}, {}, {r393, r395}], 0x1, "2156816c73038c"}) r402 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r402, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) [ 1077.380842][ C1] sd 0:0:1:0: tag#4959 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1077.390913][ C1] sd 0:0:1:0: tag#4959 CDB: opcode=0xe5 (vendor) [ 1077.397265][ C1] sd 0:0:1:0: tag#4959 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1077.406394][ C1] sd 0:0:1:0: tag#4959 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1077.411159][T30841] loop4: detected capacity change from 0 to 512 [ 1077.415465][ C1] sd 0:0:1:0: tag#4959 CDB[20]: ba 10:18:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000006002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1077.447697][T30850] loop5: detected capacity change from 0 to 512 [ 1077.465823][T30850] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1077.476018][T30850] EXT4-fs (loop5): group descriptors corrupted! [ 1077.483962][T30841] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:18:39 executing program 3: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x8) r2 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000000a40)={0x101, [{r4, r5}, {r3, r5}, {r4, r5}, {r4, r5}, {r3, r5}, {r4, r5}, {r4, r5}, {r4, r5}, {r3, r5}, {r4, r5}, {r3, r5}, {r3, r5}, {r3, r5}, {r4, r5}, {r3, r5}, {r3, r5}, {r3, r5}, {r4, r5}, {r3, r5}, {r4, r5}, {r3, r5}, {0x0, r5}, {r3, r5}, {r3, r5}, {r4, r5}, {r4, r5}, {r3, r5}, {r4, r5}, {r4, r5}, {r3, r5}, {r4, r5}, {r3, r5}, {r4, r5}, {r4, r5}, {r4, r5}, {r4, r5}, {r3, r5}, {r3, r5}, {r4, r5}, {r3, r5}, {r3, r5}, {r4}, {r3, r5}, {r3, r5}, {r3, r5}, {r3, r5}, {r3}, {r3, r5}, {r3, r5}, {r4, r5}, {r4, r5}, {r3, r5}, {0x0, r5}, {0x0, r5}, {r4, r5}, {r3, r5}, {r3, r5}, {0x0, r5}, {r4, r5}, {r3, r5}, {r3, r5}, {r4, r5}, {r3}, {r3}, {r4, r5}, {r4, r5}, {r3, r5}, {r4, r5}, {r4}, {r3, r5}, {r4, r5}, {r3}, {r3, r5}, {r3, r5}, {0x0, r5}, {r4, r5}, {r4, r5}, {r3, r5}, {r3, r5}, {r4, r5}, {0x0, r5}, {r4, r5}, {r3, r5}, {0x0, r5}, {r3, r5}, {r3, r5}, {r4, r5}, {r4, r5}, {r4, r5}, {r4, r5}, {0x0, r5}, {r4, r5}, {r4, r5}, {r4, r5}, {r4, r5}, {r3, r5}, {r3, r5}, {0x0, r5}, {r4, r5}, {r4}, {r4, r5}, {r3, r5}, {r3, r5}, {r3, r5}, {0x0, r5}, {0x0, r5}, {r4}, {r4, r5}, {r4}, {r4, r5}, {r4, r5}, {r3, r5}, {r4, r5}, {r4, r5}, {r4, r5}, {}, {r3, r5}, {r3, r5}, {r3, r5}, {r4, r5}, {r4, r5}, {r4, r5}, {r4, r5}, {r4, r5}, {r3}, {r3, r5}, {r4, r5}, {r3, r5}, {r4, r5}, {r4, r5}, {r3, r5}, {r3, r5}, {r4, r5}, {r3, r5}, {}, {r4, r5}, {r4, r5}, {r4, r5}, {r4, r5}, {r3, r5}, {r3, r5}, {r4, r5}, {r3, r5}, {r3, r5}, {r4, r5}, {r3, r5}, {r4, r5}, {r4, r5}, {0x0, r5}, {r4}, {r4, r5}, {r3, r5}, {r3, r5}, {r4, r5}, {r4, r5}, {r4, r5}, {r4}, {r3, r5}, {r3, r5}, {r4}, {r3, r5}, {r3, r5}, {r4, r5}, {r3, r5}, {0x0, r5}, {r3, r5}, {r4, r5}, {r4, r5}, {r3, r5}, {r3, r5}, {r3, r5}, {r3}, {r3, r5}, {0x0, r5}, {r3, r5}, {r4, r5}, {r3, r5}, {0x0, r5}, {r3, r5}, {r3, r5}, {r3, r5}, {r4, r5}, {r4, r5}, {r4, r5}, {r4, r5}, {r3, r5}, {r4, r5}, {r4}, {r4, r5}, {r3}, {r3, r5}, {r3, r5}, {r4, r5}, {r3, r5}, {r4, r5}, {r4, r5}, {r4, r5}, {r4, r5}, {r3, r5}, {r4}, {r3, r5}, {r3, r5}, {0x0, r5}, {r3, r5}, {r4, r5}, {r3}, {r4, r5}, {r4, r5}, {}, {r3, r5}, {r4, r5}, {r3, r5}, {r4, r5}, {r3, r5}, {r3, r5}, {r4}, {r3, r5}, {0x0, r5}, {r4, r5}, {r3}, {r3, r5}, {r4, r5}, {0x0, r5}, {r4, r5}, {r4, r5}, {r4, r5}, {r4}, {r3}, {r4, r5}, {r4, r5}, {r3, r5}, {r4, r5}, {r3, r5}, {r4, r5}, {r3, r5}, {r4, r5}, {r4}, {r3, r5}, {0x0, r5}, {r4, r5}, {r4}, {r4, r5}, {r4, r5}, {r4, r5}, {r3, r5}, {r3, r5}, {r3}, {r4, r5}, {r4, r5}, {r3, r5}, {r3, r5}, {r4}, {r4, r5}, {r3, r5}, {r3, r5}], 0x7, "95a269b71ca765"}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$sg(&(0x7f0000000000), 0x2, 0x0) ioctl$SG_IO(r7, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {r4}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}], 0x8, "7e6830ead6b793"}) r13 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r13, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r13, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r16}, {}, {r15}, {r15}, {r15}, {}, {}, {0x0, r16}, {}, {}, {}, {}, {r14, r16}, {0x0, r16}, {}, {r15, r16}, {0x0, r16}, {}, {}, {}, {0x0, r16}, {}, {0x0, r16}, {0x0, r16}, {}, {}, {}, {}, {r14}, {0x0, r16}, {}, {}, {r14, r16}, {r15}, {}, {0x0, r16}, {r15, r16}, {0x0, r16}, {r14}, {}, {0x0, r16}, {r15}, {}, {}, {r15}, {0x0, r16}, {}, {0x0, r16}, {}, {r12, r16}, {0x0, r16}, {r14}, {}, {r15}, {r14}, {}, {r15}, {}, {0x0, r16}, {0x0, r16}, {}, {}, {r15}, {0x0, r16}, {0x0, r16}, {r10, r16}, {r15}, {0x0, r16}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r16}, {}, {}, {}, {0x0, r16}, {r14}, {0x0, r16}, {}, {}, {r14, r16}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {r15}, {0x0, r16}, {0x0, r16}, {r14}, {r15, r16}, {0x0, r16}, {0x0, r16}, {}, {}, {}, {r14}, {0x0, r16}, {}, {0x0, r16}, {0x0, r16}, {0x0, r16}, {r15, r16}, {r14, r16}, {r15}, {}, {r14, r16}, {r14}, {}, {}, {r14}, {}, {}, {}, {0x0, r16}, {0x0, r16}, {0x0, r16}, {0x0, r16}, {}, {}, {r14, r16}, {0x0, r16}, {0x0, r16}, {r14, r16}, {0x0, r16}, {}, {}, {r15}, {}, {r9}, {0x0, r16}, {r14}, {}, {r15}, {}, {}, {r15}, {0x0, r16}, {0x0, r16}, {}, {0x0, r16}, {}, {0x0, r16}, {}, {r14}, {}, {}, {}, {0x0, r16}, {r14, r16}, {r15}, {}, {}, {}, {r15}, {}, {}, {}, {r14}, {r14}, {}, {r14}, {r15}, {0x0, r16}, {r14}, {}, {r14}, {0x0, r16}, {r15}, {r14, r16}, {0x0, r16}, {}, {0x0, r16}, {}, {}, {0x0, r16}, {r15}, {}, {}, {r14}, {}, {0x0, r16}, {r15, r16}, {0x0, r16}, {0x0, r16}, {}, {}, {0x0, r16}, {r14}, {r15}, {r15, r16}, {}, {}, {}, {}, {}, {}, {}, {0x0, r16}, {}, {}, {}, {r15}, {}, {0x0, r11}, {r15}, {r15}, {}, {}, {}, {0x0, r16}, {}, {r14, r16}, {r14}, {}, {}, {0x0, r16}, {}, {r15, r16}, {r14}, {0x0, r16}, {}, {}, {r14, r16}, {r15, r16}, {r15}, {r14, r16}, {}, {}, {r15}, {r14, r16}, {0x0, r16}, {}, {0x0, r16}, {r15}, {r15}, {r14}, {}, {0x0, r16}, {r15}, {0x0, r16}, {}, {}, {}, {r14, r16}], 0x1, "2156816c73038c"}) r17 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r17, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) dup2(r2, r17) 10:18:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000406002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1077.526320][T30841] loop4: detected capacity change from 0 to 512 [ 1077.532793][T30850] loop5: detected capacity change from 0 to 512 [ 1077.547890][T30841] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1077.557644][T30850] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1077.567788][T30850] EXT4-fs (loop5): group descriptors corrupted! 10:18:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce0074000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) [ 1077.589063][T30874] loop2: detected capacity change from 0 to 264192 10:18:40 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000007002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:40 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x400000, 0x16) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r4}, {}, {r3}, {r3}, {r3}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {r2, r4}, {0x0, r4}, {}, {r3, r4}, {0x0, r4}, {}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {0x0, r4}, {}, {}, {}, {}, {r2}, {0x0, r4}, {}, {}, {r2, r4}, {r3}, {}, {0x0, r4}, {r3, r4}, {0x0, r4}, {r2}, {}, {0x0, r4}, {r3}, {}, {}, {r3}, {0x0, r4}, {}, {0x0, r4}, {}, {0x0, r4}, {0x0, r4}, {r2}, {}, {r3}, {r2}, {}, {r3}, {}, {0x0, r4}, {0x0, r4}, {}, {}, {r3}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {r3}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {0x0, r4}, {r2}, {0x0, r4}, {}, {}, {r2, r4}, {}, {}, {}, {}, {}, {}, {}, {r3}, {0x0, r4}, {0x0, r4}, {r2}, {r3, r4}, {0x0, r4}, {0x0, r4}, {}, {}, {}, {r2}, {0x0, r4}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {r3, r4}, {r2, r4}, {r3}, {}, {r2, r4}, {r2}, {}, {}, {r2}, {}, {}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {}, {r2, r4}, {0x0, r4}, {0x0, r4}, {r2, r4}, {0x0, r4}, {}, {}, {r3}, {}, {}, {0x0, r4}, {r2}, {}, {r3}, {}, {}, {r3}, {0x0, r4}, {0x0, r4}, {}, {0x0, r4}, {}, {0x0, r4}, {}, {r2}, {}, {}, {}, {0x0, r4}, {r2, r4}, {r3}, {}, {}, {}, {r3}, {}, {}, {}, {r2}, {r2}, {}, {r2}, {r3}, {0x0, r4}, {r2}, {}, {r2}, {0x0, r4}, {r3}, {r2, r4}, {0x0, r4}, {}, {0x0, r4}, {}, {}, {0x0, r4}, {r3}, {}, {}, {r2}, {}, {0x0, r4}, {r3, r4}, {0x0, r4}, {0x0, r4}, {}, {}, {0x0, r4}, {r2}, {r3}, {r3, r4}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {r3}, {}, {}, {r3}, {r3}, {}, {}, {}, {0x0, r4}, {}, {r2, r4}, {r2}, {}, {}, {0x0, r4}, {}, {r3, r4}, {r2}, {0x0, r4}, {}, {}, {r2, r4}, {r3, r4}, {r3}, {r2, r4}, {}, {}, {r3}, {r2, r4}, {0x0, r4}, {}, {0x0, r4}, {r3}, {r3}, {r2}, {}, {0x0, r4}, {r3}, {0x0, r4}, {}, {}, {}, {r2, r4}], 0x1, "2156816c73038c"}) r5 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r5, 0x0, 0x8400fffffffa) r6 = creat(&(0x7f0000000000)='./file0\x00', 0x0) connect$netlink(r6, 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r6, 0x40086607, &(0x7f0000000100)=0x81) mkdirat(r6, &(0x7f0000000180)='./file1\x00', 0x4) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) [ 1077.655128][T30885] loop4: detected capacity change from 0 to 512 [ 1077.663980][T30874] msdos filesystem being mounted at /root/syzkaller-testdir156917949/syzkaller.TDnRSM/2034/file1 supports timestamps until 2107 (0x10391447e) [ 1077.690636][T30885] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1077.799994][T30898] EXT4-fs warning (device sda1): ext4_group_extend:1805: can't shrink FS - resize aborted 10:18:40 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x401, 0x8, &(0x7f00000008c0)=[{0x0}, {0x0, 0x0, 0x9}, {&(0x7f0000000180)="5030a6b9906c95e36ee1b07f9e5698893307dd91cd0319578b614ed5f1873eb0", 0x20, 0xfffffffffffffffd}, {&(0x7f0000000340)="2df6157d4494279dde2031db3b2744b435271e65a343796db3da0bb347a3215e9b71", 0x22, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f5bf3f90b3d3e7d7132c3012ab7043e22a6f8edc5e516ee833a4fdcf825d9da3fed17cac003d9dd022d", 0xa4, 0x7fffffff}, {&(0x7f0000000500)="822171b91eb1498a4740794c5db7bc7a965f6bf8c7cf5baee0946ad2aa4b016a8a03bb30b092e47cd74a4fab60e1d1443c33c80fa2ef7af6514920209443a39077bb6a856f3c3e40bb7182a08692593ab13f04b516500ed3b3256325f48aafef3d8ca84cdce2b0609ed9c6346c356964614f21f9699436b6ca419197a0729a46ae7ae36fd203e577f2b03891ce7ba975aa5d47214e98c73647d20e757d1ce2d1990688090eee936562a1b4968deb59f6a2980feca28742afcaf376ab51294f57d6334c86538795c11e018be19db248ea75e1", 0xd2, 0x10000}, {&(0x7f0000000600)="4a6006458a4a1e3060e4cca0086f3b44f908e6941741cf7422f159df72a1cdb68c01ef3f102d2afb1e3e446c41bef79e359d62ed3155330d3b2f5207705e6dfa86f4f655d80ee44134bb9211fed0be8f7f86ff1f4b5abab22df6a1bfed2d66e51791fcbbf6f6926ce384fda7a7e86c17dcc2b2473f22c6d095ade56596ee656b3c596a038658b30895170a9ab2d4379f4f58cc6e", 0x94, 0x9}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f0000000ac0)={[{@dots}, {@fat=@sys_immutable}, {@nodots}, {@fat=@umask}], [{@measure}, {@appraise}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@seclabel}]}) openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f80)={0x1, &(0x7f0000000f40)=[{0x7f}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000fc0), 0xc, &(0x7f0000000200)={&(0x7f0000003940)=ANY=[@ANYRES64=r7, @ANYRESHEX, @ANYRES32=r6, @ANYRESOCT=r3, @ANYRESOCT=r4, @ANYBLOB="16de71cf0766d82ab6b67f0cd79e8e3ee2643e2e5026c3ea1ccfde1fe0912c50f4450c9c7749b181ae244aa09bb447092b0b62871d5ab9b62bc1121905ff995d268176192bba6bbfe4ff322f3370ce1ac7b5dd004238de507070dc0002cfe8ca03a81158f62018fe98245631fc021061fec067e33a1c01f786dafad477a72fcf767c43d28917995da3bd4df41908d180cd9517f24d97f14674a9a15bb602dca6587204d6571e02a456eb415ea3208e6afe4ed4f3533d7cf074ed4bd702d74e242405fadcd0c73dbb590bb430b54691990800f66109473f3531c01f00"/234], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x40025) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r10, r9, 0x0, 0x10000000d) [ 1078.293538][ C1] sd 0:0:1:0: tag#4943 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1078.303392][ C1] sd 0:0:1:0: tag#4943 CDB: opcode=0xe5 (vendor) [ 1078.309780][ C1] sd 0:0:1:0: tag#4943 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1078.318862][ C1] sd 0:0:1:0: tag#4943 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1078.327908][ C1] sd 0:0:1:0: tag#4943 CDB[20]: ba 10:18:40 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {}, {r5}, {}, {r5}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {0x0, r6}, {}, {r2, r6}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {}, {r5}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {}, {}, {r4}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {}, {r1}, {0x0, r6}, {r4}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {r5}, {}, {}, {r5}, {r5}, {}, {}, {}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {}, {r5, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5, r6}, {r5}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4, r6}], 0x1, "2156816c73038c"}) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) 10:18:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000a000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce007a000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:40 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000008002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:40 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000018002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1078.462643][T30912] loop4: detected capacity change from 0 to 512 [ 1078.477267][T30916] loop5: detected capacity change from 0 to 512 [ 1078.494623][T30912] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:18:40 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000000000000001c002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1078.524579][T30916] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1078.534723][T30916] EXT4-fs (loop5): group descriptors corrupted! [ 1078.545492][T30912] loop4: detected capacity change from 0 to 512 [ 1078.566108][T30912] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1078.599371][T30934] EXT4-fs warning (device sda1): ext4_group_extend:1805: can't shrink FS - resize aborted [ 1078.619304][T30916] loop5: detected capacity change from 0 to 512 [ 1078.626436][T30936] loop2: detected capacity change from 0 to 264192 [ 1078.639725][T30916] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! 10:18:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000026002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000cefffe000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000000000000052b002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1078.649939][T30916] EXT4-fs (loop5): group descriptors corrupted! [ 1078.690808][T30936] msdos filesystem being mounted at /root/syzkaller-testdir156917949/syzkaller.TDnRSM/2035/file1 supports timestamps until 2107 (0x10391447e) [ 1078.718529][T30956] loop4: detected capacity change from 0 to 512 10:18:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000b000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) [ 1078.742395][T30956] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:18:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000000000000003f002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1078.795840][T30956] loop4: detected capacity change from 0 to 512 [ 1078.800454][T30965] loop5: detected capacity change from 0 to 512 [ 1078.818144][T30956] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1078.846902][T30965] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1078.857031][T30965] EXT4-fs (loop5): group descriptors corrupted! [ 1078.942564][T30965] loop5: detected capacity change from 0 to 512 [ 1078.951780][T30965] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1078.961986][T30965] EXT4-fs (loop5): group descriptors corrupted! 10:18:41 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x401, 0x8, &(0x7f00000008c0)=[{0x0}, {0x0, 0x0, 0x9}, {&(0x7f0000000180)="5030a6b9906c95e36ee1b07f9e5698893307dd91cd0319578b614ed5f1873eb0", 0x20, 0xfffffffffffffffd}, {&(0x7f0000000340)="2df6157d4494279dde2031db3b2744b435271e65a343796db3da0bb347a3215e9b71", 0x22, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f5bf3f90b3d3e7d7132c3012ab7043e22a6f8edc5e516ee833a4fdcf825d9da3fed17cac003d9dd022d", 0xa4, 0x7fffffff}, {&(0x7f0000000500)="822171b91eb1498a4740794c5db7bc7a965f6bf8c7cf5baee0946ad2aa4b016a8a03bb30b092e47cd74a4fab60e1d1443c33c80fa2ef7af6514920209443a39077bb6a856f3c3e40bb7182a08692593ab13f04b516500ed3b3256325f48aafef3d8ca84cdce2b0609ed9c6346c356964614f21f9699436b6ca419197a0729a46ae7ae36fd203e577f2b03891ce7ba975aa5d47214e98c73647d20e757d1ce2d1990688090eee936562a1b4968deb59f6a2980feca28742afcaf376ab51294f57d6334c86538795c11e018be19db248ea75e1", 0xd2, 0x10000}, {&(0x7f0000000600)="4a6006458a4a1e3060e4cca0086f3b44f908e6941741cf7422f159df72a1cdb68c01ef3f102d2afb1e3e446c41bef79e359d62ed3155330d3b2f5207705e6dfa86f4f655d80ee44134bb9211fed0be8f7f86ff1f4b5abab22df6a1bfed2d66e51791fcbbf6f6926ce384fda7a7e86c17dcc2b2473f22c6d095ade56596ee656b3c596a038658b30895170a9ab2d4379f4f58cc6e", 0x94, 0x9}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f0000000ac0)={[{@dots}, {@fat=@sys_immutable}, {@nodots}, {@fat=@umask}], [{@measure}, {@appraise}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@seclabel}]}) openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f80)={0x1, &(0x7f0000000f40)=[{0x7f}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000fc0), 0xc, &(0x7f0000000200)={&(0x7f0000003940)=ANY=[@ANYRES64=r7, @ANYRESHEX, @ANYRES32=r6, @ANYRESOCT=r3, @ANYRESOCT=r4, @ANYBLOB="16de71cf0766d82ab6b67f0cd79e8e3ee2643e2e5026c3ea1ccfde1fe0912c50f4450c9c7749b181ae244aa09bb447092b0b62871d5ab9b62bc1121905ff995d268176192bba6bbfe4ff322f3370ce1ac7b5dd004238de507070dc0002cfe8ca03a81158f62018fe98245631fc021061fec067e33a1c01f786dafad477a72fcf767c43d28917995da3bd4df41908d180cd9517f24d97f14674a9a15bb602dca6587204d6571e02a456eb415ea3208e6afe4ed4f3533d7cf074ed4bd702d74e242405fadcd0c73dbb590bb430b54691990800f66109473f3531c01f00"/234], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x40025) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r10, r9, 0x0, 0x10000000f) 10:18:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce0fff000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000040002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000c000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:41 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {}, {r5}, {}, {r5}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {0x0, r6}, {}, {r2, r6}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {}, {r5}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {}, {}, {r4}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {}, {r1}, {0x0, r6}, {r4}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {r5}, {}, {}, {r5}, {r5}, {}, {}, {}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {}, {r5, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5, r6}, {r5}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4, r6}], 0x1, "2156816c73038c"}) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) 10:18:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000080040002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1079.146744][T30993] loop5: detected capacity change from 0 to 512 [ 1079.159208][T30998] loop4: detected capacity change from 0 to 512 [ 1079.184024][T30993] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1079.194164][T30993] EXT4-fs (loop5): group descriptors corrupted! [ 1079.213703][T30998] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1079.226094][ C1] sd 0:0:1:0: tag#4989 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1079.235950][ C1] sd 0:0:1:0: tag#4989 CDB: opcode=0xe5 (vendor) 10:18:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000480002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1079.242281][ C1] sd 0:0:1:0: tag#4989 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1079.248356][T31009] loop2: detected capacity change from 0 to 264192 [ 1079.251327][ C1] sd 0:0:1:0: tag#4989 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1079.266845][ C1] sd 0:0:1:0: tag#4989 CDB[20]: ba 10:18:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000fffffff6002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1079.294662][T31009] msdos filesystem being mounted at /root/syzkaller-testdir156917949/syzkaller.TDnRSM/2036/file1 supports timestamps until 2107 (0x10391447e) [ 1079.310917][T30998] loop4: detected capacity change from 0 to 512 [ 1079.315099][T30993] loop5: detected capacity change from 0 to 512 [ 1079.324296][T30998] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:18:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000cefeff000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) [ 1079.380745][T30993] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1079.390870][T30993] EXT4-fs (loop5): group descriptors corrupted! 10:18:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000fffffffe002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000d000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000f6ffffff002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:41 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x401, 0x8, &(0x7f00000008c0)=[{0x0}, {0x0, 0x0, 0x9}, {&(0x7f0000000180)="5030a6b9906c95e36ee1b07f9e5698893307dd91cd0319578b614ed5f1873eb0", 0x20, 0xfffffffffffffffd}, {&(0x7f0000000340)="2df6157d4494279dde2031db3b2744b435271e65a343796db3da0bb347a3215e9b71", 0x22, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f5bf3f90b3d3e7d7132c3012ab7043e22a6f8edc5e516ee833a4fdcf825d9da3fed17cac003d9dd022d", 0xa4, 0x7fffffff}, {&(0x7f0000000500)="822171b91eb1498a4740794c5db7bc7a965f6bf8c7cf5baee0946ad2aa4b016a8a03bb30b092e47cd74a4fab60e1d1443c33c80fa2ef7af6514920209443a39077bb6a856f3c3e40bb7182a08692593ab13f04b516500ed3b3256325f48aafef3d8ca84cdce2b0609ed9c6346c356964614f21f9699436b6ca419197a0729a46ae7ae36fd203e577f2b03891ce7ba975aa5d47214e98c73647d20e757d1ce2d1990688090eee936562a1b4968deb59f6a2980feca28742afcaf376ab51294f57d6334c86538795c11e018be19db248ea75e1", 0xd2, 0x10000}, {&(0x7f0000000600)="4a6006458a4a1e3060e4cca0086f3b44f908e6941741cf7422f159df72a1cdb68c01ef3f102d2afb1e3e446c41bef79e359d62ed3155330d3b2f5207705e6dfa86f4f655d80ee44134bb9211fed0be8f7f86ff1f4b5abab22df6a1bfed2d66e51791fcbbf6f6926ce384fda7a7e86c17dcc2b2473f22c6d095ade56596ee656b3c596a038658b30895170a9ab2d4379f4f58cc6e", 0x94, 0x9}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f0000000ac0)={[{@dots}, {@fat=@sys_immutable}, {@nodots}, {@fat=@umask}], [{@measure}, {@appraise}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@seclabel}]}) openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f80)={0x1, &(0x7f0000000f40)=[{0x7f}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000fc0), 0xc, &(0x7f0000000200)={&(0x7f0000003940)=ANY=[@ANYRES64=r7, @ANYRESHEX, @ANYRES32=r6, @ANYRESOCT=r3, @ANYRESOCT=r4, @ANYBLOB="16de71cf0766d82ab6b67f0cd79e8e3ee2643e2e5026c3ea1ccfde1fe0912c50f4450c9c7749b181ae244aa09bb447092b0b62871d5ab9b62bc1121905ff995d268176192bba6bbfe4ff322f3370ce1ac7b5dd004238de507070dc0002cfe8ca03a81158f62018fe98245631fc021061fec067e33a1c01f786dafad477a72fcf767c43d28917995da3bd4df41908d180cd9517f24d97f14674a9a15bb602dca6587204d6571e02a456eb415ea3208e6afe4ed4f3533d7cf074ed4bd702d74e242405fadcd0c73dbb590bb430b54691990800f66109473f3531c01f00"/234], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x40025) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r10, r9, 0x0, 0x100000010) [ 1079.445807][T31038] loop4: detected capacity change from 0 to 512 [ 1079.481303][T31038] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1079.545710][T31038] loop4: detected capacity change from 0 to 512 [ 1079.558561][T31038] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1079.565915][T31059] loop5: detected capacity change from 0 to 512 10:18:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000feffffff002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1079.603096][T31059] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1079.613235][T31059] EXT4-fs (loop5): group descriptors corrupted! [ 1079.613455][ C1] sd 0:0:1:0: tag#4930 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1079.629480][ C1] sd 0:0:1:0: tag#4930 CDB: opcode=0xe5 (vendor) [ 1079.635838][ C1] sd 0:0:1:0: tag#4930 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c 10:18:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce00000010000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000006000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1079.644886][ C1] sd 0:0:1:0: tag#4930 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1079.653936][ C1] sd 0:0:1:0: tag#4930 CDB[20]: ba [ 1079.714364][T31071] loop4: detected capacity change from 0 to 512 [ 1079.743945][T31071] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1079.805373][T31071] loop4: detected capacity change from 0 to 512 [ 1079.821033][T31071] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:18:42 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {}, {r5}, {}, {r5}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {0x0, r6}, {}, {r2, r6}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {}, {r5}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {}, {}, {r4}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {}, {r1}, {0x0, r6}, {r4}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {r5}, {}, {}, {r5}, {r5}, {}, {}, {}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {}, {r5, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5, r6}, {r5}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4, r6}], 0x1, "2156816c73038c"}) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) 10:18:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000e000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000020000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:42 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x401, 0x8, &(0x7f00000008c0)=[{0x0}, {0x0, 0x0, 0x9}, {&(0x7f0000000180)="5030a6b9906c95e36ee1b07f9e5698893307dd91cd0319578b614ed5f1873eb0", 0x20, 0xfffffffffffffffd}, {&(0x7f0000000340)="2df6157d4494279dde2031db3b2744b435271e65a343796db3da0bb347a3215e9b71", 0x22, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f5bf3f90b3d3e7d7132c3012ab7043e22a6f8edc5e516ee833a4fdcf825d9da3fed17cac003d9dd022d", 0xa4, 0x7fffffff}, {&(0x7f0000000500)="822171b91eb1498a4740794c5db7bc7a965f6bf8c7cf5baee0946ad2aa4b016a8a03bb30b092e47cd74a4fab60e1d1443c33c80fa2ef7af6514920209443a39077bb6a856f3c3e40bb7182a08692593ab13f04b516500ed3b3256325f48aafef3d8ca84cdce2b0609ed9c6346c356964614f21f9699436b6ca419197a0729a46ae7ae36fd203e577f2b03891ce7ba975aa5d47214e98c73647d20e757d1ce2d1990688090eee936562a1b4968deb59f6a2980feca28742afcaf376ab51294f57d6334c86538795c11e018be19db248ea75e1", 0xd2, 0x10000}, {&(0x7f0000000600)="4a6006458a4a1e3060e4cca0086f3b44f908e6941741cf7422f159df72a1cdb68c01ef3f102d2afb1e3e446c41bef79e359d62ed3155330d3b2f5207705e6dfa86f4f655d80ee44134bb9211fed0be8f7f86ff1f4b5abab22df6a1bfed2d66e51791fcbbf6f6926ce384fda7a7e86c17dcc2b2473f22c6d095ade56596ee656b3c596a038658b30895170a9ab2d4379f4f58cc6e", 0x94, 0x9}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f0000000ac0)={[{@dots}, {@fat=@sys_immutable}, {@nodots}, {@fat=@umask}], [{@measure}, {@appraise}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@seclabel}]}) openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f80)={0x1, &(0x7f0000000f40)=[{0x7f}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000fc0), 0xc, &(0x7f0000000200)={&(0x7f0000003940)=ANY=[@ANYRES64=r7, @ANYRESHEX, @ANYRES32=r6, @ANYRESOCT=r3, @ANYRESOCT=r4, @ANYBLOB="16de71cf0766d82ab6b67f0cd79e8e3ee2643e2e5026c3ea1ccfde1fe0912c50f4450c9c7749b181ae244aa09bb447092b0b62871d5ab9b62bc1121905ff995d268176192bba6bbfe4ff322f3370ce1ac7b5dd004238de507070dc0002cfe8ca03a81158f62018fe98245631fc021061fec067e33a1c01f786dafad477a72fcf767c43d28917995da3bd4df41908d180cd9517f24d97f14674a9a15bb602dca6587204d6571e02a456eb415ea3208e6afe4ed4f3533d7cf074ed4bd702d74e242405fadcd0c73dbb590bb430b54691990800f66109473f3531c01f00"/234], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x40025) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r10, r9, 0x0, 0x100000064) 10:18:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce00000011000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) [ 1079.921591][T31090] loop5: detected capacity change from 0 to 512 [ 1079.947918][T31094] loop4: detected capacity change from 0 to 512 10:18:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000030000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1079.966068][T31090] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1079.976260][T31090] EXT4-fs (loop5): group descriptors corrupted! [ 1079.990491][T31094] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1080.013564][T31107] loop2: detected capacity change from 0 to 264192 10:18:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000040000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1080.053994][T31107] msdos filesystem being mounted at /root/syzkaller-testdir156917949/syzkaller.TDnRSM/2037/file1 supports timestamps until 2107 (0x10391447e) [ 1080.069353][ C1] sd 0:0:1:0: tag#4971 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1080.079309][ C1] sd 0:0:1:0: tag#4971 CDB: opcode=0xe5 (vendor) [ 1080.085755][ C1] sd 0:0:1:0: tag#4971 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1080.094807][ C1] sd 0:0:1:0: tag#4971 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d 10:18:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000050000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1080.104455][ C1] sd 0:0:1:0: tag#4971 CDB[20]: ba [ 1080.115914][T31090] loop5: detected capacity change from 0 to 512 [ 1080.136856][T31090] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1080.146979][T31090] EXT4-fs (loop5): group descriptors corrupted! 10:18:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00000010000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000060000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1080.222563][T31094] loop4: detected capacity change from 0 to 512 [ 1080.240534][T31094] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1080.254487][T31127] loop5: detected capacity change from 0 to 512 10:18:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000070000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce00000012000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) [ 1080.292733][T31127] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1080.303042][T31127] EXT4-fs (loop5): group descriptors corrupted! [ 1080.403947][T31145] loop4: detected capacity change from 0 to 512 [ 1080.421025][T31127] loop5: detected capacity change from 0 to 512 [ 1080.435780][T31127] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1080.446125][T31127] EXT4-fs (loop5): group descriptors corrupted! [ 1080.452584][T31145] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1080.543699][T31145] loop4: detected capacity change from 0 to 512 [ 1080.550454][T31145] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:18:43 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {}, {r5}, {}, {r5}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5}, {}, {0x0, r6}, {r5, r6}, {}, {r4}, {}, {0x0, r6}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {0x0, r6}, {}, {r2, r6}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {}, {r5}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {}, {}, {r4}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {}, {r1}, {0x0, r6}, {r4}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {r5}, {}, {}, {r5}, {r5}, {}, {}, {}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {}, {r5, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5, r6}, {r5}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4, r6}], 0x1, "2156816c73038c"}) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) 10:18:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000080000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00000011000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce0000003f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:43 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x401, 0x8, &(0x7f00000008c0)=[{0x0}, {0x0, 0x0, 0x9}, {&(0x7f0000000180)="5030a6b9906c95e36ee1b07f9e5698893307dd91cd0319578b614ed5f1873eb0", 0x20, 0xfffffffffffffffd}, {&(0x7f0000000340)="2df6157d4494279dde2031db3b2744b435271e65a343796db3da0bb347a3215e9b71", 0x22, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f5bf3f90b3d3e7d7132c3012ab7043e22a6f8edc5e516ee833a4fdcf825d9da3fed17cac003d9dd022d", 0xa4, 0x7fffffff}, {&(0x7f0000000500)="822171b91eb1498a4740794c5db7bc7a965f6bf8c7cf5baee0946ad2aa4b016a8a03bb30b092e47cd74a4fab60e1d1443c33c80fa2ef7af6514920209443a39077bb6a856f3c3e40bb7182a08692593ab13f04b516500ed3b3256325f48aafef3d8ca84cdce2b0609ed9c6346c356964614f21f9699436b6ca419197a0729a46ae7ae36fd203e577f2b03891ce7ba975aa5d47214e98c73647d20e757d1ce2d1990688090eee936562a1b4968deb59f6a2980feca28742afcaf376ab51294f57d6334c86538795c11e018be19db248ea75e1", 0xd2, 0x10000}, {&(0x7f0000000600)="4a6006458a4a1e3060e4cca0086f3b44f908e6941741cf7422f159df72a1cdb68c01ef3f102d2afb1e3e446c41bef79e359d62ed3155330d3b2f5207705e6dfa86f4f655d80ee44134bb9211fed0be8f7f86ff1f4b5abab22df6a1bfed2d66e51791fcbbf6f6926ce384fda7a7e86c17dcc2b2473f22c6d095ade56596ee656b3c596a038658b30895170a9ab2d4379f4f58cc6e", 0x94, 0x9}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f0000000ac0)={[{@dots}, {@fat=@sys_immutable}, {@nodots}, {@fat=@umask}], [{@measure}, {@appraise}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@seclabel}]}) openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f80)={0x1, &(0x7f0000000f40)=[{0x7f}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000fc0), 0xc, &(0x7f0000000200)={&(0x7f0000003940)=ANY=[@ANYRES64=r7, @ANYRESHEX, @ANYRES32=r6, @ANYRESOCT=r3, @ANYRESOCT=r4, @ANYBLOB="16de71cf0766d82ab6b67f0cd79e8e3ee2643e2e5026c3ea1ccfde1fe0912c50f4450c9c7749b181ae244aa09bb447092b0b62871d5ab9b62bc1121905ff995d268176192bba6bbfe4ff322f3370ce1ac7b5dd004238de507070dc0002cfe8ca03a81158f62018fe98245631fc021061fec067e33a1c01f786dafad477a72fcf767c43d28917995da3bd4df41908d180cd9517f24d97f14674a9a15bb602dca6587204d6571e02a456eb415ea3208e6afe4ed4f3533d7cf074ed4bd702d74e242405fadcd0c73dbb590bb430b54691990800f66109473f3531c01f00"/234], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x40025) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r10, r9, 0x0, 0x1000002b2) 10:18:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000180000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1080.887599][T31174] loop5: detected capacity change from 0 to 512 [ 1080.904069][T31178] loop4: detected capacity change from 0 to 512 [ 1080.921468][T31178] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:18:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000001c0000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1080.931656][T31174] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1080.941876][T31174] EXT4-fs (loop5): group descriptors corrupted! [ 1080.964653][T31189] loop2: detected capacity change from 0 to 264192 10:18:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce00000040000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) [ 1080.983296][ C0] sd 0:0:1:0: tag#4966 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1080.993165][ C0] sd 0:0:1:0: tag#4966 CDB: opcode=0xe5 (vendor) [ 1080.999504][ C0] sd 0:0:1:0: tag#4966 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1081.008555][ C0] sd 0:0:1:0: tag#4966 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1081.017888][ C0] sd 0:0:1:0: tag#4966 CDB[20]: ba 10:18:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000260000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1081.047499][T31189] msdos filesystem being mounted at /root/syzkaller-testdir156917949/syzkaller.TDnRSM/2038/file1 supports timestamps until 2107 (0x10391447e) [ 1081.069328][T31174] loop5: detected capacity change from 0 to 512 [ 1081.091122][T31205] loop4: detected capacity change from 0 to 512 10:18:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000fe0000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1081.105928][T31174] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1081.116095][T31174] EXT4-fs (loop5): group descriptors corrupted! [ 1081.137551][T31205] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:18:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce00000012000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:43 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x401, 0x8, &(0x7f00000008c0)=[{0x0}, {0x0, 0x0, 0x9}, {&(0x7f0000000180)="5030a6b9906c95e36ee1b07f9e5698893307dd91cd0319578b614ed5f1873eb0", 0x20, 0xfffffffffffffffd}, {&(0x7f0000000340)="2df6157d4494279dde2031db3b2744b435271e65a343796db3da0bb347a3215e9b71", 0x22, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f5bf3f90b3d3e7d7132c3012ab7043e22a6f8edc5e516ee833a4fdcf825d9da3fed17cac003d9dd022d", 0xa4, 0x7fffffff}, {&(0x7f0000000500)="822171b91eb1498a4740794c5db7bc7a965f6bf8c7cf5baee0946ad2aa4b016a8a03bb30b092e47cd74a4fab60e1d1443c33c80fa2ef7af6514920209443a39077bb6a856f3c3e40bb7182a08692593ab13f04b516500ed3b3256325f48aafef3d8ca84cdce2b0609ed9c6346c356964614f21f9699436b6ca419197a0729a46ae7ae36fd203e577f2b03891ce7ba975aa5d47214e98c73647d20e757d1ce2d1990688090eee936562a1b4968deb59f6a2980feca28742afcaf376ab51294f57d6334c86538795c11e018be19db248ea75e1", 0xd2, 0x10000}, {&(0x7f0000000600)="4a6006458a4a1e3060e4cca0086f3b44f908e6941741cf7422f159df72a1cdb68c01ef3f102d2afb1e3e446c41bef79e359d62ed3155330d3b2f5207705e6dfa86f4f655d80ee44134bb9211fed0be8f7f86ff1f4b5abab22df6a1bfed2d66e51791fcbbf6f6926ce384fda7a7e86c17dcc2b2473f22c6d095ade56596ee656b3c596a038658b30895170a9ab2d4379f4f58cc6e", 0x94, 0x9}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f0000000ac0)={[{@dots}, {@fat=@sys_immutable}, {@nodots}, {@fat=@umask}], [{@measure}, {@appraise}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@seclabel}]}) openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f80)={0x1, &(0x7f0000000f40)=[{0x7f}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000fc0), 0xc, &(0x7f0000000200)={&(0x7f0000003940)=ANY=[@ANYRES64=r7, @ANYRESHEX, @ANYRES32=r6, @ANYRESOCT=r3, @ANYRESOCT=r4, @ANYBLOB="16de71cf0766d82ab6b67f0cd79e8e3ee2643e2e5026c3ea1ccfde1fe0912c50f4450c9c7749b181ae244aa09bb447092b0b62871d5ab9b62bc1121905ff995d268176192bba6bbfe4ff322f3370ce1ac7b5dd004238de507070dc0002cfe8ca03a81158f62018fe98245631fc021061fec067e33a1c01f786dafad477a72fcf767c43d28917995da3bd4df41908d180cd9517f24d97f14674a9a15bb602dca6587204d6571e02a456eb415ea3208e6afe4ed4f3533d7cf074ed4bd702d74e242405fadcd0c73dbb590bb430b54691990800f66109473f3531c01f00"/234], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x40025) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r10, r9, 0x0, 0x100000b35) [ 1081.209462][T31205] loop4: detected capacity change from 0 to 512 [ 1081.219923][T31205] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1081.244741][T31230] loop5: detected capacity change from 0 to 512 [ 1081.260369][T31230] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1081.270884][T31230] EXT4-fs (loop5): group descriptors corrupted! [ 1081.324364][T31230] loop5: detected capacity change from 0 to 512 [ 1081.333874][T31230] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1081.339504][ C0] sd 0:0:1:0: tag#4940 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1081.344094][T31230] EXT4-fs (loop5): group descriptors corrupted! [ 1081.353896][ C0] sd 0:0:1:0: tag#4940 CDB: opcode=0xe5 (vendor) [ 1081.366450][ C0] sd 0:0:1:0: tag#4940 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1081.375691][ C0] sd 0:0:1:0: tag#4940 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1081.384832][ C0] sd 0:0:1:0: tag#4940 CDB[20]: ba 10:18:44 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {}, {r5}, {}, {r5}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5}, {}, {0x0, r6}, {r5, r6}, {}, {r4}, {}, {0x0, r6}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {0x0, r6}, {}, {r2, r6}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {}, {r5}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {}, {}, {r4}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {}, {r1}, {0x0, r6}, {r4}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {r5}, {}, {}, {r5}, {r5}, {}, {}, {}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {}, {r5, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5, r6}, {r5}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4, r6}], 0x1, "2156816c73038c"}) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) 10:18:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000040200002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce000007cd000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce000000cd070000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:44 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x401, 0x8, &(0x7f00000008c0)=[{0x0}, {0x0, 0x0, 0x9}, {&(0x7f0000000180)="5030a6b9906c95e36ee1b07f9e5698893307dd91cd0319578b614ed5f1873eb0", 0x20, 0xfffffffffffffffd}, {&(0x7f0000000340)="2df6157d4494279dde2031db3b2744b435271e65a343796db3da0bb347a3215e9b71", 0x22, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f5bf3f90b3d3e7d7132c3012ab7043e22a6f8edc5e516ee833a4fdcf825d9da3fed17cac003d9dd022d", 0xa4, 0x7fffffff}, {&(0x7f0000000500)="822171b91eb1498a4740794c5db7bc7a965f6bf8c7cf5baee0946ad2aa4b016a8a03bb30b092e47cd74a4fab60e1d1443c33c80fa2ef7af6514920209443a39077bb6a856f3c3e40bb7182a08692593ab13f04b516500ed3b3256325f48aafef3d8ca84cdce2b0609ed9c6346c356964614f21f9699436b6ca419197a0729a46ae7ae36fd203e577f2b03891ce7ba975aa5d47214e98c73647d20e757d1ce2d1990688090eee936562a1b4968deb59f6a2980feca28742afcaf376ab51294f57d6334c86538795c11e018be19db248ea75e1", 0xd2, 0x10000}, {&(0x7f0000000600)="4a6006458a4a1e3060e4cca0086f3b44f908e6941741cf7422f159df72a1cdb68c01ef3f102d2afb1e3e446c41bef79e359d62ed3155330d3b2f5207705e6dfa86f4f655d80ee44134bb9211fed0be8f7f86ff1f4b5abab22df6a1bfed2d66e51791fcbbf6f6926ce384fda7a7e86c17dcc2b2473f22c6d095ade56596ee656b3c596a038658b30895170a9ab2d4379f4f58cc6e", 0x94, 0x9}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f0000000ac0)={[{@dots}, {@fat=@sys_immutable}, {@nodots}, {@fat=@umask}], [{@measure}, {@appraise}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@seclabel}]}) openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f80)={0x1, &(0x7f0000000f40)=[{0x7f}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000fc0), 0xc, &(0x7f0000000200)={&(0x7f0000003940)=ANY=[@ANYRES64=r7, @ANYRESHEX, @ANYRES32=r6, @ANYRESOCT=r3, @ANYRESOCT=r4, @ANYBLOB="16de71cf0766d82ab6b67f0cd79e8e3ee2643e2e5026c3ea1ccfde1fe0912c50f4450c9c7749b181ae244aa09bb447092b0b62871d5ab9b62bc1121905ff995d268176192bba6bbfe4ff322f3370ce1ac7b5dd004238de507070dc0002cfe8ca03a81158f62018fe98245631fc021061fec067e33a1c01f786dafad477a72fcf767c43d28917995da3bd4df41908d180cd9517f24d97f14674a9a15bb602dca6587204d6571e02a456eb415ea3208e6afe4ed4f3533d7cf074ed4bd702d74e242405fadcd0c73dbb590bb430b54691990800f66109473f3531c01f00"/234], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x40025) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r10, r9, 0x0, 0x100001800) [ 1081.820775][T31257] loop4: detected capacity change from 0 to 512 [ 1081.832051][T31261] loop5: detected capacity change from 0 to 512 10:18:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000300002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1081.863073][T31257] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1081.892946][T31261] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1081.903073][T31261] EXT4-fs (loop5): group descriptors corrupted! [ 1081.915239][T31257] loop4: detected capacity change from 0 to 512 [ 1081.933179][ C0] sd 0:0:1:0: tag#4967 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1081.933744][T31279] loop2: detected capacity change from 0 to 264192 [ 1081.943300][ C0] sd 0:0:1:0: tag#4967 CDB: opcode=0xe5 (vendor) [ 1081.956191][ C0] sd 0:0:1:0: tag#4967 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1081.965233][ C0] sd 0:0:1:0: tag#4967 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1081.973167][T31257] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1081.974281][ C0] sd 0:0:1:0: tag#4967 CDB[20]: ba 10:18:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000020400002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000060400002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1082.124282][T31279] msdos filesystem being mounted at /root/syzkaller-testdir156917949/syzkaller.TDnRSM/2039/file1 supports timestamps until 2107 (0x10391447e) [ 1082.149608][T31261] loop5: detected capacity change from 0 to 512 10:18:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000cefffffffe000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000800400002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1082.176479][T31261] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1082.186721][T31261] EXT4-fs (loop5): group descriptors corrupted! [ 1082.227102][T31304] loop4: detected capacity change from 0 to 512 [ 1082.254208][T31304] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:18:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000002000000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000500002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1082.313685][T31304] loop4: detected capacity change from 0 to 512 [ 1082.328512][T31304] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1082.364053][T31320] loop5: detected capacity change from 0 to 512 [ 1082.393964][T31320] EXT4-fs (loop5): bad geometry: first data block is 0 with a 1k block and cluster size [ 1082.450726][T31320] loop5: detected capacity change from 0 to 512 [ 1082.466988][T31320] EXT4-fs (loop5): bad geometry: first data block is 0 with a 1k block and cluster size 10:18:45 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {}, {r5}, {}, {r5}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5}, {}, {0x0, r6}, {r5, r6}, {}, {r4}, {}, {0x0, r6}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {0x0, r6}, {}, {r2, r6}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {}, {r5}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {}, {}, {r4}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {}, {r1}, {0x0, r6}, {r4}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {r5}, {}, {}, {r5}, {r5}, {}, {}, {}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {}, {r5, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5, r6}, {r5}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4, r6}], 0x1, "2156816c73038c"}) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) 10:18:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000002b0500002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:45 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x401, 0x8, &(0x7f00000008c0)=[{0x0}, {0x0, 0x0, 0x9}, {&(0x7f0000000180)="5030a6b9906c95e36ee1b07f9e5698893307dd91cd0319578b614ed5f1873eb0", 0x20, 0xfffffffffffffffd}, {&(0x7f0000000340)="2df6157d4494279dde2031db3b2744b435271e65a343796db3da0bb347a3215e9b71", 0x22, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f5bf3f90b3d3e7d7132c3012ab7043e22a6f8edc5e516ee833a4fdcf825d9da3fed17cac003d9dd022d", 0xa4, 0x7fffffff}, {&(0x7f0000000500)="822171b91eb1498a4740794c5db7bc7a965f6bf8c7cf5baee0946ad2aa4b016a8a03bb30b092e47cd74a4fab60e1d1443c33c80fa2ef7af6514920209443a39077bb6a856f3c3e40bb7182a08692593ab13f04b516500ed3b3256325f48aafef3d8ca84cdce2b0609ed9c6346c356964614f21f9699436b6ca419197a0729a46ae7ae36fd203e577f2b03891ce7ba975aa5d47214e98c73647d20e757d1ce2d1990688090eee936562a1b4968deb59f6a2980feca28742afcaf376ab51294f57d6334c86538795c11e018be19db248ea75e1", 0xd2, 0x10000}, {&(0x7f0000000600)="4a6006458a4a1e3060e4cca0086f3b44f908e6941741cf7422f159df72a1cdb68c01ef3f102d2afb1e3e446c41bef79e359d62ed3155330d3b2f5207705e6dfa86f4f655d80ee44134bb9211fed0be8f7f86ff1f4b5abab22df6a1bfed2d66e51791fcbbf6f6926ce384fda7a7e86c17dcc2b2473f22c6d095ade56596ee656b3c596a038658b30895170a9ab2d4379f4f58cc6e", 0x94, 0x9}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f0000000ac0)={[{@dots}, {@fat=@sys_immutable}, {@nodots}, {@fat=@umask}], [{@measure}, {@appraise}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@seclabel}]}) openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f80)={0x1, &(0x7f0000000f40)=[{0x7f}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000fc0), 0xc, &(0x7f0000000200)={&(0x7f0000003940)=ANY=[@ANYRES64=r7, @ANYRESHEX, @ANYRES32=r6, @ANYRESOCT=r3, @ANYRESOCT=r4, @ANYBLOB="16de71cf0766d82ab6b67f0cd79e8e3ee2643e2e5026c3ea1ccfde1fe0912c50f4450c9c7749b181ae244aa09bb447092b0b62871d5ab9b62bc1121905ff995d268176192bba6bbfe4ff322f3370ce1ac7b5dd004238de507070dc0002cfe8ca03a81158f62018fe98245631fc021061fec067e33a1c01f786dafad477a72fcf767c43d28917995da3bd4df41908d180cd9517f24d97f14674a9a15bb602dca6587204d6571e02a456eb415ea3208e6afe4ed4f3533d7cf074ed4bd702d74e242405fadcd0c73dbb590bb430b54691990800f66109473f3531c01f00"/234], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x40025) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r10, r9, 0x0, 0x100001f00) 10:18:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000004000000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce0002000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000600002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1082.852132][T31347] loop4: detected capacity change from 0 to 512 [ 1082.867642][T31346] loop5: detected capacity change from 0 to 512 [ 1082.892061][T31347] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1082.909886][T31358] loop2: detected capacity change from 0 to 264192 [ 1082.910978][ C1] sd 0:0:1:0: tag#4946 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1082.926255][ C1] sd 0:0:1:0: tag#4946 CDB: opcode=0xe5 (vendor) [ 1082.932602][ C1] sd 0:0:1:0: tag#4946 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1082.941721][ C1] sd 0:0:1:0: tag#4946 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1082.951020][ C1] sd 0:0:1:0: tag#4946 CDB[20]: ba 10:18:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000040600002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1082.957747][T31358] msdos filesystem being mounted at /root/syzkaller-testdir156917949/syzkaller.TDnRSM/2040/file1 supports timestamps until 2107 (0x10391447e) [ 1083.032169][T31346] EXT4-fs (loop5): bad geometry: first data block is 0 with a 1k block and cluster size 10:18:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000700002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1083.084782][T31346] loop5: detected capacity change from 0 to 512 [ 1083.085576][T31347] loop4: detected capacity change from 0 to 512 [ 1083.099023][T31346] EXT4-fs (loop5): bad geometry: first data block is 0 with a 1k block and cluster size 10:18:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0002e4000000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000001800002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1083.152200][T31347] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:18:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce0003000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000001c00002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1083.225558][T31383] loop5: detected capacity change from 0 to 512 [ 1083.255165][T31383] EXT4-fs (loop5): bad geometry: first data block is 0 with a 1k block and cluster size [ 1083.334264][T31383] loop5: detected capacity change from 0 to 512 [ 1083.341023][T31383] EXT4-fs (loop5): bad geometry: first data block is 0 with a 1k block and cluster size [ 1083.383932][T31398] loop4: detected capacity change from 0 to 512 [ 1083.431993][T31398] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1083.489094][T31398] loop4: detected capacity change from 0 to 512 [ 1083.497966][T31398] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:18:46 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {}, {r5}, {}, {r5}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r4}, {}, {0x0, r6}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {0x0, r6}, {}, {r2, r6}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {}, {r5}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {}, {}, {r4}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {}, {r1}, {0x0, r6}, {r4}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {r5}, {}, {}, {r5}, {r5}, {}, {}, {}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {}, {r5, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5, r6}, {r5}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4, r6}], 0x1, "2156816c73038c"}) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) 10:18:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000002000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f020000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:46 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x401, 0x8, &(0x7f00000008c0)=[{0x0}, {0x0, 0x0, 0x9}, {&(0x7f0000000180)="5030a6b9906c95e36ee1b07f9e5698893307dd91cd0319578b614ed5f1873eb0", 0x20, 0xfffffffffffffffd}, {&(0x7f0000000340)="2df6157d4494279dde2031db3b2744b435271e65a343796db3da0bb347a3215e9b71", 0x22, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f5bf3f90b3d3e7d7132c3012ab7043e22a6f8edc5e516ee833a4fdcf825d9da3fed17cac003d9dd022d", 0xa4, 0x7fffffff}, {&(0x7f0000000500)="822171b91eb1498a4740794c5db7bc7a965f6bf8c7cf5baee0946ad2aa4b016a8a03bb30b092e47cd74a4fab60e1d1443c33c80fa2ef7af6514920209443a39077bb6a856f3c3e40bb7182a08692593ab13f04b516500ed3b3256325f48aafef3d8ca84cdce2b0609ed9c6346c356964614f21f9699436b6ca419197a0729a46ae7ae36fd203e577f2b03891ce7ba975aa5d47214e98c73647d20e757d1ce2d1990688090eee936562a1b4968deb59f6a2980feca28742afcaf376ab51294f57d6334c86538795c11e018be19db248ea75e1", 0xd2, 0x10000}, {&(0x7f0000000600)="4a6006458a4a1e3060e4cca0086f3b44f908e6941741cf7422f159df72a1cdb68c01ef3f102d2afb1e3e446c41bef79e359d62ed3155330d3b2f5207705e6dfa86f4f655d80ee44134bb9211fed0be8f7f86ff1f4b5abab22df6a1bfed2d66e51791fcbbf6f6926ce384fda7a7e86c17dcc2b2473f22c6d095ade56596ee656b3c596a038658b30895170a9ab2d4379f4f58cc6e", 0x94, 0x9}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f0000000ac0)={[{@dots}, {@fat=@sys_immutable}, {@nodots}, {@fat=@umask}], [{@measure}, {@appraise}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@seclabel}]}) openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f80)={0x1, &(0x7f0000000f40)=[{0x7f}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000fc0), 0xc, &(0x7f0000000200)={&(0x7f0000003940)=ANY=[@ANYRES64=r7, @ANYRESHEX, @ANYRES32=r6, @ANYRESOCT=r3, @ANYRESOCT=r4, @ANYBLOB="16de71cf0766d82ab6b67f0cd79e8e3ee2643e2e5026c3ea1ccfde1fe0912c50f4450c9c7749b181ae244aa09bb447092b0b62871d5ab9b62bc1121905ff995d268176192bba6bbfe4ff322f3370ce1ac7b5dd004238de507070dc0002cfe8ca03a81158f62018fe98245631fc021061fec067e33a1c01f786dafad477a72fcf767c43d28917995da3bd4df41908d180cd9517f24d97f14674a9a15bb602dca6587204d6571e02a456eb415ea3208e6afe4ed4f3533d7cf074ed4bd702d74e242405fadcd0c73dbb590bb430b54691990800f66109473f3531c01f00"/234], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x40025) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r10, r9, 0x0, 0x100002000) 10:18:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce0004000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000002600002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1083.707706][T31426] loop5: detected capacity change from 0 to 512 [ 1083.730413][T31429] loop4: detected capacity change from 0 to 512 [ 1083.743712][T31426] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1083.753839][T31426] EXT4-fs (loop5): group descriptors corrupted! [ 1083.763541][T31434] loop2: detected capacity change from 0 to 264192 [ 1083.775606][ C0] sd 0:0:1:0: tag#4991 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1083.785481][ C0] sd 0:0:1:0: tag#4991 CDB: opcode=0xe5 (vendor) [ 1083.791833][ C0] sd 0:0:1:0: tag#4991 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c 10:18:46 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r0, 0x8983, &(0x7f0000000180)={0x7, 'netpci0\x00', {0x3}}) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {}, {0x0}, {}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0, 0x0}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {0x0}, {}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}], 0x8, "7e6830ead6b793"}) r109 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r109, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r109, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r112}, {}, {r111}, {r111}, {r111}, {}, {}, {0x0, r112}, {0x0}, {}, {0x0}, {}, {r110, r112}, {0x0, r112}, {}, {r111, r112}, {0x0, r112}, {}, {0x0}, {0x0, 0x0}, {0x0, r112}, {}, {0x0, r112}, {0x0, r112}, {0x0}, {}, {0x0}, {}, {r110}, {0x0, r112}, {}, {0x0, 0x0}, {r110, r112}, {r111, 0x0}, {0x0, 0x0}, {0x0, r112}, {r111, r112}, {0x0, r112}, {r110}, {0x0, 0x0}, {0x0, r112}, {r111}, {}, {0x0}, {r111}, {0x0, r112}, {0x0, 0x0}, {0x0, r112}, {0x0}, {r47, r112}, {0x0, r112}, {r110}, {0x0}, {r111, 0x0}, {r110}, {}, {r111}, {0x0, 0x0}, {0x0, r112}, {0x0, r112}, {0x0}, {0x0, 0x0}, {r111}, {0x0, r112}, {0x0, r112}, {0x0, r112}, {r111}, {0x0, r112}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, r112}, {}, {0x0}, {0x0}, {0x0, r112}, {r110}, {0x0, r112}, {0x0, 0x0}, {0x0}, {r110, r112}, {0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {r111}, {0x0, r112}, {0x0, r112}, {r110}, {r111, r112}, {0x0, r112}, {0x0, r112}, {}, {}, {}, {r110}, {0x0, r112}, {}, {0x0, r112}, {0x0, r112}, {0x0, r112}, {r111, r112}, {r110, r112}, {r111, 0x0}, {}, {r110, r112}, {r110}, {0x0}, {0x0}, {r110}, {0x0, 0x0}, {}, {}, {0x0, r112}, {0x0, r112}, {0x0, r112}, {0x0, r112}, {0x0, 0x0}, {}, {r110, r112}, {0x0, r112}, {0x0, r112}, {r110, r112}, {0x0, r112}, {0x0, 0x0}, {}, {r111, 0x0}, {}, {r9}, {0x0, r112}, {r110}, {0x0}, {r111}, {}, {0x0, 0x0}, {r111}, {0x0, r112}, {0x0, r112}, {0x0, 0x0}, {0x0, r112}, {}, {0x0, r112}, {}, {r110}, {}, {}, {0x0}, {0x0, r112}, {r110, r112}, {r111}, {0x0, 0x0}, {}, {0x0}, {r111}, {}, {0x0, 0x0}, {}, {r110}, {r110}, {}, {r110}, {r111}, {0x0, r112}, {r110}, {}, {r110}, {0x0, r112}, {r111}, {r110, r112}, {0x0, r112}, {}, {0x0, r112}, {}, {}, {0x0, r112}, {r111}, {}, {}, {r110}, {}, {0x0, r112}, {r111, r112}, {0x0, r112}, {0x0, r112}, {0x0, 0x0}, {}, {0x0, r112}, {r110}, {r111, 0x0}, {r111, r112}, {0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {}, {0x0, r112}, {0x0}, {}, {}, {r111}, {}, {}, {r111}, {r111, 0x0}, {}, {}, {}, {0x0, r112}, {}, {r110, r112}, {r110}, {0x0}, {}, {0x0, r112}, {0x0}, {r111, r112}, {r110, 0x0}, {0x0, r112}, {0x0}, {0x0}, {r110, r112}, {r111, r112}, {r111}, {r110, r112}, {}, {}, {r111}, {r110, r112}, {0x0, r112}, {}, {0x0, r112}, {r111}, {r111}, {r110, 0x0}, {}, {0x0, r112}, {r111}, {0x0, r112}, {}, {}, {0x0}, {r110, r112}], 0x1, "2156816c73038c"}) r221 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r221, 0x0, 0x8400fffffffa) r222 = open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r176}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r153}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r222, 0xd000943e, &(0x7f0000064c40)={r79, r133, "07068c431867ddab50a0df15add17222698fd6d9043bb000c68cebba8e89b18642be37e2e005523892ee019018681fa05b4c27db47ae511d275566e4cd5cbf1b07b2d5ed072f39763ce42696d6e6f0956ef684b7793d1b65245178242f65acae8cd6ac589f14919789fbe17326aa9a508ea1057dd1e940f5702875d21f43fa32cb423fd72abcd4258aa0b66d864d61508696be9f1b30ed9b500901ef0312e75de8bf010627d33f34b84b8364e7e6ac5d029c41ecfc2e9e5aff5b945a1fe01b93b54fe4ba1dea9223acd57eaec616005ab90e5a93271caed1aebb3bc9612c60d92cedc708e28840d1799c8897fe242330f23bbae35024615c6af6630a2a562bd9", "fec9eb59c7763869f60a64631c74331b7577c6de9e87ce34306224900e0bb2ce96f907bcb09c4e06a0b091b4f0331d85341eca155f48c216417b612b525a6248f6e2dbdbe43c3c0326accdb227b6aef9bae07b4a89d5fcd3240d5117114572d6751be9a043300c5a32394b101e92776166a6160007c365e56662b43abc45e771a68e7033b93600ae38883d7da3f094fd4da4d25ca9698881d752c48e1da6c69e6779fde6234f2b9196edbfc232b5942ba0e2defa4c41162c971377b0b2985341332efd4b7c25c6a268a9010d012e38ba6544557ede1e8d2e9038df331fabb13e7745022d4a61cea9f7ca5b3069b5ccdb7cdaa63aa4098f2204f60ebf58518341c6924bf1856e656c0df8e15bf0a862ac54b0e7c73b0408008215ab15d2cd3922385c7d98f28a1238c42478d369bd45eacf332c8c0de148fd378de5300711a5127e7e246c81db75be75fb4c2e9b4fe0598a59169d3e533cbd3186797bb92d42f21122bd269a2ab41181f5807481a11c4bdbb0cbe966d01bc7e9bcebd153ddca59426bf84e92f6c5f6fdce815595096dc3b954df8d5a0e9de47b9548588456c682057ddd49998e901e57be425afd142a7e18a594620b75c84fc0fc996e4e0961edcbb57475834723895341adc83f539ed1131c6ef2bca59b98c1aca333d9446e10e521187b097fd4fab4de992fb9b56a505aa8329e7d5462bdac09b1b81929b7d2025019daf2ef8cf40aeba26cc1f492703df431a6f0e003bf8ced137510408d1cc93f420a731183b6c7981506cfe128cc49540b4e46adc6dc9af085520057854ecc5773fd05aa6ae0fc5bb1152342cc8863a3df81d6783f7fe9cc27250beb39df2375b3de1376bd32c796e996f0ec48b869d8005bae695ee574a5868e7f336fb244e26c7b85b5d7bb777a70dc057163ff770d815797540d06715ff9d3b0f75163a69430c4ca9712c49149476f0f334f816280c7671e9561b42ca9d554a06feb9f990246d89218cffb890b0db800c56bc893e1b57c38e92c89ec077b6a0d27c54560834f2829bc53d321ff2947246e42bbb4b77ec1e49101ac4c796db7d67f54d2ca578e56eda9e5f9aa6ccce36eae5557b5e04a651c081c2307829b55041536c69e3b40aeccb7826b698dfb15a349faf2601fbd2129003f14efa6cc34b180209f114b8256af1557bda6f521ef07cd3201287291180695cd6fd60b1a0967a684921bae9464ef3be44c77ca2718ce6d988d8f0a3cefe31b773f4773abbc63290f8015e770f3e6c0a22309ec79ef4cc51e3ee6706f7a5dceb30e495daa78eeab84e27d9c7902330c138202be8e95239050dbbcbd316e180654434a0bc4019d522560a31fa76191d3a7e3aaac1d56f5bcbbc64f64ecaca9aedfb8b775dd6096cb1fae338c304772fedf2a576e5d11737aea7e993f11aa37c6a0cf696958ad9deaf048399200175074b0596a8fd36acc00fe6d785eb999cbb6f9a6f644da1aecd09b200c2955cead3f926f65b54adba8a3e749e20d2dfd54674f43170cc1d4591259df14799ac7a1fefbf4f289d585ea1cd17a4744e900aa12d203c757ae3a18bfa03452424d84079389d75a7977dcfefa16c2874c558545f2fb703a8b4038585b8a62ccd215b00067d23ed85d797b9d8bf658d52036b7a1ac9d3c138f3f7a46d213ea955a6e7424c7aeb069fa72cebbba33e7865c1d507a728cfc4f2ae499805c7074516f9b45e4d5391cda33a1b5ede50a8f39a47b55caf0b81b88303b9d8a656fffa9bce07162806a57332851e3d2f9ca96bbb4e4c89c7f04518a51420d09c5dd9012c903dc42498a3218b1d967e1ec6b53c900f91fadb128dc0240e474dab7a0976fbe364cb19bb282b203fddbe057982f02c1a58eb7dac87e77e11f58026ee847cd323657b9a83b70434154e5429cce0d97923a7f58a2aa486d6041ab053eee9bd1d69bd7a9900b7d70933b1de96d1655149da7698c23b79059f6ce7cf235c0b5fdc8fb213dc75e64fe35a0e481524deb818af43fb1407bc2e4a4922bfbbd2b08a45776e5ccf8694331357e474779d33c5d2772740af13785bb8404d9743f4c4f961bc10d8c5fbe04c77742b20718ea007e8d5f7f615b15808f86f005defc661f76a99761166c13c208021f8862a8a3557018363e40158eb3b4dda03f8e56dc473334b717d4b002070f18e6659e59a19a4e44371be2968dd43dddb276b9064d0e7370628bf25495d2882096d931957ef0fb5b6bdffb90546af78f6493a6ff05ccbc3209188c960520edd4f293d2edec8287dedc6d1d5a77a4da9beef1cf33e407a098a98af308fb15d741cb0dac03ab66fa8b6f678ea23601c14aae28ed858e227f6a6b55a91f931c45a3d2771fda7fa2c22bc54f898c0b7671bf0afaf6db3262641c51963dac356e4bba2a7c47cd37734d8e5721f89ffc319be0709706e7ad267eabab7a0893c892fe326103d38a01d39beca0060087d0f88f07af9a0e927ab6d2943e5fe63399edde08018d90d5553b40ac61380db3a92751487c665a769339afde8d5b05eec5f8ae27ab5bf9c23e62a45085328a61ac5132f4b267c20ecef20ae98a1cf11cb36808df93a05bc49686b2eec62c7baa701d03c3be213ea09527addccdcd6065e887924873378d7096c081a0faa69791e78f722fe2fb59b07eff4b8bbb1fb7a88c9056b302cfde3b87ad0799b7563c1ce5fe55bcb5a5c44d9b1b2430d721024125e805bf258e8086b490e424f8222f719e0bfe65fbd4e508214dd4f9827ef7c4fd4eb7c6a44d96c4e9c9f49f9baa38e7f5a2cf8c6630bb36690949e86601b2041d6cc4d7fd59051c3dc2c32615389ebf242189cdae5438943fff9c970dddcd5eecce2e30ec31ed5c7dfc41c7d3efa062f57e927034fd4abbddfa93b7922e3077f7db5cd08fc3df2eb3f1602253974c3d73807cb201209b4611d57d655d1191486573c874a6ba80ac0e4d806968eb78069d43eef8e4719dc2e40c304a4fdd998e6d7920234c20c9e2f60640e41a0de2ee199c653388028d69b8c9f538b8cf569a99f7a858958055fa4bcc4483a69eb5447cca6e082abcd62b49fb1e6924aaabd1ef6e1fec95e63b423e97769010d2b157ab1c786a52cc8e855271c3ed3c85b934928bdff0f9cec1d28aa82cb166a0d96f69d7e9a6b774817acb89619e2a8eb334fccce49a9a1234669d6394b94ff5a4e805dfb773ffebde933fbc2c2e7bbe5731dc6ac55b45ce2eb836022a61e6966ad8d55e8d382ae20d1fbee218925d109cd6d04138bded7bca822f2a88ead88acd2da993bbcc6895ab8d54319c0c9c5b2b15cf72b3deb5d5aa9d1aadc11d6b5e996141f57b780fb54dfb63e1e1bec94f1f12f47b4cef867547f3fd24b892835d9142b5bec19d89a6975d1ba6e4ce3f20fca8e7c7c4118f82c4cccb5c1a7a6a423102eccbeb5ac0578f23ed55b5cea098ba69ad85aa01a986816cb2fce9e596a0551beff232dd0dd487d16aeb73445d70389ade3e65eba1df3c2546d311be93d416a1c404bac2ec527f40d1d533e7d01d4866ffbf8bec7696af0828d32219f466ab9833528999405f60cf81c2946cda5236c9d10b9edc027f71932423e02551ab30f53cdad0c12f2ad650050bfbade0dd5b68278d243286c0a7f6e8b281b43c96f89178a0ce9eeea8b1338c7812efec8b8eeb996d6ab9256db1e84f1758b1443a1b5037583f6232ee69e99cb644cefb38bc862f702568aafc11cbf7a4a8b5ae6ab1159086ec80ecd13024ed90dc4bc0b4d5891e118f506169d44a4e7cc837658c5d6f29647ac5312ac9d6a148c1788cfc8b9676b540921540049d716ebf1eb9189e57ac9b7e8e7346486579e24739c2302ec29510157efed7b77ed7aacf8e52405f51374371eeed2e48f5ef3c0cca8eea6eb0996c5d5042424dca0c1559da858662c5316ec7b6a94dc1f903463d47c3a0389a06533e1e807ba29e67f852a43f8ca9e1e64975f0a99005c404e7111daa0adfc2801ccbc990f1fd60f931bd614db94dc4401133dca7073b727f4a50ab43efcbf55e5d3a68b1220f4e96213162e4907394ca50e069a40401f1a57c46d3709b6cf8bafcb4843160a79fecc7172b65661192e4bda94f4ab71bcfad103706c64a408256c943dafcb7535f4e767bb4d58ee17e1cd9def7e50cf6287bea89659391a12de1dd42309adbc8e38362662cd6265dcd8bf22d4f47623b687f522c886dd92b92d2f98b0403ba39458a3274ca975473e48056ad9f249534d324bb790fae4ee94619fb540070b2fa13510ab7770cbfec5b7b84c71da8d1663b20c2e4f9733ff00f4bdb6f703c2ab974f5ed2bd3e718bb288d38304cf3084d0c8ada3caf15772688204b3516d0e5b64c9716a6a5f2c1aca3c63bdfb81c0f31ce362c188e7f96204c83cbfda97356106346a2634512ee88fe47e7f67ac712f291102a8d0bb51b59449f682de2e91597251486a1987fa091a8d38abee4af07b0acabe774f709c1ce391f09f02f10f2ae04822ec4749cbedcb92224683183adeae0d86165673f64797aec8692046497f54640d49ccd9fafe2d9862140741e03c5649ac831626593ac8d3db05ad84c582d330d2808dbf31eeebc19bf7978d534de26d6667d357e6ddd91f610a60e08f8df8250edf3de9b0cbe12aa93c1862b39889b5b1282447398556310bb17dc5dac6fd7a9dfe09d1212979dabc969e3b7848f33563c27ee0416da5039a3b62f23aa8624b75a698ff074c95dcc9139234518daa688a4e0348f61714510238c21fa6ada3ee48f079e15e25c51bb4b82a7f6354f14a983e926e54b898e51860677f669b1598963cfcd985ffc3f8e1559d673eeda9b0d26a34ba35e6212c59e544ed5ac68a9de6949c2b156850e4a53e697374b642d4fd2da076367b43a165c8c1a5492fc81010ac34af7b3f943cbcdf0370866889ac287a70c690ba79cd53aa571d4c6a3b22cb2f397c87725914be6ffa5906828db43442ece2633a144855d99752f28942d9d511b53c35febf96bd4078c1bff215b6cd95287703d3aa0efecc35b62f31d0cfec23f586ad165e1563d0b5f3f9815ee2ad6684e773da56a9637cd6d9df0ca1965cb07bf4278fb5ba7e642dac4577eaae0306918ddd9bbe3592092aad53f2c2cb0401bedf37cbcedcad74034f361a5fa00c9897bdd05f2a72c2abcbed1b0a94502d557d13ea17316c782d2f97f43763b34c612e545bee71c8bc32b29bc2a3a71b1b3cb960d4f02284da457715e077b9fd6f6f8c959d1a309da47fd59ed47aeabcfb218ecf6ec66fc210dd6542c47240dac8f16796551f899abf9afd94d9f8b9c20631f26acfbb47a27941f557985724f99a1aafc5897b0459b3b1610973e6caa0908b8ca8d02ecc369ee8e1c231a086c8e03b85bb83cdad780fed86c231045612f09"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000065c40)={0xd6bd, [{}, {0x0, r45}, {0x0, r164}, {r211}, {r75}, {r70}, {}, {0x0, r181}, {0x0, r193}, {r203, r33}, {r200}, {r25}, {r162, r177}, {r101}, {0x0, r95}, {r194}, {r102, r29}, {0x0, r58}, {r13}, {}, {r201}, {0x0, r187}, {r106}, {r48, r149}, {}, {0x0, r116}, {r66}, {0x0, r74}, {}, {}, {r104}, {0x0, r89}, {}, {r143, r63}, {r68}, {r50, r150}, {r36}, {r117, r146}, {}, {r172}, {r80, r195}, {0x0, r116}, {0x0, r30}, {r131}, {r118}, {0x0, r21}, {0x0, r8}, {r60}, {0x0, r69}, {}, {r206}, {}, {r114}, {}, {}, {0x0, r196}, {}, {}, {0x0, r43}, {}, {r103}, {}, {0x0, r140}, {0x0, r135}, {r208}, {}, {}, {0x0, r157}, {r147}, {r218}, {0x0, r46}, {}, {}, {0x0, r71}, {0x0, r185}, {0x0, r191}, {r115}, {r104, r126}, {}, {r31}, {0x0, r98}, {r134}, {}, {r41}, {0x0, r51}, {r82, r174}, {r23, r44}, {r122}, {r35}, {r23, r42}, {}, {r156, r88}, {r141}, {0x0, r120}, {}, {}, {r168, r72}, {0x0, r100}, {0x0, r175}, {r163, r145}, {}, {}, {}, {r124}, {0x0, r186}, {0x0, r2}, {}, {r64}, {r132}, {}, {0x0, r167}, {r158}, {r163, r148}, {r209, r6}, {r99}, {r22, r78}, {0x0, r93}, {}, {}, {r206, r91}, {r28}, {0x0, r37}, {r136, r81}, {0x0, r56}, {}, {0x0, r61}, {r76, r179}, {r219, r190}, {}, {r212}, {0x0, r140}, {r205, r85}, {0x0, r130}, {r127}, {r92, r54}, {0x0, r86}, {}, {0x0, r220}, {r83, r142}, {}, {r84}, {0x0, r165}, {r151}, {0x0, r187}, {r138}, {0x0, r18}, {r5}, {r162}, {r15, r119}, {0x0, r105}, {r215}, {0x0, r27}, {}, {r210}, {}, {}, {r38}, {r197}, {0x0, r217}, {r14}, {0x0, r19}, {r11}, {}, {0x0, r198}, {}, {}, {r184, r171}, {r218, r161}, {}, {0x0, r128}, {}, {0x0, r59}, {0x0, r204}, {}, {r169, r39}, {}, {0x0, r202}, {0x0, r183}, {r144}, {}, {r40}, {}, {0x0, r196}, {}, {r216, r53}, {}, {}, {r121}, {}, {}, {r17}, {r166}, {}, {r178}, {0x0, r90}, {r129}, {0x0, r180}, {}, {}, {r77}, {}, {r24}, {}, {r87}, {r10, r207}, {}, {}, {0x0, r94}, {0x0, r7}, {r62}, {r192}, {r65, r108}, {0x0, r188}, {r155}, {}, {0x0, r214}, {r4}, {0x0, r154}, {}, {r136, r96}, {0x0, r12}, {r67}, {0x0, r213}, {r97, r32}, {r137, r3}, {r55}, {r159}, {0x0, r125}, {0x0, r49}, {0x0, r182}, {r34}, {}, {r170, r57}, {}, {r52, r199}, {}, {}, {r209, r154}, {r73}, {0x0, r58}, {0x0, r26}, {r173, r19}, {r189}, {r113}, {r14, r123}, {}, {r152, r16}, {}, {0x0, r20}, {}, {}, {0x0, r107}, {0x0, r160}, {r139, r223}, {r158, r174}], 0x11, "6d65f9be2910af"}) 10:18:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000052b00002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1083.800851][ C0] sd 0:0:1:0: tag#4991 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1083.809885][ C0] sd 0:0:1:0: tag#4991 CDB[20]: ba [ 1083.835401][T31429] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:18:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000003f00002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1083.848302][T31434] msdos filesystem being mounted at /root/syzkaller-testdir156917949/syzkaller.TDnRSM/2041/file1 supports timestamps until 2107 (0x10391447e) [ 1083.874915][T31426] loop5: detected capacity change from 0 to 512 [ 1083.881868][T31429] loop4: detected capacity change from 0 to 512 [ 1083.894858][T31426] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1083.905066][T31426] EXT4-fs (loop5): group descriptors corrupted! [ 1083.913863][T31429] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:18:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f030000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000004000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce0005000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) [ 1084.054234][T31474] loop5: detected capacity change from 0 to 512 [ 1084.072384][T31479] loop4: detected capacity change from 0 to 512 [ 1084.094786][T31474] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1084.104970][T31474] EXT4-fs (loop5): group descriptors corrupted! [ 1084.112301][T31479] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1084.161913][T31479] loop4: detected capacity change from 0 to 512 [ 1084.172021][T31479] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1084.197157][T31474] loop5: detected capacity change from 0 to 512 [ 1084.218299][T31474] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1084.228559][T31474] EXT4-fs (loop5): group descriptors corrupted! 10:18:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce0006000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000048000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:46 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x401, 0x8, &(0x7f00000008c0)=[{0x0}, {0x0, 0x0, 0x9}, {&(0x7f0000000180)="5030a6b9906c95e36ee1b07f9e5698893307dd91cd0319578b614ed5f1873eb0", 0x20, 0xfffffffffffffffd}, {&(0x7f0000000340)="2df6157d4494279dde2031db3b2744b435271e65a343796db3da0bb347a3215e9b71", 0x22, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f5bf3f90b3d3e7d7132c3012ab7043e22a6f8edc5e516ee833a4fdcf825d9da3fed17cac003d9dd022d", 0xa4, 0x7fffffff}, {&(0x7f0000000500)="822171b91eb1498a4740794c5db7bc7a965f6bf8c7cf5baee0946ad2aa4b016a8a03bb30b092e47cd74a4fab60e1d1443c33c80fa2ef7af6514920209443a39077bb6a856f3c3e40bb7182a08692593ab13f04b516500ed3b3256325f48aafef3d8ca84cdce2b0609ed9c6346c356964614f21f9699436b6ca419197a0729a46ae7ae36fd203e577f2b03891ce7ba975aa5d47214e98c73647d20e757d1ce2d1990688090eee936562a1b4968deb59f6a2980feca28742afcaf376ab51294f57d6334c86538795c11e018be19db248ea75e1", 0xd2, 0x10000}, {&(0x7f0000000600)="4a6006458a4a1e3060e4cca0086f3b44f908e6941741cf7422f159df72a1cdb68c01ef3f102d2afb1e3e446c41bef79e359d62ed3155330d3b2f5207705e6dfa86f4f655d80ee44134bb9211fed0be8f7f86ff1f4b5abab22df6a1bfed2d66e51791fcbbf6f6926ce384fda7a7e86c17dcc2b2473f22c6d095ade56596ee656b3c596a038658b30895170a9ab2d4379f4f58cc6e", 0x94, 0x9}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f0000000ac0)={[{@dots}, {@fat=@sys_immutable}, {@nodots}, {@fat=@umask}], [{@measure}, {@appraise}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@seclabel}]}) openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f80)={0x1, &(0x7f0000000f40)=[{0x7f}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000fc0), 0xc, &(0x7f0000000200)={&(0x7f0000003940)=ANY=[@ANYRES64=r7, @ANYRESHEX, @ANYRES32=r6, @ANYRESOCT=r3, @ANYRESOCT=r4, @ANYBLOB="16de71cf0766d82ab6b67f0cd79e8e3ee2643e2e5026c3ea1ccfde1fe0912c50f4450c9c7749b181ae244aa09bb447092b0b62871d5ab9b62bc1121905ff995d268176192bba6bbfe4ff322f3370ce1ac7b5dd004238de507070dc0002cfe8ca03a81158f62018fe98245631fc021061fec067e33a1c01f786dafad477a72fcf767c43d28917995da3bd4df41908d180cd9517f24d97f14674a9a15bb602dca6587204d6571e02a456eb415ea3208e6afe4ed4f3533d7cf074ed4bd702d74e242405fadcd0c73dbb590bb430b54691990800f66109473f3531c01f00"/234], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x40025) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r10, r9, 0x0, 0x100002358) 10:18:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f040000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:46 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {}, {r5}, {}, {r5}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r4}, {}, {0x0, r6}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {0x0, r6}, {}, {r2, r6}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {}, {r5}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {}, {}, {r4}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {}, {r1}, {0x0, r6}, {r4}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {r5}, {}, {}, {r5}, {r5}, {}, {}, {}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {}, {r5, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5, r6}, {r5}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4, r6}], 0x1, "2156816c73038c"}) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) 10:18:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000fffe00002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1084.623044][T31505] loop4: detected capacity change from 0 to 512 [ 1084.643368][T31507] loop5: detected capacity change from 0 to 512 [ 1084.658532][T31505] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1084.682144][T31507] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1084.692284][T31507] EXT4-fs (loop5): group descriptors corrupted! [ 1084.710161][ C1] sd 0:0:1:0: tag#4970 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1084.720093][ C1] sd 0:0:1:0: tag#4970 CDB: opcode=0xe5 (vendor) [ 1084.726418][ C1] sd 0:0:1:0: tag#4970 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1084.735448][ C1] sd 0:0:1:0: tag#4970 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1084.744723][T31524] loop2: detected capacity change from 0 to 264192 [ 1084.745451][ C1] sd 0:0:1:0: tag#4970 CDB[20]: ba 10:18:47 executing program 3: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000000a40)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000001a40)={{r3, 0x101, 0x10001, 0x3, 0x2, 0x526, 0x3f, 0x7, 0x815, 0x7, 0x4, 0x6, 0x15, 0x1, 0x3}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x8, "7e6830ead6b793"}) r7 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r7, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x36, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r7, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r10}, {}, {r9}, {r9}, {r9}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {r8, r10}, {0x0, r10}, {}, {r9, r10}, {0x0, r10}, {}, {}, {}, {0x0, r10}, {}, {0x0, r10}, {0x0, r10}, {}, {}, {}, {}, {r8}, {0x0, r10}, {}, {}, {r8, r10}, {r9}, {}, {0x0, r10}, {r9, r10}, {0x0, r10}, {r8}, {}, {0x0, r10}, {r9}, {}, {}, {r9}, {0x0, r10}, {}, {0x0, r10}, {}, {r6, r10}, {0x0, r10}, {r8}, {}, {r9}, {r8}, {}, {r9}, {}, {0x0, r10}, {0x0, r10}, {}, {}, {r9}, {0x0, r10}, {0x0, r10}, {0x0, r10}, {r9}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {0x0, r10}, {r8}, {0x0, r10}, {}, {}, {r8, r10}, {}, {}, {}, {}, {}, {}, {}, {r9}, {0x0, r10}, {0x0, r10}, {r8}, {r9, r10}, {0x0, r10}, {0x0, r10}, {}, {}, {}, {r8}, {0x0, r10}, {}, {0x0, r10}, {0x0, r10}, {0x0, r10}, {r9, r10}, {r8, r10}, {r9}, {}, {r8, r10}, {r8}, {}, {}, {r8}, {}, {}, {}, {0x0, r10}, {0x0, r10}, {0x0, r10}, {0x0, r10}, {}, {}, {r8, r10}, {0x0, r10}, {0x0, r10}, {r8, r10}, {0x0, r10}, {}, {}, {r9}, {}, {r5}, {0x0, r10}, {r8}, {}, {r9}, {}, {}, {r9}, {0x0, r10}, {0x0, r10}, {}, {0x0, r10}, {}, {0x0, r10}, {}, {r8}, {}, {}, {}, {0x0, r10}, {r8, r10}, {r9}, {}, {}, {}, {r9}, {}, {}, {}, {r8}, {r8}, {}, {r8}, {r9}, {0x0, r10}, {r8}, {}, {r8}, {0x0, r10}, {r9}, {r8, r10}, {0x0, r10}, {}, {0x0, r10}, {}, {}, {0x0, r10}, {r9}, {}, {}, {r8}, {}, {0x0, r10}, {r9, r10}, {0x0, r10}, {0x0, r10}, {}, {}, {0x0, r10}, {r8}, {r9}, {r9, r10}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {r9}, {}, {}, {r9}, {r9}, {}, {}, {}, {0x0, r10}, {}, {r8, r10}, {r8}, {}, {}, {0x0, r10}, {}, {r9, r10}, {r8}, {0x0, r10}, {}, {}, {r8, r10}, {r9, r10}, {r9}, {r8, r10}, {}, {}, {r9}, {r8, r10}, {0x0, r10}, {}, {0x0, r10}, {r9}, {r9}, {r8}, {}, {0x0, r10}, {r9}, {0x0, r10}, {}, {}, {}, {r8, r10}], 0x1, "2156816c73038c"}) r11 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r11, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) 10:18:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000feff00002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1084.774443][T31524] msdos filesystem being mounted at /root/syzkaller-testdir156917949/syzkaller.TDnRSM/2042/file1 supports timestamps until 2107 (0x10391447e) 10:18:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000004002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000008002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1084.829726][T31505] loop4: detected capacity change from 0 to 512 [ 1084.836726][T31507] loop5: detected capacity change from 0 to 512 [ 1084.844874][T31505] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1084.853115][T31507] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1084.863255][T31507] EXT4-fs (loop5): group descriptors corrupted! 10:18:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f050000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce0007000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000400008002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1084.963954][T31561] loop5: detected capacity change from 0 to 512 [ 1084.998787][T31561] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! 10:18:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000020002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1085.008961][T31561] EXT4-fs (loop5): group descriptors corrupted! [ 1085.014101][T31565] loop4: detected capacity change from 0 to 512 [ 1085.065495][T31565] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1085.083656][T31561] loop5: detected capacity change from 0 to 512 [ 1085.097230][T31561] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1085.107453][T31561] EXT4-fs (loop5): group descriptors corrupted! [ 1085.148828][T31565] loop4: detected capacity change from 0 to 512 [ 1085.158026][T31565] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:18:47 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x401, 0x8, &(0x7f00000008c0)=[{0x0}, {0x0, 0x0, 0x9}, {&(0x7f0000000180)="5030a6b9906c95e36ee1b07f9e5698893307dd91cd0319578b614ed5f1873eb0", 0x20, 0xfffffffffffffffd}, {&(0x7f0000000340)="2df6157d4494279dde2031db3b2744b435271e65a343796db3da0bb347a3215e9b71", 0x22, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f5bf3f90b3d3e7d7132c3012ab7043e22a6f8edc5e516ee833a4fdcf825d9da3fed17cac003d9dd022d", 0xa4, 0x7fffffff}, {&(0x7f0000000500)="822171b91eb1498a4740794c5db7bc7a965f6bf8c7cf5baee0946ad2aa4b016a8a03bb30b092e47cd74a4fab60e1d1443c33c80fa2ef7af6514920209443a39077bb6a856f3c3e40bb7182a08692593ab13f04b516500ed3b3256325f48aafef3d8ca84cdce2b0609ed9c6346c356964614f21f9699436b6ca419197a0729a46ae7ae36fd203e577f2b03891ce7ba975aa5d47214e98c73647d20e757d1ce2d1990688090eee936562a1b4968deb59f6a2980feca28742afcaf376ab51294f57d6334c86538795c11e018be19db248ea75e1", 0xd2, 0x10000}, {&(0x7f0000000600)="4a6006458a4a1e3060e4cca0086f3b44f908e6941741cf7422f159df72a1cdb68c01ef3f102d2afb1e3e446c41bef79e359d62ed3155330d3b2f5207705e6dfa86f4f655d80ee44134bb9211fed0be8f7f86ff1f4b5abab22df6a1bfed2d66e51791fcbbf6f6926ce384fda7a7e86c17dcc2b2473f22c6d095ade56596ee656b3c596a038658b30895170a9ab2d4379f4f58cc6e", 0x94, 0x9}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f0000000ac0)={[{@dots}, {@fat=@sys_immutable}, {@nodots}, {@fat=@umask}], [{@measure}, {@appraise}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@seclabel}]}) openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f80)={0x1, &(0x7f0000000f40)=[{0x7f}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000fc0), 0xc, &(0x7f0000000200)={&(0x7f0000003940)=ANY=[@ANYRES64=r7, @ANYRESHEX, @ANYRES32=r6, @ANYRESOCT=r3, @ANYRESOCT=r4, @ANYBLOB="16de71cf0766d82ab6b67f0cd79e8e3ee2643e2e5026c3ea1ccfde1fe0912c50f4450c9c7749b181ae244aa09bb447092b0b62871d5ab9b62bc1121905ff995d268176192bba6bbfe4ff322f3370ce1ac7b5dd004238de507070dc0002cfe8ca03a81158f62018fe98245631fc021061fec067e33a1c01f786dafad477a72fcf767c43d28917995da3bd4df41908d180cd9517f24d97f14674a9a15bb602dca6587204d6571e02a456eb415ea3208e6afe4ed4f3533d7cf074ed4bd702d74e242405fadcd0c73dbb590bb430b54691990800f66109473f3531c01f00"/234], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x40025) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r10, r9, 0x0, 0x100002800) 10:18:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000012000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:47 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {}, {r5}, {}, {r5}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r4}, {}, {0x0, r6}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {0x0, r6}, {}, {r2, r6}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {}, {r5}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {}, {}, {r4}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {}, {r1}, {0x0, r6}, {r4}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {r5}, {}, {}, {r5}, {r5}, {}, {}, {}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {}, {r5, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5, r6}, {r5}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4, r6}], 0x1, "2156816c73038c"}) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) 10:18:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f060000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) [ 1085.312326][ C0] sd 0:0:1:0: tag#4950 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1085.322277][ C0] sd 0:0:1:0: tag#4950 CDB: opcode=0xe5 (vendor) [ 1085.328617][ C0] sd 0:0:1:0: tag#4950 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1085.337666][ C0] sd 0:0:1:0: tag#4950 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1085.346744][ C0] sd 0:0:1:0: tag#4950 CDB[20]: ba [ 1085.383829][T31597] loop5: detected capacity change from 0 to 512 [ 1085.400544][T31597] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1085.410815][T31597] EXT4-fs (loop5): group descriptors corrupted! [ 1085.458539][T31607] loop2: detected capacity change from 0 to 264192 [ 1085.468279][T31607] msdos filesystem being mounted at /root/syzkaller-testdir156917949/syzkaller.TDnRSM/2043/file1 supports timestamps until 2107 (0x10391447e) 10:18:48 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') ftruncate(0xffffffffffffffff, 0x1000) lseek(0xffffffffffffffff, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @buffer={0x0, 0xdf, &(0x7f0000000680)=""/223}, &(0x7f0000000640)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) syz_mount_image$nfs(&(0x7f0000000100), &(0x7f0000000140)='./bus\x00', 0x8, 0x3, &(0x7f0000000180)=[{&(0x7f0000000240)="a480647bd97d259619a0ce763f99ef75275a165cc5b8b013606cdbef93eef719681e6c0b1a3488a54aa2678e094b44b77107a88d43cc0016324e2f046084d228186c036b1e0ddf3fda6f468cee95a97d9a22241ccefe7f48f5f9c6d79bfe027e5768ee16e755b25af442bbd7d3057481addc98430755a899c47e4fbd156787d9218b", 0x82, 0x5}, {&(0x7f0000000440)="70d819e2ae9eedcb093f79541fac909326978ba23f95e2111d0f54feee3c1ad3e9cbfa0dcad715c1b75445723cbb843694537eaa7eaa66ff1e886868020697e24eee62a79c3ce0e8db897c3f6ff654986b68961ea1743e15bbf2fe8d98be5b24729cb41ec6ffaf9cab9c655ef9e427dec05f4209671979a94390b98bd5b6f428db395b56710c863fe099fe65f2fcb47e78695f30449637002ebe8ba264bd373cb1c95103bd8c91e197041628f1a357a6c672d2c3ae66f6c1114d3c76", 0xbc, 0x3}, {&(0x7f0000000500)="8165db68613ab459da1708560a8df9d934b9665e1f7ef8335aa050e40390955f8aa9aa287a71e90ea6c09b9d32ecce71139af922410a0f0b3124c41b44abc131c6a7a881b233c9d43840a39ef7145a9ed578632003b71134aa7c080f19a659f2343c68e9f2b2f5b0be00a671068b945d28157bfaeb717c5934e4172d7df2d0b0e703bf36abbe633df986456916d5b83351c8b4c941184b36487d057b2d49024730766536cdbed0a8a57946928e2a636bd2c982e777309b8a285be21bcf1b5ea4fa7cfdc8b30de92556d5c3d350316ccefd224a165eedf115e64c24b663ac093cada0389144f6e6e582fc5a4d6e", 0xed, 0x7}], 0x80c806, &(0x7f0000000300)={[{'msdos\x00'}, {}, {}, {'@]-\xf7^'}], [{@audit}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {}, {r5}, {r5}, {r5}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {r4}, {}, {0x0, r6}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {0x0, r6}, {}, {r2, r6}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {}, {r5}, {}, {r1, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {}, {}, {r4}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {}, {r0}, {0x0, r6}, {r4}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {r5}, {}, {}, {r5}, {r5}, {}, {}, {}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {}, {r5, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5, r6}, {r5}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4, r6}], 0x1, "2156816c73038c"}) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r7, 0x0, 0x8400fffffffa) creat(&(0x7f0000000340)='./file0\x00', 0x5e) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000600), 0x42000, 0x0) 10:18:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce0008000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000022000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f070000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) [ 1085.726032][T31618] loop4: detected capacity change from 0 to 512 [ 1085.756373][T31618] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1085.764420][T31624] loop5: detected capacity change from 0 to 512 10:18:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce0009000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:48 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x401, 0x8, &(0x7f00000008c0)=[{0x0}, {0x0, 0x0, 0x9}, {&(0x7f0000000180)="5030a6b9906c95e36ee1b07f9e5698893307dd91cd0319578b614ed5f1873eb0", 0x20, 0xfffffffffffffffd}, {&(0x7f0000000340)="2df6157d4494279dde2031db3b2744b435271e65a343796db3da0bb347a3215e9b71", 0x22, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f5bf3f90b3d3e7d7132c3012ab7043e22a6f8edc5e516ee833a4fdcf825d9da3fed17cac003d9dd022d", 0xa4, 0x7fffffff}, {&(0x7f0000000500)="822171b91eb1498a4740794c5db7bc7a965f6bf8c7cf5baee0946ad2aa4b016a8a03bb30b092e47cd74a4fab60e1d1443c33c80fa2ef7af6514920209443a39077bb6a856f3c3e40bb7182a08692593ab13f04b516500ed3b3256325f48aafef3d8ca84cdce2b0609ed9c6346c356964614f21f9699436b6ca419197a0729a46ae7ae36fd203e577f2b03891ce7ba975aa5d47214e98c73647d20e757d1ce2d1990688090eee936562a1b4968deb59f6a2980feca28742afcaf376ab51294f57d6334c86538795c11e018be19db248ea75e1", 0xd2, 0x10000}, {&(0x7f0000000600)="4a6006458a4a1e3060e4cca0086f3b44f908e6941741cf7422f159df72a1cdb68c01ef3f102d2afb1e3e446c41bef79e359d62ed3155330d3b2f5207705e6dfa86f4f655d80ee44134bb9211fed0be8f7f86ff1f4b5abab22df6a1bfed2d66e51791fcbbf6f6926ce384fda7a7e86c17dcc2b2473f22c6d095ade56596ee656b3c596a038658b30895170a9ab2d4379f4f58cc6e", 0x94, 0x9}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f0000000ac0)={[{@dots}, {@fat=@sys_immutable}, {@nodots}, {@fat=@umask}], [{@measure}, {@appraise}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@seclabel}]}) openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f80)={0x1, &(0x7f0000000f40)=[{0x7f}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000fc0), 0xc, &(0x7f0000000200)={&(0x7f0000003940)=ANY=[@ANYRES64=r7, @ANYRESHEX, @ANYRES32=r6, @ANYRESOCT=r3, @ANYRESOCT=r4, @ANYBLOB="16de71cf0766d82ab6b67f0cd79e8e3ee2643e2e5026c3ea1ccfde1fe0912c50f4450c9c7749b181ae244aa09bb447092b0b62871d5ab9b62bc1121905ff995d268176192bba6bbfe4ff322f3370ce1ac7b5dd004238de507070dc0002cfe8ca03a81158f62018fe98245631fc021061fec067e33a1c01f786dafad477a72fcf767c43d28917995da3bd4df41908d180cd9517f24d97f14674a9a15bb602dca6587204d6571e02a456eb415ea3208e6afe4ed4f3533d7cf074ed4bd702d74e242405fadcd0c73dbb590bb430b54691990800f66109473f3531c01f00"/234], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x40025) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r10, r9, 0x0, 0x100003000) 10:18:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000004022000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1085.785281][T31624] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1085.795574][T31624] EXT4-fs (loop5): group descriptors corrupted! 10:18:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f080000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) [ 1085.864401][T31638] loop4: detected capacity change from 0 to 512 [ 1085.898891][T31638] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1085.908229][ C0] sd 0:0:1:0: tag#4942 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1085.916129][T31647] loop5: detected capacity change from 0 to 512 [ 1085.918075][ C0] sd 0:0:1:0: tag#4942 CDB: opcode=0xe5 (vendor) [ 1085.931075][ C0] sd 0:0:1:0: tag#4942 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1085.940099][ C0] sd 0:0:1:0: tag#4942 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1085.949392][ C0] sd 0:0:1:0: tag#4942 CDB[20]: ba 10:18:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000032000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:48 executing program 3: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) creat(&(0x7f0000000100)='./bus/file0\x00', 0x0) r2 = syz_open_dev$sg(0x0, 0x0, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r2, 0xd000943e, &(0x7f0000000a40)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000500)=ANY=[@ANYRES64=0x0, @ANYBLOB="08000000000000001200000084542998fb11d2e6e1c81d2ed0697fe10000000008000000000000000600000000000000ffffffff00000000c500000000000000f8ffffff080000000100008002000000ffffff7f000000009e350000000000000000000000000000070000000000000018000000000000000000000000000000813b39b0daf84172cd"]) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000001a40)={0xcc, [{0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {r4, 0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {r7, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {r4}, {}, {r5}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {r5, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {r4}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {0x0}, {}, {0x0}], 0x4, "fd359d317d1f37"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000240)=ANY=[@ANYRES64=0x0, @ANYBLOB="01a4504eb9fb80984be288be253ba96ce75bdd000000000000000000000000040000000006000000000000411a000000000000000082001f0000000000000080880e00000700000090000000090000000000000003000000000000000900000000000000050000000000000054040371e8e3cb240b31bb85f6296b8af01fd2d1612774a2e1718053"]) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000002a40)={0x1, [{r290, r211}, {r139, r115}, {r172, r277}, {r244, r232}, {r149, r127}, {r200}, {r105}, {0x0, r46}, {0x0, r304}, {r227, r127}, {0x0, r106}, {r271, r177}, {r174, r145}, {r218, r81}, {r233, r106}, {r137, r122}, {0x0, r138}, {r206, r103}, {r278, r198}, {r62, r53}, {0x0, r310}, {r157, r36}, {r93, r89}, {r88, r251}, {r30, r209}, {r116, r112}, {r113, r303}, {r238, r148}, {r9, r220}, {r73, r164}, {r238, r114}, {r163, r28}, {r311, r11}, {r154, r84}, {r201, r255}, {r64, r192}, {r133, r72}, {r80, r118}, {r105, r48}, {r249, r152}, {r144, r34}, {r308, r51}, {0x0, r246}, {r201, r203}, {r276, r34}, {r229, r38}, {r91, r156}, {r85, r194}, {r204, r75}, {r50, r277}, {}, {r149, r100}, {r305, r24}, {r210, r63}, {r200, r78}, {r242, r49}, {r67, r300}, {0x0, r203}, {r190, r97}, {r94, r120}, {r126, r35}, {0x0, r95}, {r240, r228}, {r110, r306}, {0x0, r27}, {r19, r171}, {r56, r260}, {r96, r286}, {r222, r83}, {r67, r63}, {0x0, r150}, {r137, r291}, {r69}, {r288, r246}, {r265}, {r168, r279}, {0x0, r33}, {r269, r125}, {r301, r57}, {r240, r100}, {r25, r247}, {r295, r262}, {0x0, r237}, {r295, r26}, {r231, r184}, {r249, r196}, {0x0, r103}, {r166, r251}, {r268, r281}, {r216, r104}, {0x0, r129}, {r240, r141}, {r193, r12}, {r280, r159}, {r231, r170}, {r169, r103}, {r76, r274}, {r5, r203}, {r166, r106}, {r88, r170}, {r154, r181}, {r32, r122}, {0x0, r83}, {r39, r43}, {r126, r160}, {0x0, r10}, {r56, r143}, {0x0, r196}, {r282, r298}, {r47, r167}, {r271, r234}, {r13, r112}, {r69, r21}, {r200, r10}, {r109, r275}, {r65, r291}, {r124, r286}, {r312, r111}, {r128, r36}, {r163, r31}, {r254, r79}, {r22, r207}, {r55, r51}, {r123, r125}, {r180}, {0x0, r14}, {r82, r291}, {r74, r226}, {r86, r136}, {r272, r81}, {r225, r23}, {r117, r16}, {r223, r71}, {r225, r68}, {r110, r108}, {r243, r277}, {0x0, r293}, {r5, r75}, {0x0, r81}, {r77, r226}, {0x0, r195}, {r7}, {r102, r173}, {r110, r186}, {r64, r274}, {r292, r90}, {r213, r57}, {r236, r66}, {r44, r258}, {r146, r267}, {0x0, r119}, {r307}, {0x0, r29}, {r208, r68}, {r130, r289}, {r70, r253}, {r206}, {r52, r152}, {r264}, {r135, r51}, {r77, r194}, {r151, r147}, {r259, r26}, {r50, r24}, {r202, r284}, {r185, r98}, {r140, r219}, {r191, r234}, {r109, r198}, {r235}, {r245, r221}, {0x0, r40}, {r240, r241}, {r248, r34}, {r183, r108}, {r58, r239}, {r296, r106}, {r85, r142}, {r276, r287}, {r99, r291}, {r182, r181}, {r210, r270}, {r67, r26}, {r212, r189}, {r4}, {r302, r134}, {r202, r232}, {r168, r120}, {}, {r305, r75}, {r8, r179}, {r146, r175}, {r37, r215}, {r132, r277}, {r295}, {r15, r53}, {r4}, {r297, r257}, {r261, r192}, {r163}, {r102, r84}, {r101, r61}, {r308, r194}, {r161, r48}, {r278, r14}, {r30, r205}, {r30, r250}, {r256, r59}, {r155}, {r285, r198}, {r17}, {r307, r162}, {r140, r224}, {r158, r195}, {r20, r273}, {r227, r179}, {r309, r131}, {0x0, r98}, {r60, r293}, {r185, r230}, {r41}, {r151, r187}, {r54, r165}, {r176}, {r178, r160}, {0x0, r51}, {r188, r63}, {r86, r237}, {r166, r38}, {0x0, r78}, {r121, r283}, {r311, r162}, {r45, r199}, {r214, r92}, {r263}, {r296, r177}, {0x0, r187}, {r85, r217}, {r42, r59}, {r107, r90}, {r266, r87}, {r294, r145}, {r271, r304}, {r176, r18}, {r20, r196}, {r109, r239}, {r299, r303}, {r161, r66}, {r188}, {r76, r153}, {0x0, r92}, {r124, r232}, {r86, r197}, {r80}, {r252, r104}], 0x6f, "e07de9a005272a"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {}, {r5}, {r5}, {r5}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {r4}, {}, {0x0, r6}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {}, {r5}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {}, {}, {r4}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {}, {}, {0x0, r6}, {r4}, {}, {r5, r217}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {0x0, r6}, {}, {r7, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r314}, {}, {}, {}, {r5}, {}, {}, {r5}, {r5}, {}, {}, {}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {}, {r5, r6}, {r313}, {0x0, r6}, {}, {}, {r4, r6}, {r5, r6}, {r5}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {0x0, r6}, {r5}, {0x0, r6}, {r8}, {}, {}, {r4, r6}], 0x1, "2156816c73038c"}) r315 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r1, r315, 0x0, 0x8400fffffffa) open(&(0x7f0000000180)='./bus/file0\x00', 0x4c102, 0x0) open$dir(&(0x7f00000001c0)='./bus\x00', 0x10080, 0x0) [ 1085.957898][T31647] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1085.968008][T31647] EXT4-fs (loop5): group descriptors corrupted! [ 1086.002245][T31638] loop4: detected capacity change from 0 to 512 [ 1086.011507][T31638] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:18:48 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {}, {r5}, {}, {r5}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5}, {}, {0x0, r6}, {r5}, {0x0, r6}, {r4}, {}, {0x0, r6}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {0x0, r6}, {}, {r2, r6}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {}, {r5}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {}, {}, {r4}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {}, {r1}, {0x0, r6}, {r4}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {r5}, {}, {}, {r5}, {r5}, {}, {}, {}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {}, {r5, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5, r6}, {r5}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4, r6}], 0x1, "2156816c73038c"}) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) 10:18:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000042000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1086.077586][T31647] loop5: detected capacity change from 0 to 512 [ 1086.111222][T31647] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1086.121387][T31647] EXT4-fs (loop5): group descriptors corrupted! 10:18:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce000a000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000052000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce000b000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) [ 1086.152228][T31676] loop4: detected capacity change from 0 to 512 [ 1086.162806][T31676] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:18:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f090000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000062000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1086.243190][T31695] loop2: detected capacity change from 0 to 264192 [ 1086.250625][T31693] loop5: detected capacity change from 0 to 512 [ 1086.269726][T31698] loop4: detected capacity change from 0 to 512 [ 1086.276858][T31693] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1086.287017][T31693] EXT4-fs (loop5): group descriptors corrupted! [ 1086.303220][T31695] msdos filesystem being mounted at /root/syzkaller-testdir156917949/syzkaller.TDnRSM/2044/file1 supports timestamps until 2107 (0x10391447e) [ 1086.321075][T31698] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:18:48 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x401, 0x8, &(0x7f00000008c0)=[{0x0}, {0x0, 0x0, 0x9}, {&(0x7f0000000180)="5030a6b9906c95e36ee1b07f9e5698893307dd91cd0319578b614ed5f1873eb0", 0x20, 0xfffffffffffffffd}, {&(0x7f0000000340)="2df6157d4494279dde2031db3b2744b435271e65a343796db3da0bb347a3215e9b71", 0x22, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f5bf3f90b3d3e7d7132c3012ab7043e22a6f8edc5e516ee833a4fdcf825d9da3fed17cac003d9dd022d", 0xa4, 0x7fffffff}, {&(0x7f0000000500)="822171b91eb1498a4740794c5db7bc7a965f6bf8c7cf5baee0946ad2aa4b016a8a03bb30b092e47cd74a4fab60e1d1443c33c80fa2ef7af6514920209443a39077bb6a856f3c3e40bb7182a08692593ab13f04b516500ed3b3256325f48aafef3d8ca84cdce2b0609ed9c6346c356964614f21f9699436b6ca419197a0729a46ae7ae36fd203e577f2b03891ce7ba975aa5d47214e98c73647d20e757d1ce2d1990688090eee936562a1b4968deb59f6a2980feca28742afcaf376ab51294f57d6334c86538795c11e018be19db248ea75e1", 0xd2, 0x10000}, {&(0x7f0000000600)="4a6006458a4a1e3060e4cca0086f3b44f908e6941741cf7422f159df72a1cdb68c01ef3f102d2afb1e3e446c41bef79e359d62ed3155330d3b2f5207705e6dfa86f4f655d80ee44134bb9211fed0be8f7f86ff1f4b5abab22df6a1bfed2d66e51791fcbbf6f6926ce384fda7a7e86c17dcc2b2473f22c6d095ade56596ee656b3c596a038658b30895170a9ab2d4379f4f58cc6e", 0x94, 0x9}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f0000000ac0)={[{@dots}, {@fat=@sys_immutable}, {@nodots}, {@fat=@umask}], [{@measure}, {@appraise}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@seclabel}]}) openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f80)={0x1, &(0x7f0000000f40)=[{0x7f}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000fc0), 0xc, &(0x7f0000000200)={&(0x7f0000003940)=ANY=[@ANYRES64=r7, @ANYRESHEX, @ANYRES32=r6, @ANYRESOCT=r3, @ANYRESOCT=r4, @ANYBLOB="16de71cf0766d82ab6b67f0cd79e8e3ee2643e2e5026c3ea1ccfde1fe0912c50f4450c9c7749b181ae244aa09bb447092b0b62871d5ab9b62bc1121905ff995d268176192bba6bbfe4ff322f3370ce1ac7b5dd004238de507070dc0002cfe8ca03a81158f62018fe98245631fc021061fec067e33a1c01f786dafad477a72fcf767c43d28917995da3bd4df41908d180cd9517f24d97f14674a9a15bb602dca6587204d6571e02a456eb415ea3208e6afe4ed4f3533d7cf074ed4bd702d74e242405fadcd0c73dbb590bb430b54691990800f66109473f3531c01f00"/234], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x40025) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r10, r9, 0x0, 0x100003800) 10:18:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0a0000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000004062000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce000c000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) [ 1086.430260][T31713] loop5: detected capacity change from 0 to 512 [ 1086.462250][T31713] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1086.472360][T31713] EXT4-fs (loop5): group descriptors corrupted! [ 1086.488376][T31721] loop4: detected capacity change from 0 to 512 [ 1086.516264][T31721] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1086.531205][ C0] sd 0:0:1:0: tag#4981 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1086.541129][ C0] sd 0:0:1:0: tag#4981 CDB: opcode=0xe5 (vendor) [ 1086.547468][ C0] sd 0:0:1:0: tag#4981 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1086.556628][ C0] sd 0:0:1:0: tag#4981 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1086.565690][ C0] sd 0:0:1:0: tag#4981 CDB[20]: ba [ 1086.580856][T31713] loop5: detected capacity change from 0 to 512 [ 1086.590112][T31713] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1086.600222][T31713] EXT4-fs (loop5): group descriptors corrupted! [ 1086.652480][T31721] loop4: detected capacity change from 0 to 512 [ 1086.665865][T31721] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:18:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0b0000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) [ 1086.985346][T31748] loop5: detected capacity change from 0 to 512 [ 1087.002052][T31748] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1087.012169][T31748] EXT4-fs (loop5): group descriptors corrupted! 10:18:49 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {}, {r5}, {}, {r5}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5}, {}, {0x0, r6}, {r5}, {0x0, r6}, {r4}, {}, {0x0, r6}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {0x0, r6}, {}, {r2, r6}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {}, {r5}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {}, {}, {r4}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {}, {r1}, {0x0, r6}, {r4}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {r5}, {}, {}, {r5}, {r5}, {}, {}, {}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {}, {r5, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5, r6}, {r5}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4, r6}], 0x1, "2156816c73038c"}) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) 10:18:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000072000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce000d000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:49 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x401, 0x8, &(0x7f00000008c0)=[{0x0}, {0x0, 0x0, 0x9}, {&(0x7f0000000180)="5030a6b9906c95e36ee1b07f9e5698893307dd91cd0319578b614ed5f1873eb0", 0x20, 0xfffffffffffffffd}, {&(0x7f0000000340)="2df6157d4494279dde2031db3b2744b435271e65a343796db3da0bb347a3215e9b71", 0x22, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f5bf3f90b3d3e7d7132c3012ab7043e22a6f8edc5e516ee833a4fdcf825d9da3fed17cac003d9dd022d", 0xa4, 0x7fffffff}, {&(0x7f0000000500)="822171b91eb1498a4740794c5db7bc7a965f6bf8c7cf5baee0946ad2aa4b016a8a03bb30b092e47cd74a4fab60e1d1443c33c80fa2ef7af6514920209443a39077bb6a856f3c3e40bb7182a08692593ab13f04b516500ed3b3256325f48aafef3d8ca84cdce2b0609ed9c6346c356964614f21f9699436b6ca419197a0729a46ae7ae36fd203e577f2b03891ce7ba975aa5d47214e98c73647d20e757d1ce2d1990688090eee936562a1b4968deb59f6a2980feca28742afcaf376ab51294f57d6334c86538795c11e018be19db248ea75e1", 0xd2, 0x10000}, {&(0x7f0000000600)="4a6006458a4a1e3060e4cca0086f3b44f908e6941741cf7422f159df72a1cdb68c01ef3f102d2afb1e3e446c41bef79e359d62ed3155330d3b2f5207705e6dfa86f4f655d80ee44134bb9211fed0be8f7f86ff1f4b5abab22df6a1bfed2d66e51791fcbbf6f6926ce384fda7a7e86c17dcc2b2473f22c6d095ade56596ee656b3c596a038658b30895170a9ab2d4379f4f58cc6e", 0x94, 0x9}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f0000000ac0)={[{@dots}, {@fat=@sys_immutable}, {@nodots}, {@fat=@umask}], [{@measure}, {@appraise}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@seclabel}]}) openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f80)={0x1, &(0x7f0000000f40)=[{0x7f}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000fc0), 0xc, &(0x7f0000000200)={&(0x7f0000003940)=ANY=[@ANYRES64=r7, @ANYRESHEX, @ANYRES32=r6, @ANYRESOCT=r3, @ANYRESOCT=r4, @ANYBLOB="16de71cf0766d82ab6b67f0cd79e8e3ee2643e2e5026c3ea1ccfde1fe0912c50f4450c9c7749b181ae244aa09bb447092b0b62871d5ab9b62bc1121905ff995d268176192bba6bbfe4ff322f3370ce1ac7b5dd004238de507070dc0002cfe8ca03a81158f62018fe98245631fc021061fec067e33a1c01f786dafad477a72fcf767c43d28917995da3bd4df41908d180cd9517f24d97f14674a9a15bb602dca6587204d6571e02a456eb415ea3208e6afe4ed4f3533d7cf074ed4bd702d74e242405fadcd0c73dbb590bb430b54691990800f66109473f3531c01f00"/234], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x40025) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r10, r9, 0x0, 0x100004000) 10:18:49 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {}, {r5}, {r5}, {r5}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {r4}, {}, {0x0, r6}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {0x0, r6}, {}, {r2, r6}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {}, {r5}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {}, {}, {r4}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {}, {r1}, {0x0, r6}, {r4}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {r5}, {}, {}, {r5}, {r5}, {}, {}, {}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {}, {r5, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5, r6}, {r5}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4, r6}], 0x1, "2156816c73038c"}) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, 0x0, 0x8400fffffffa) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x24, r8, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r9}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x3}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_START_AP(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)={0x74, r8, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r9}, @void}}, [@beacon=[@NL80211_ATTR_BEACON_HEAD={0x28, 0xe, {@wo_ht={{}, {}, @broadcast, @device_a, @from_mac}, 0x0, @default, 0x1, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void}}], @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}], @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8}, @NL80211_ATTR_SSID={0xa, 0x34, @default_ap_ssid}, @NL80211_ATTR_AUTH_TYPE={0x8}, @NL80211_ATTR_EXTERNAL_AUTH_SUPPORT={0x4}]}, 0x74}}, 0x0) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0x0, 0x20, 0x70bd2b, 0x25dfdbfc, {{}, {@void, @val={0x8, 0x3, r9}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000010}, 0x40801) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) [ 1087.091206][T31748] loop5: detected capacity change from 0 to 512 [ 1087.103227][T31748] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1087.113463][T31748] EXT4-fs (loop5): group descriptors corrupted! 10:18:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0c0000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000082000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1087.168373][T31768] loop4: detected capacity change from 0 to 512 [ 1087.209093][T31777] loop2: detected capacity change from 0 to 264192 [ 1087.222322][ C1] sd 0:0:1:0: tag#4973 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1087.222440][T31768] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1087.232197][ C1] sd 0:0:1:0: tag#4973 CDB: opcode=0xe5 (vendor) [ 1087.245747][ C1] sd 0:0:1:0: tag#4973 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c 10:18:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000182000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1087.246301][T31783] loop5: detected capacity change from 0 to 512 [ 1087.254834][ C1] sd 0:0:1:0: tag#4973 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1087.254855][ C1] sd 0:0:1:0: tag#4973 CDB[20]: ba [ 1087.318890][T31783] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1087.329030][T31783] EXT4-fs (loop5): group descriptors corrupted! [ 1087.358436][T31768] loop4: detected capacity change from 0 to 512 10:18:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000000000001c2000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1087.365076][T31777] msdos filesystem being mounted at /root/syzkaller-testdir156917949/syzkaller.TDnRSM/2045/file1 supports timestamps until 2107 (0x10391447e) [ 1087.395705][T31768] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:18:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000262000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce000e000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) [ 1087.420093][T31783] loop5: detected capacity change from 0 to 512 [ 1087.442066][T31783] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1087.452200][T31783] EXT4-fs (loop5): group descriptors corrupted! 10:18:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0d0000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) [ 1087.537777][T31814] loop4: detected capacity change from 0 to 512 [ 1087.570045][T31822] loop5: detected capacity change from 0 to 512 [ 1087.583761][T31814] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1087.601317][T31822] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1087.611417][T31822] EXT4-fs (loop5): group descriptors corrupted! [ 1087.654486][T31814] loop4: detected capacity change from 0 to 512 [ 1087.665763][T31814] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:18:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0e0000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000000000052b2000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce000f000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:50 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x401, 0x8, &(0x7f00000008c0)=[{0x0}, {0x0, 0x0, 0x9}, {&(0x7f0000000180)="5030a6b9906c95e36ee1b07f9e5698893307dd91cd0319578b614ed5f1873eb0", 0x20, 0xfffffffffffffffd}, {&(0x7f0000000340)="2df6157d4494279dde2031db3b2744b435271e65a343796db3da0bb347a3215e9b71", 0x22, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f5bf3f90b3d3e7d7132c3012ab7043e22a6f8edc5e516ee833a4fdcf825d9da3fed17cac003d9dd022d", 0xa4, 0x7fffffff}, {&(0x7f0000000500)="822171b91eb1498a4740794c5db7bc7a965f6bf8c7cf5baee0946ad2aa4b016a8a03bb30b092e47cd74a4fab60e1d1443c33c80fa2ef7af6514920209443a39077bb6a856f3c3e40bb7182a08692593ab13f04b516500ed3b3256325f48aafef3d8ca84cdce2b0609ed9c6346c356964614f21f9699436b6ca419197a0729a46ae7ae36fd203e577f2b03891ce7ba975aa5d47214e98c73647d20e757d1ce2d1990688090eee936562a1b4968deb59f6a2980feca28742afcaf376ab51294f57d6334c86538795c11e018be19db248ea75e1", 0xd2, 0x10000}, {&(0x7f0000000600)="4a6006458a4a1e3060e4cca0086f3b44f908e6941741cf7422f159df72a1cdb68c01ef3f102d2afb1e3e446c41bef79e359d62ed3155330d3b2f5207705e6dfa86f4f655d80ee44134bb9211fed0be8f7f86ff1f4b5abab22df6a1bfed2d66e51791fcbbf6f6926ce384fda7a7e86c17dcc2b2473f22c6d095ade56596ee656b3c596a038658b30895170a9ab2d4379f4f58cc6e", 0x94, 0x9}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f0000000ac0)={[{@dots}, {@fat=@sys_immutable}, {@nodots}, {@fat=@umask}], [{@measure}, {@appraise}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@seclabel}]}) openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f80)={0x1, &(0x7f0000000f40)=[{0x7f}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000fc0), 0xc, &(0x7f0000000200)={&(0x7f0000003940)=ANY=[@ANYRES64=r7, @ANYRESHEX, @ANYRES32=r6, @ANYRESOCT=r3, @ANYRESOCT=r4, @ANYBLOB="16de71cf0766d82ab6b67f0cd79e8e3ee2643e2e5026c3ea1ccfde1fe0912c50f4450c9c7749b181ae244aa09bb447092b0b62871d5ab9b62bc1121905ff995d268176192bba6bbfe4ff322f3370ce1ac7b5dd004238de507070dc0002cfe8ca03a81158f62018fe98245631fc021061fec067e33a1c01f786dafad477a72fcf767c43d28917995da3bd4df41908d180cd9517f24d97f14674a9a15bb602dca6587204d6571e02a456eb415ea3208e6afe4ed4f3533d7cf074ed4bd702d74e242405fadcd0c73dbb590bb430b54691990800f66109473f3531c01f00"/234], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x40025) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r10, r9, 0x0, 0x100004800) 10:18:50 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {}, {r5}, {}, {r5}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5}, {}, {0x0, r6}, {r5}, {0x0, r6}, {r4}, {}, {0x0, r6}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {0x0, r6}, {}, {r2, r6}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {}, {r5}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {}, {}, {r4}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {}, {r1}, {0x0, r6}, {r4}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {r5}, {}, {}, {r5}, {r5}, {}, {}, {}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {}, {r5, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5, r6}, {r5}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4, r6}], 0x1, "2156816c73038c"}) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) 10:18:50 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) syz_io_uring_setup(0x3ede, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0, 0x12100}, 0x0) setsockopt$sock_int(r3, 0x1, 0x2a, &(0x7f0000000100)=0x80000001, 0x4) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r6 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r6, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r6, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r9}, {}, {r8}, {r8}, {r8}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {r7, r9}, {0x0, r9}, {}, {r8, r9}, {0x0, r9}, {}, {}, {}, {0x0, r9}, {}, {0x0, r9}, {0x0, r9}, {}, {}, {}, {}, {r7}, {0x0, r9}, {}, {}, {r7, r9}, {r8}, {}, {0x0, r9}, {r8, r9}, {0x0, r9}, {r7}, {}, {0x0, r9}, {r8}, {}, {}, {r8}, {0x0, r9}, {}, {0x0, r9}, {}, {r5, r9}, {0x0, r9}, {r7}, {}, {r8}, {r7}, {}, {r8}, {}, {0x0, r9}, {0x0, r9}, {}, {}, {r8}, {0x0, r9}, {0x0, r9}, {0x0, r9}, {r8}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {0x0, r9}, {r7}, {0x0, r9}, {}, {}, {r7, r9}, {}, {}, {}, {}, {}, {}, {}, {r8}, {0x0, r9}, {0x0, r9}, {r7}, {r8, r9}, {0x0, r9}, {0x0, r9}, {}, {}, {}, {r7}, {0x0, r9}, {}, {0x0, r9}, {0x0, r9}, {0x0, r9}, {r8, r9}, {r7, r9}, {r8}, {}, {r7, r9}, {r7}, {}, {}, {r7}, {}, {}, {}, {0x0, r9}, {0x0, r9}, {0x0, r9}, {0x0, r9}, {}, {}, {r7, r9}, {0x0, r9}, {0x0, r9}, {r7, r9}, {0x0, r9}, {}, {}, {r8}, {}, {r4}, {0x0, r9}, {r7}, {}, {r8}, {}, {}, {r8}, {0x0, r9}, {0x0, r9}, {}, {0x0, r9}, {}, {0x0, r9}, {}, {r7}, {}, {}, {}, {0x0, r9}, {r7, r9}, {r8}, {}, {}, {}, {r8}, {}, {}, {}, {r7}, {r7}, {}, {r7}, {r8}, {0x0, r9}, {r7}, {}, {r7}, {0x0, r9}, {r8}, {r7, r9}, {0x0, r9}, {}, {0x0, r9}, {}, {}, {0x0, r9}, {r8}, {}, {}, {r7}, {}, {0x0, r9}, {r8, r9}, {0x0, r9}, {0x0, r9}, {}, {}, {0x0, r9}, {r7}, {r8}, {r8, r9}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {r8}, {}, {}, {r8}, {r8}, {}, {}, {}, {0x0, r9}, {}, {r7, r9}, {r7}, {}, {}, {0x0, r9}, {}, {r8, r9}, {r7}, {0x0, r9}, {}, {}, {r7, r9}, {r8, r9}, {r8}, {r7, r9}, {}, {}, {r8}, {r7, r9}, {0x0, r9}, {}, {0x0, r9}, {r8}, {r8}, {r7}, {}, {0x0, r9}, {r8}, {0x0, r9}, {}, {}, {}, {r7, r9}], 0x1, "2156816c73038c"}) r10 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_FADVISE={0x18, 0x5, 0x0, @fd_index=0x6, 0x3, 0x0, 0x6, 0x2, 0x1}, 0x9) sendfile(r0, r10, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) [ 1088.052228][T31845] loop4: detected capacity change from 0 to 512 [ 1088.063866][T31850] loop5: detected capacity change from 0 to 512 [ 1088.100873][T31845] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1088.114359][T31850] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1088.120176][ C1] sd 0:0:1:0: tag#4966 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1088.124548][T31850] EXT4-fs (loop5): group descriptors corrupted! [ 1088.134528][ C1] sd 0:0:1:0: tag#4966 CDB: opcode=0xe5 (vendor) 10:18:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000000000003f2000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1088.147067][ C1] sd 0:0:1:0: tag#4966 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1088.156257][ C1] sd 0:0:1:0: tag#4966 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1088.165389][ C1] sd 0:0:1:0: tag#4966 CDB[20]: ba 10:18:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000402000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1088.219049][T31845] loop4: detected capacity change from 0 to 512 [ 1088.226529][T31866] loop2: detected capacity change from 0 to 264192 [ 1088.228663][T31850] loop5: detected capacity change from 0 to 512 [ 1088.245910][T31845] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:18:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000800402000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0f0000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce0010000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) [ 1088.260063][T31850] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1088.270285][T31850] EXT4-fs (loop5): group descriptors corrupted! [ 1088.289415][T31866] msdos filesystem being mounted at /root/syzkaller-testdir156917949/syzkaller.TDnRSM/2046/file1 supports timestamps until 2107 (0x10391447e) 10:18:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000004802000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1088.370040][T31889] loop5: detected capacity change from 0 to 512 [ 1088.376051][T31893] loop4: detected capacity change from 0 to 512 [ 1088.402067][T31889] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1088.412208][T31889] EXT4-fs (loop5): group descriptors corrupted! 10:18:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f100000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000fffffff62000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1088.428212][T31893] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:18:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce0011000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) [ 1088.490525][T31905] loop5: detected capacity change from 0 to 512 [ 1088.521874][T31905] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1088.532073][T31905] EXT4-fs (loop5): group descriptors corrupted! [ 1088.546008][T31915] loop4: detected capacity change from 0 to 512 [ 1088.579515][T31915] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:18:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000fffffffe2000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1088.591143][T31905] loop5: detected capacity change from 0 to 512 [ 1088.610236][T31905] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1088.620349][T31905] EXT4-fs (loop5): group descriptors corrupted! [ 1088.630092][T31915] loop4: detected capacity change from 0 to 512 [ 1088.659470][T31915] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:18:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000f6ffffff2000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:51 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x401, 0x8, &(0x7f00000008c0)=[{0x0}, {0x0, 0x0, 0x9}, {&(0x7f0000000180)="5030a6b9906c95e36ee1b07f9e5698893307dd91cd0319578b614ed5f1873eb0", 0x20, 0xfffffffffffffffd}, {&(0x7f0000000340)="2df6157d4494279dde2031db3b2744b435271e65a343796db3da0bb347a3215e9b71", 0x22, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f5bf3f90b3d3e7d7132c3012ab7043e22a6f8edc5e516ee833a4fdcf825d9da3fed17cac003d9dd022d", 0xa4, 0x7fffffff}, {&(0x7f0000000500)="822171b91eb1498a4740794c5db7bc7a965f6bf8c7cf5baee0946ad2aa4b016a8a03bb30b092e47cd74a4fab60e1d1443c33c80fa2ef7af6514920209443a39077bb6a856f3c3e40bb7182a08692593ab13f04b516500ed3b3256325f48aafef3d8ca84cdce2b0609ed9c6346c356964614f21f9699436b6ca419197a0729a46ae7ae36fd203e577f2b03891ce7ba975aa5d47214e98c73647d20e757d1ce2d1990688090eee936562a1b4968deb59f6a2980feca28742afcaf376ab51294f57d6334c86538795c11e018be19db248ea75e1", 0xd2, 0x10000}, {&(0x7f0000000600)="4a6006458a4a1e3060e4cca0086f3b44f908e6941741cf7422f159df72a1cdb68c01ef3f102d2afb1e3e446c41bef79e359d62ed3155330d3b2f5207705e6dfa86f4f655d80ee44134bb9211fed0be8f7f86ff1f4b5abab22df6a1bfed2d66e51791fcbbf6f6926ce384fda7a7e86c17dcc2b2473f22c6d095ade56596ee656b3c596a038658b30895170a9ab2d4379f4f58cc6e", 0x94, 0x9}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f0000000ac0)={[{@dots}, {@fat=@sys_immutable}, {@nodots}, {@fat=@umask}], [{@measure}, {@appraise}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@seclabel}]}) openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f80)={0x1, &(0x7f0000000f40)=[{0x7f}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000fc0), 0xc, &(0x7f0000000200)={&(0x7f0000003940)=ANY=[@ANYRES64=r7, @ANYRESHEX, @ANYRES32=r6, @ANYRESOCT=r3, @ANYRESOCT=r4, @ANYBLOB="16de71cf0766d82ab6b67f0cd79e8e3ee2643e2e5026c3ea1ccfde1fe0912c50f4450c9c7749b181ae244aa09bb447092b0b62871d5ab9b62bc1121905ff995d268176192bba6bbfe4ff322f3370ce1ac7b5dd004238de507070dc0002cfe8ca03a81158f62018fe98245631fc021061fec067e33a1c01f786dafad477a72fcf767c43d28917995da3bd4df41908d180cd9517f24d97f14674a9a15bb602dca6587204d6571e02a456eb415ea3208e6afe4ed4f3533d7cf074ed4bd702d74e242405fadcd0c73dbb590bb430b54691990800f66109473f3531c01f00"/234], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x40025) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r10, r9, 0x0, 0x100005000) 10:18:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce0012000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f110000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:51 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {}, {r5}, {}, {r5}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5}, {}, {}, {r5, r6}, {0x0, r6}, {r4}, {}, {0x0, r6}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {0x0, r6}, {}, {r2, r6}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {}, {r5}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {}, {}, {r4}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {}, {r1}, {0x0, r6}, {r4}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {r5}, {}, {}, {r5}, {r5}, {}, {}, {}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {}, {r5, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5, r6}, {r5}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4, r6}], 0x1, "2156816c73038c"}) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) 10:18:51 executing program 3: sendmsg$AUDIT_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x10, 0x3e8, 0x705, 0x70bd2a, 0x25dfdbff, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x41}, 0x4044800) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {}, {r5}, {r5}, {r5}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {r4}, {}, {0x0, r6}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {0x0, r6}, {}, {r2, r6}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {}, {r5}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {}, {}, {r4}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {}, {r1}, {0x0, r6}, {r4}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {r5}, {}, {}, {r5}, {r5}, {}, {}, {}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {}, {r5, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5, r6}, {r5}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4, r6}], 0x1, "2156816c73038c"}) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) 10:18:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000feffffff2000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1089.066311][T31942] loop5: detected capacity change from 0 to 512 [ 1089.074415][T31946] loop4: detected capacity change from 0 to 512 [ 1089.095002][T31946] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1089.123853][T31942] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1089.134005][T31942] EXT4-fs (loop5): group descriptors corrupted! [ 1089.150067][ C0] sd 0:0:1:0: tag#4959 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1089.159946][ C0] sd 0:0:1:0: tag#4959 CDB: opcode=0xe5 (vendor) 10:18:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce0014000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000000a00000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000000b00000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1089.166288][ C0] sd 0:0:1:0: tag#4959 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1089.175342][ C0] sd 0:0:1:0: tag#4959 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1089.185079][ C0] sd 0:0:1:0: tag#4959 CDB[20]: ba 10:18:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000000c00000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1089.237883][T31942] loop5: detected capacity change from 0 to 512 [ 1089.238572][T31972] loop2: detected capacity change from 0 to 264192 [ 1089.251240][T31942] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1089.257559][T31974] loop4: detected capacity change from 0 to 512 [ 1089.261344][T31942] EXT4-fs (loop5): group descriptors corrupted! [ 1089.303171][T31974] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1089.328417][T31972] msdos filesystem being mounted at /root/syzkaller-testdir156917949/syzkaller.TDnRSM/2047/file1 supports timestamps until 2107 (0x10391447e) 10:18:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000200002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f120000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) [ 1089.368568][T31974] loop4: detected capacity change from 0 to 512 [ 1089.402725][T31974] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:18:51 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x401, 0x8, &(0x7f00000008c0)=[{0x0}, {0x0, 0x0, 0x9}, {&(0x7f0000000180)="5030a6b9906c95e36ee1b07f9e5698893307dd91cd0319578b614ed5f1873eb0", 0x20, 0xfffffffffffffffd}, {&(0x7f0000000340)="2df6157d4494279dde2031db3b2744b435271e65a343796db3da0bb347a3215e9b71", 0x22, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f5bf3f90b3d3e7d7132c3012ab7043e22a6f8edc5e516ee833a4fdcf825d9da3fed17cac003d9dd022d", 0xa4, 0x7fffffff}, {&(0x7f0000000500)="822171b91eb1498a4740794c5db7bc7a965f6bf8c7cf5baee0946ad2aa4b016a8a03bb30b092e47cd74a4fab60e1d1443c33c80fa2ef7af6514920209443a39077bb6a856f3c3e40bb7182a08692593ab13f04b516500ed3b3256325f48aafef3d8ca84cdce2b0609ed9c6346c356964614f21f9699436b6ca419197a0729a46ae7ae36fd203e577f2b03891ce7ba975aa5d47214e98c73647d20e757d1ce2d1990688090eee936562a1b4968deb59f6a2980feca28742afcaf376ab51294f57d6334c86538795c11e018be19db248ea75e1", 0xd2, 0x10000}, {&(0x7f0000000600)="4a6006458a4a1e3060e4cca0086f3b44f908e6941741cf7422f159df72a1cdb68c01ef3f102d2afb1e3e446c41bef79e359d62ed3155330d3b2f5207705e6dfa86f4f655d80ee44134bb9211fed0be8f7f86ff1f4b5abab22df6a1bfed2d66e51791fcbbf6f6926ce384fda7a7e86c17dcc2b2473f22c6d095ade56596ee656b3c596a038658b30895170a9ab2d4379f4f58cc6e", 0x94, 0x9}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f0000000ac0)={[{@dots}, {@fat=@sys_immutable}, {@nodots}, {@fat=@umask}], [{@measure}, {@appraise}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@seclabel}]}) openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f80)={0x1, &(0x7f0000000f40)=[{0x7f}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000fc0), 0xc, &(0x7f0000000200)={&(0x7f0000003940)=ANY=[@ANYRES64=r7, @ANYRESHEX, @ANYRES32=r6, @ANYRESOCT=r3, @ANYRESOCT=r4, @ANYBLOB="16de71cf0766d82ab6b67f0cd79e8e3ee2643e2e5026c3ea1ccfde1fe0912c50f4450c9c7749b181ae244aa09bb447092b0b62871d5ab9b62bc1121905ff995d268176192bba6bbfe4ff322f3370ce1ac7b5dd004238de507070dc0002cfe8ca03a81158f62018fe98245631fc021061fec067e33a1c01f786dafad477a72fcf767c43d28917995da3bd4df41908d180cd9517f24d97f14674a9a15bb602dca6587204d6571e02a456eb415ea3208e6afe4ed4f3533d7cf074ed4bd702d74e242405fadcd0c73dbb590bb430b54691990800f66109473f3531c01f00"/234], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x40025) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r10, r9, 0x0, 0x100005800) 10:18:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000300002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce0022000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) [ 1089.436072][T32001] loop5: detected capacity change from 0 to 512 [ 1089.467493][T32001] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1089.477620][T32001] EXT4-fs (loop5): group descriptors corrupted! [ 1089.515916][T32013] loop4: detected capacity change from 0 to 512 [ 1089.532257][ C1] sd 0:0:1:0: tag#4978 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1089.542294][ C1] sd 0:0:1:0: tag#4978 CDB: opcode=0xe5 (vendor) [ 1089.548614][ C1] sd 0:0:1:0: tag#4978 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1089.557666][ C1] sd 0:0:1:0: tag#4978 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1089.566749][ C1] sd 0:0:1:0: tag#4978 CDB[20]: ba [ 1089.616245][T32013] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1089.652796][T32001] loop5: detected capacity change from 0 to 512 [ 1089.662095][T32001] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1089.672655][T32001] EXT4-fs (loop5): group descriptors corrupted! [ 1089.691069][T32013] loop4: detected capacity change from 0 to 512 [ 1089.707500][T32013] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:18:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f140000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000400002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce0025000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:52 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x401, 0x8, &(0x7f00000008c0)=[{0x0}, {0x0, 0x0, 0x9}, {&(0x7f0000000180)="5030a6b9906c95e36ee1b07f9e5698893307dd91cd0319578b614ed5f1873eb0", 0x20, 0xfffffffffffffffd}, {&(0x7f0000000340)="2df6157d4494279dde2031db3b2744b435271e65a343796db3da0bb347a3215e9b71", 0x22, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f5bf3f90b3d3e7d7132c3012ab7043e22a6f8edc5e516ee833a4fdcf825d9da3fed17cac003d9dd022d", 0xa4, 0x7fffffff}, {&(0x7f0000000500)="822171b91eb1498a4740794c5db7bc7a965f6bf8c7cf5baee0946ad2aa4b016a8a03bb30b092e47cd74a4fab60e1d1443c33c80fa2ef7af6514920209443a39077bb6a856f3c3e40bb7182a08692593ab13f04b516500ed3b3256325f48aafef3d8ca84cdce2b0609ed9c6346c356964614f21f9699436b6ca419197a0729a46ae7ae36fd203e577f2b03891ce7ba975aa5d47214e98c73647d20e757d1ce2d1990688090eee936562a1b4968deb59f6a2980feca28742afcaf376ab51294f57d6334c86538795c11e018be19db248ea75e1", 0xd2, 0x10000}, {&(0x7f0000000600)="4a6006458a4a1e3060e4cca0086f3b44f908e6941741cf7422f159df72a1cdb68c01ef3f102d2afb1e3e446c41bef79e359d62ed3155330d3b2f5207705e6dfa86f4f655d80ee44134bb9211fed0be8f7f86ff1f4b5abab22df6a1bfed2d66e51791fcbbf6f6926ce384fda7a7e86c17dcc2b2473f22c6d095ade56596ee656b3c596a038658b30895170a9ab2d4379f4f58cc6e", 0x94, 0x9}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f0000000ac0)={[{@dots}, {@fat=@sys_immutable}, {@nodots}, {@fat=@umask}], [{@measure}, {@appraise}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@seclabel}]}) openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f80)={0x1, &(0x7f0000000f40)=[{0x7f}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000fc0), 0xc, &(0x7f0000000200)={&(0x7f0000003940)=ANY=[@ANYRES64=r7, @ANYRESHEX, @ANYRES32=r6, @ANYRESOCT=r3, @ANYRESOCT=r4, @ANYBLOB="16de71cf0766d82ab6b67f0cd79e8e3ee2643e2e5026c3ea1ccfde1fe0912c50f4450c9c7749b181ae244aa09bb447092b0b62871d5ab9b62bc1121905ff995d268176192bba6bbfe4ff322f3370ce1ac7b5dd004238de507070dc0002cfe8ca03a81158f62018fe98245631fc021061fec067e33a1c01f786dafad477a72fcf767c43d28917995da3bd4df41908d180cd9517f24d97f14674a9a15bb602dca6587204d6571e02a456eb415ea3208e6afe4ed4f3533d7cf074ed4bd702d74e242405fadcd0c73dbb590bb430b54691990800f66109473f3531c01f00"/234], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x40025) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r10, r9, 0x0, 0x100006000) 10:18:52 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {}, {r5}, {}, {r5}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5}, {}, {}, {r5, r6}, {0x0, r6}, {r4}, {}, {0x0, r6}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {0x0, r6}, {}, {r2, r6}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {}, {r5}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {}, {}, {r4}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {}, {r1}, {0x0, r6}, {r4}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {r5}, {}, {}, {r5}, {r5}, {}, {}, {}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {}, {r5, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5, r6}, {r5}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4, r6}], 0x1, "2156816c73038c"}) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) 10:18:52 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000240), 0x2}, 0x102, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {}, {r5}, {r5}, {r5}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {r4}, {}, {0x0, r6}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {0x0, r6}, {}, {r2, r6}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {}, {r5}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {}, {}, {r4}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {}, {r1}, {0x0, r6}, {r4}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {r5}, {}, {}, {r5}, {r5}, {}, {}, {}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {}, {r5, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5, r6}, {r5}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4, r6}], 0x1, "2156816c73038c"}) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) epoll_wait(r0, &(0x7f0000000100)=[{}, {}], 0x2, 0x0) sendfile(r0, r7, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) [ 1090.097444][T32047] loop4: detected capacity change from 0 to 512 [ 1090.106664][T32052] loop5: detected capacity change from 0 to 512 [ 1090.135660][T32052] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1090.145878][T32052] EXT4-fs (loop5): group descriptors corrupted! [ 1090.156198][T32047] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1090.166857][ C0] sd 0:0:1:0: tag#4965 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1090.176714][ C0] sd 0:0:1:0: tag#4965 CDB: opcode=0xe5 (vendor) [ 1090.183070][ C0] sd 0:0:1:0: tag#4965 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c 10:18:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f220000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000500002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1090.192295][ C0] sd 0:0:1:0: tag#4965 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1090.201330][ C0] sd 0:0:1:0: tag#4965 CDB[20]: ba 10:18:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000600002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1090.251680][T32047] loop4: detected capacity change from 0 to 512 [ 1090.265111][T32067] loop5: detected capacity change from 0 to 512 [ 1090.281481][T32047] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:18:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000700002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1090.300191][T32067] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1090.301961][T32070] loop2: detected capacity change from 0 to 264192 [ 1090.310389][T32067] EXT4-fs (loop5): group descriptors corrupted! 10:18:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000800002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f250000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce002e000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000001800002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1090.434344][T32099] loop5: detected capacity change from 0 to 512 [ 1090.452419][T32099] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1090.453135][T32102] loop4: detected capacity change from 0 to 512 [ 1090.462539][T32099] EXT4-fs (loop5): group descriptors corrupted! 10:18:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000001c00002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1090.522183][T32099] loop5: detected capacity change from 0 to 512 [ 1090.535881][T32099] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1090.546026][T32099] EXT4-fs (loop5): group descriptors corrupted! [ 1090.553876][T32102] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1090.635952][T32102] loop4: detected capacity change from 0 to 512 [ 1090.648335][T32102] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:18:53 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x401, 0x8, &(0x7f00000008c0)=[{0x0}, {0x0, 0x0, 0x9}, {&(0x7f0000000180)="5030a6b9906c95e36ee1b07f9e5698893307dd91cd0319578b614ed5f1873eb0", 0x20, 0xfffffffffffffffd}, {&(0x7f0000000340)="2df6157d4494279dde2031db3b2744b435271e65a343796db3da0bb347a3215e9b71", 0x22, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f5bf3f90b3d3e7d7132c3012ab7043e22a6f8edc5e516ee833a4fdcf825d9da3fed17cac003d9dd022d", 0xa4, 0x7fffffff}, {&(0x7f0000000500)="822171b91eb1498a4740794c5db7bc7a965f6bf8c7cf5baee0946ad2aa4b016a8a03bb30b092e47cd74a4fab60e1d1443c33c80fa2ef7af6514920209443a39077bb6a856f3c3e40bb7182a08692593ab13f04b516500ed3b3256325f48aafef3d8ca84cdce2b0609ed9c6346c356964614f21f9699436b6ca419197a0729a46ae7ae36fd203e577f2b03891ce7ba975aa5d47214e98c73647d20e757d1ce2d1990688090eee936562a1b4968deb59f6a2980feca28742afcaf376ab51294f57d6334c86538795c11e018be19db248ea75e1", 0xd2, 0x10000}, {&(0x7f0000000600)="4a6006458a4a1e3060e4cca0086f3b44f908e6941741cf7422f159df72a1cdb68c01ef3f102d2afb1e3e446c41bef79e359d62ed3155330d3b2f5207705e6dfa86f4f655d80ee44134bb9211fed0be8f7f86ff1f4b5abab22df6a1bfed2d66e51791fcbbf6f6926ce384fda7a7e86c17dcc2b2473f22c6d095ade56596ee656b3c596a038658b30895170a9ab2d4379f4f58cc6e", 0x94, 0x9}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f0000000ac0)={[{@dots}, {@fat=@sys_immutable}, {@nodots}, {@fat=@umask}], [{@measure}, {@appraise}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@seclabel}]}) openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f80)={0x1, &(0x7f0000000f40)=[{0x7f}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000fc0), 0xc, &(0x7f0000000200)={&(0x7f0000003940)=ANY=[@ANYRES64=r7, @ANYRESHEX, @ANYRES32=r6, @ANYRESOCT=r3, @ANYRESOCT=r4, @ANYBLOB="16de71cf0766d82ab6b67f0cd79e8e3ee2643e2e5026c3ea1ccfde1fe0912c50f4450c9c7749b181ae244aa09bb447092b0b62871d5ab9b62bc1121905ff995d268176192bba6bbfe4ff322f3370ce1ac7b5dd004238de507070dc0002cfe8ca03a81158f62018fe98245631fc021061fec067e33a1c01f786dafad477a72fcf767c43d28917995da3bd4df41908d180cd9517f24d97f14674a9a15bb602dca6587204d6571e02a456eb415ea3208e6afe4ed4f3533d7cf074ed4bd702d74e242405fadcd0c73dbb590bb430b54691990800f66109473f3531c01f00"/234], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x40025) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r10, r9, 0x0, 0x100006800) [ 1090.778571][ C1] sd 0:0:1:0: tag#4968 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1090.788425][ C1] sd 0:0:1:0: tag#4968 CDB: opcode=0xe5 (vendor) [ 1090.794753][ C1] sd 0:0:1:0: tag#4968 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1090.804140][ C1] sd 0:0:1:0: tag#4968 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1090.813177][ C1] sd 0:0:1:0: tag#4968 CDB[20]: ba 10:18:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f2e0000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:53 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {}, {r5}, {}, {r5}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5}, {}, {}, {r5, r6}, {0x0, r6}, {r4}, {}, {0x0, r6}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {0x0, r6}, {}, {r2, r6}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {}, {r5}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {}, {}, {r4}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {}, {r1}, {0x0, r6}, {r4}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {r5}, {}, {}, {r5}, {r5}, {}, {}, {}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {}, {r5, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5, r6}, {r5}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4, r6}], 0x1, "2156816c73038c"}) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) 10:18:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000002600002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce0048000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:53 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r5 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r5, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r9, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {}, {r7}, {r7}, {r7}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {r6, r8}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {0x0, r8}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {0x0, r8}, {}, {r3, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6, r2}, {}, {r7}, {}, {0x0, r8}, {0x0, r8}, {}, {r4}, {r7}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {}, {}, {}, {}, {}, {}, {}, {r7}, {0x0, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {r6}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {}, {}, {r6}, {}, {}, {}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {r6, r8}, {0x0, r8}, {0x0, r8}, {r6, r8}, {0x0, r8}, {}, {}, {r7}, {}, {r1}, {0x0, r8}, {r6}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {}, {0x0, r8}, {}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7}, {}, {}, {}, {r7}, {}, {}, {}, {r6}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {}, {}, {r6}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r6}, {r7}, {r7, r8}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {r7}, {}, {}, {r7}, {r7}, {}, {}, {}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7, r8}, {r7}, {r6, r8}, {}, {}, {r7}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {r7}, {r6}, {}, {0x0, r8}, {r7}, {0x0, r8}, {}, {}, {}, {r6, r8}], 0x1, "2156816c73038c"}) r10 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r10, 0x0, 0x8400fffffffa) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x81, 0x3, 0x9d, 0x2, 0x0, 0x6, 0x44000, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x80, 0x1, @perf_config_ext={0xc85, 0x7}, 0x100, 0x384, 0x1, 0x2, 0x400, 0x8, 0x4, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xf, 0xffffffffffffffff, 0x9) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) [ 1091.085698][T32137] loop5: detected capacity change from 0 to 512 10:18:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000000000000fe00002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1091.128982][T32137] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1091.136483][T32148] loop4: detected capacity change from 0 to 512 [ 1091.139088][T32137] EXT4-fs (loop5): group descriptors corrupted! [ 1091.147905][T32148] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1091.162309][T32150] loop2: detected capacity change from 0 to 264192 10:18:53 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x401, 0x8, &(0x7f00000008c0)=[{0x0}, {0x0, 0x0, 0x9}, {&(0x7f0000000180)="5030a6b9906c95e36ee1b07f9e5698893307dd91cd0319578b614ed5f1873eb0", 0x20, 0xfffffffffffffffd}, {&(0x7f0000000340)="2df6157d4494279dde2031db3b2744b435271e65a343796db3da0bb347a3215e9b71", 0x22, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f5bf3f90b3d3e7d7132c3012ab7043e22a6f8edc5e516ee833a4fdcf825d9da3fed17cac003d9dd022d", 0xa4, 0x7fffffff}, {&(0x7f0000000500)="822171b91eb1498a4740794c5db7bc7a965f6bf8c7cf5baee0946ad2aa4b016a8a03bb30b092e47cd74a4fab60e1d1443c33c80fa2ef7af6514920209443a39077bb6a856f3c3e40bb7182a08692593ab13f04b516500ed3b3256325f48aafef3d8ca84cdce2b0609ed9c6346c356964614f21f9699436b6ca419197a0729a46ae7ae36fd203e577f2b03891ce7ba975aa5d47214e98c73647d20e757d1ce2d1990688090eee936562a1b4968deb59f6a2980feca28742afcaf376ab51294f57d6334c86538795c11e018be19db248ea75e1", 0xd2, 0x10000}, {&(0x7f0000000600)="4a6006458a4a1e3060e4cca0086f3b44f908e6941741cf7422f159df72a1cdb68c01ef3f102d2afb1e3e446c41bef79e359d62ed3155330d3b2f5207705e6dfa86f4f655d80ee44134bb9211fed0be8f7f86ff1f4b5abab22df6a1bfed2d66e51791fcbbf6f6926ce384fda7a7e86c17dcc2b2473f22c6d095ade56596ee656b3c596a038658b30895170a9ab2d4379f4f58cc6e", 0x94, 0x9}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f0000000ac0)={[{@dots}, {@fat=@sys_immutable}, {@nodots}, {@fat=@umask}], [{@measure}, {@appraise}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@seclabel}]}) openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f80)={0x1, &(0x7f0000000f40)=[{0x7f}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000fc0), 0xc, &(0x7f0000000200)={&(0x7f0000003940)=ANY=[@ANYRES64=r7, @ANYRESHEX, @ANYRES32=r6, @ANYRESOCT=r3, @ANYRESOCT=r4, @ANYBLOB="16de71cf0766d82ab6b67f0cd79e8e3ee2643e2e5026c3ea1ccfde1fe0912c50f4450c9c7749b181ae244aa09bb447092b0b62871d5ab9b62bc1121905ff995d268176192bba6bbfe4ff322f3370ce1ac7b5dd004238de507070dc0002cfe8ca03a81158f62018fe98245631fc021061fec067e33a1c01f786dafad477a72fcf767c43d28917995da3bd4df41908d180cd9517f24d97f14674a9a15bb602dca6587204d6571e02a456eb415ea3208e6afe4ed4f3533d7cf074ed4bd702d74e242405fadcd0c73dbb590bb430b54691990800f66109473f3531c01f00"/234], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x40025) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r10, r9, 0x0, 0x100007000) 10:18:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000402002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1091.190192][ C1] sd 0:0:1:0: tag#4991 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1091.200062][ C1] sd 0:0:1:0: tag#4991 CDB: opcode=0xe5 (vendor) [ 1091.206480][ C1] sd 0:0:1:0: tag#4991 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1091.215530][ C1] sd 0:0:1:0: tag#4991 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1091.224565][ C1] sd 0:0:1:0: tag#4991 CDB[20]: ba [ 1091.234602][T32150] msdos filesystem being mounted at /root/syzkaller-testdir156917949/syzkaller.TDnRSM/2049/file1 supports timestamps until 2107 (0x10391447e) 10:18:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000003002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1091.285968][ C0] sd 0:0:1:0: tag#4928 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1091.295937][ C0] sd 0:0:1:0: tag#4928 CDB: opcode=0xe5 (vendor) [ 1091.302310][ C0] sd 0:0:1:0: tag#4928 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1091.311451][ C0] sd 0:0:1:0: tag#4928 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1091.320522][ C0] sd 0:0:1:0: tag#4928 CDB[20]: ba 10:18:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000204002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1091.353991][T32137] loop5: detected capacity change from 0 to 512 [ 1091.360574][T32148] loop4: detected capacity change from 0 to 512 [ 1091.379663][T32137] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1091.389774][T32137] EXT4-fs (loop5): group descriptors corrupted! [ 1091.421059][T32148] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:18:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f480000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce004c000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000604002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1091.511349][T32190] loop5: detected capacity change from 0 to 512 [ 1091.540094][T32190] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1091.550205][T32190] EXT4-fs (loop5): group descriptors corrupted! [ 1091.564993][T32200] loop4: detected capacity change from 0 to 512 [ 1091.581564][T32200] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1091.618734][T32190] loop5: detected capacity change from 0 to 512 [ 1091.631567][T32190] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1091.641697][T32190] EXT4-fs (loop5): group descriptors corrupted! 10:18:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce0060000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000008004002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:54 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {}, {r5}, {}, {r5}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {r4}, {}, {0x0, r6}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {0x0, r6}, {}, {r2, r6}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {}, {r5}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {}, {}, {r4}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {}, {r1}, {0x0, r6}, {r4}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {r5}, {}, {}, {r5}, {r5}, {}, {}, {}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {}, {r5, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5, r6}, {r5}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4, r6}], 0x1, "2156816c73038c"}) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) 10:18:54 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x800) ioctl$SG_IO(r4, 0x2285, &(0x7f00000005c0)={0x0, 0xffffffffffffffff, 0xce, 0x1, @scatter={0x2, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/178, 0xb2}, {&(0x7f0000000180)=""/111, 0x6f}]}, &(0x7f0000000440)="ee73827ab6ef9f7a7c4cf5abc64ed2abbbfb453af3741b6d4eb7648ec3625fb1504b6be600bf4deaeb1f80e934bafa84f1ff395d55904a3d07c34f1c77bb0ac60f5b5d0d2f8b3fe846a211c66dba9d30e80bc38ee1e497ce0bf89ed24c116e2f4ec5ebe90ca3bdb35ea5a2a6a99b4af044d83f9c70443a8f7f41f9f4569ef1155b49c5dd3248389387b2e55bdfbe3c5f6ee6e83a24eda6ff2edc0b666de408f647fd6df24f8d83c0f2175c4d781e524ab745e4daaaf633505ce12a06e5421ad50eaa1aefe47f609f598de1019cc9", &(0x7f0000000540)=""/127, 0xf8000000, 0x11, 0x3, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r7}, {}, {r6}, {r6}, {r6}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {r5, r7}, {0x0, r7}, {}, {r6, r7}, {0x0, r7}, {}, {}, {}, {0x0, r7}, {}, {0x0, r7}, {0x0, r7}, {}, {}, {}, {}, {r5}, {0x0, r7}, {}, {}, {r5, r7}, {r6}, {}, {0x0, r7}, {r6, r7}, {0x0, r7}, {r5}, {}, {0x0, r7}, {r6}, {}, {}, {r6}, {0x0, r7}, {}, {0x0, r7}, {}, {r2, r7}, {0x0, r7}, {r5}, {}, {r6}, {r5}, {}, {r6}, {}, {0x0, r7}, {0x0, r7}, {}, {}, {r6}, {0x0, r7}, {0x0, r7}, {0x0, r7}, {r6}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {0x0, r7}, {r5}, {0x0, r7}, {}, {}, {r5, r7}, {}, {}, {}, {}, {}, {}, {}, {r6}, {0x0, r7}, {0x0, r7}, {r5}, {r6, r7}, {0x0, r7}, {0x0, r7}, {}, {}, {}, {r5}, {0x0, r7}, {}, {0x0, r7}, {0x0, r7}, {0x0, r7}, {r6, r7}, {r5, r7}, {r6}, {}, {r5, r7}, {r5}, {}, {}, {r5}, {}, {}, {}, {0x0, r7}, {0x0, r7}, {0x0, r7}, {0x0, r7}, {}, {}, {r5, r7}, {0x0, r7}, {0x0, r7}, {r5, r7}, {0x0, r7}, {}, {}, {r6}, {}, {r1}, {0x0, r7}, {r5}, {}, {r6}, {}, {}, {r6}, {0x0, r7}, {0x0, r7}, {}, {0x0, r7}, {}, {0x0, r7}, {}, {r5}, {}, {}, {}, {0x0, r7}, {r5, r7}, {r6}, {}, {}, {}, {r6}, {}, {}, {}, {r5}, {r5}, {}, {r5}, {r6}, {0x0, r7}, {r5}, {}, {r5}, {0x0, r7}, {r6}, {r5, r7}, {0x0, r7}, {}, {0x0, r7}, {}, {}, {0x0, r7}, {r6}, {}, {}, {r5}, {}, {0x0, r7}, {r6, r7}, {0x0, r7}, {0x0, r7}, {}, {}, {0x0, r7}, {r5}, {r6}, {r6, r7}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {r6}, {}, {}, {r6}, {r6}, {}, {}, {}, {0x0, r7}, {}, {r5, r7}, {r5}, {}, {}, {0x0, r7}, {}, {r6, r7}, {r5}, {0x0, r7}, {}, {}, {r5, r7}, {r6, r7}, {r6}, {r5, r7}, {}, {}, {r6}, {r5, r7}, {0x0, r7}, {}, {0x0, r7}, {r6}, {r6}, {r5}, {}, {0x0, r7}, {r6}, {0x0, r7}, {}, {}, {}, {r5, r7}], 0x1, "2156816c73038c"}) r8 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r8, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) [ 1092.007543][T32217] loop4: detected capacity change from 0 to 512 [ 1092.021649][T32217] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1092.040568][ C0] sd 0:0:1:0: tag#4977 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1092.050521][ C0] sd 0:0:1:0: tag#4977 CDB: opcode=0xe5 (vendor) 10:18:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f4c0000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:54 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x401, 0x8, &(0x7f00000008c0)=[{0x0}, {0x0, 0x0, 0x9}, {&(0x7f0000000180)="5030a6b9906c95e36ee1b07f9e5698893307dd91cd0319578b614ed5f1873eb0", 0x20, 0xfffffffffffffffd}, {&(0x7f0000000340)="2df6157d4494279dde2031db3b2744b435271e65a343796db3da0bb347a3215e9b71", 0x22, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f5bf3f90b3d3e7d7132c3012ab7043e22a6f8edc5e516ee833a4fdcf825d9da3fed17cac003d9dd022d", 0xa4, 0x7fffffff}, {&(0x7f0000000500)="822171b91eb1498a4740794c5db7bc7a965f6bf8c7cf5baee0946ad2aa4b016a8a03bb30b092e47cd74a4fab60e1d1443c33c80fa2ef7af6514920209443a39077bb6a856f3c3e40bb7182a08692593ab13f04b516500ed3b3256325f48aafef3d8ca84cdce2b0609ed9c6346c356964614f21f9699436b6ca419197a0729a46ae7ae36fd203e577f2b03891ce7ba975aa5d47214e98c73647d20e757d1ce2d1990688090eee936562a1b4968deb59f6a2980feca28742afcaf376ab51294f57d6334c86538795c11e018be19db248ea75e1", 0xd2, 0x10000}, {&(0x7f0000000600)="4a6006458a4a1e3060e4cca0086f3b44f908e6941741cf7422f159df72a1cdb68c01ef3f102d2afb1e3e446c41bef79e359d62ed3155330d3b2f5207705e6dfa86f4f655d80ee44134bb9211fed0be8f7f86ff1f4b5abab22df6a1bfed2d66e51791fcbbf6f6926ce384fda7a7e86c17dcc2b2473f22c6d095ade56596ee656b3c596a038658b30895170a9ab2d4379f4f58cc6e", 0x94, 0x9}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f0000000ac0)={[{@dots}, {@fat=@sys_immutable}, {@nodots}, {@fat=@umask}], [{@measure}, {@appraise}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@seclabel}]}) openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f80)={0x1, &(0x7f0000000f40)=[{0x7f}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000fc0), 0xc, &(0x7f0000000200)={&(0x7f0000003940)=ANY=[@ANYRES64=r7, @ANYRESHEX, @ANYRES32=r6, @ANYRESOCT=r3, @ANYRESOCT=r4, @ANYBLOB="16de71cf0766d82ab6b67f0cd79e8e3ee2643e2e5026c3ea1ccfde1fe0912c50f4450c9c7749b181ae244aa09bb447092b0b62871d5ab9b62bc1121905ff995d268176192bba6bbfe4ff322f3370ce1ac7b5dd004238de507070dc0002cfe8ca03a81158f62018fe98245631fc021061fec067e33a1c01f786dafad477a72fcf767c43d28917995da3bd4df41908d180cd9517f24d97f14674a9a15bb602dca6587204d6571e02a456eb415ea3208e6afe4ed4f3533d7cf074ed4bd702d74e242405fadcd0c73dbb590bb430b54691990800f66109473f3531c01f00"/234], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x40025) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r10, r9, 0x0, 0x100007800) 10:18:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000005002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000002b05002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1092.056859][ C0] sd 0:0:1:0: tag#4977 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1092.066016][ C0] sd 0:0:1:0: tag#4977 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1092.069037][T32226] loop5: detected capacity change from 0 to 512 [ 1092.075050][ C0] sd 0:0:1:0: tag#4977 CDB[20]: ba [ 1092.137525][T32226] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1092.147704][T32226] EXT4-fs (loop5): group descriptors corrupted! [ 1092.162541][ C1] sd 0:0:1:0: tag#4979 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1092.172392][ C1] sd 0:0:1:0: tag#4979 CDB: opcode=0xe5 (vendor) [ 1092.178747][ C1] sd 0:0:1:0: tag#4979 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c 10:18:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000006002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1092.187863][ C1] sd 0:0:1:0: tag#4979 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1092.196973][ C1] sd 0:0:1:0: tag#4979 CDB[20]: ba [ 1092.212960][T32217] loop4: detected capacity change from 0 to 512 [ 1092.231791][T32226] loop5: detected capacity change from 0 to 512 [ 1092.235214][T32217] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1092.241634][T32226] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1092.255644][T32226] EXT4-fs (loop5): group descriptors corrupted! [ 1092.263511][T32251] loop2: detected capacity change from 0 to 264192 10:18:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000406002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce0068000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) [ 1092.294959][T32251] msdos filesystem being mounted at /root/syzkaller-testdir156917949/syzkaller.TDnRSM/2050/file1 supports timestamps until 2107 (0x10391447e) 10:18:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000007002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1092.357058][T32268] loop4: detected capacity change from 0 to 512 [ 1092.391707][T32268] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1092.448857][T32268] loop4: detected capacity change from 0 to 512 [ 1092.458910][T32268] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:18:55 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {}, {r5}, {}, {r5}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {r4}, {}, {0x0, r6}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {0x0, r6}, {}, {r2, r6}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {}, {r5}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {}, {}, {r4}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {}, {r1}, {0x0, r6}, {r4}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {r5}, {}, {}, {r5}, {r5}, {}, {}, {}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {}, {r5, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5, r6}, {r5}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4, r6}], 0x1, "2156816c73038c"}) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) 10:18:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f600000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000018002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce006c000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:55 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x401, 0x8, &(0x7f00000008c0)=[{0x0}, {0x0, 0x0, 0x9}, {&(0x7f0000000180)="5030a6b9906c95e36ee1b07f9e5698893307dd91cd0319578b614ed5f1873eb0", 0x20, 0xfffffffffffffffd}, {&(0x7f0000000340)="2df6157d4494279dde2031db3b2744b435271e65a343796db3da0bb347a3215e9b71", 0x22, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f5bf3f90b3d3e7d7132c3012ab7043e22a6f8edc5e516ee833a4fdcf825d9da3fed17cac003d9dd022d", 0xa4, 0x7fffffff}, {&(0x7f0000000500)="822171b91eb1498a4740794c5db7bc7a965f6bf8c7cf5baee0946ad2aa4b016a8a03bb30b092e47cd74a4fab60e1d1443c33c80fa2ef7af6514920209443a39077bb6a856f3c3e40bb7182a08692593ab13f04b516500ed3b3256325f48aafef3d8ca84cdce2b0609ed9c6346c356964614f21f9699436b6ca419197a0729a46ae7ae36fd203e577f2b03891ce7ba975aa5d47214e98c73647d20e757d1ce2d1990688090eee936562a1b4968deb59f6a2980feca28742afcaf376ab51294f57d6334c86538795c11e018be19db248ea75e1", 0xd2, 0x10000}, {&(0x7f0000000600)="4a6006458a4a1e3060e4cca0086f3b44f908e6941741cf7422f159df72a1cdb68c01ef3f102d2afb1e3e446c41bef79e359d62ed3155330d3b2f5207705e6dfa86f4f655d80ee44134bb9211fed0be8f7f86ff1f4b5abab22df6a1bfed2d66e51791fcbbf6f6926ce384fda7a7e86c17dcc2b2473f22c6d095ade56596ee656b3c596a038658b30895170a9ab2d4379f4f58cc6e", 0x94, 0x9}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f0000000ac0)={[{@dots}, {@fat=@sys_immutable}, {@nodots}, {@fat=@umask}], [{@measure}, {@appraise}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@seclabel}]}) openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f80)={0x1, &(0x7f0000000f40)=[{0x7f}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000fc0), 0xc, &(0x7f0000000200)={&(0x7f0000003940)=ANY=[@ANYRES64=r7, @ANYRESHEX, @ANYRES32=r6, @ANYRESOCT=r3, @ANYRESOCT=r4, @ANYBLOB="16de71cf0766d82ab6b67f0cd79e8e3ee2643e2e5026c3ea1ccfde1fe0912c50f4450c9c7749b181ae244aa09bb447092b0b62871d5ab9b62bc1121905ff995d268176192bba6bbfe4ff322f3370ce1ac7b5dd004238de507070dc0002cfe8ca03a81158f62018fe98245631fc021061fec067e33a1c01f786dafad477a72fcf767c43d28917995da3bd4df41908d180cd9517f24d97f14674a9a15bb602dca6587204d6571e02a456eb415ea3208e6afe4ed4f3533d7cf074ed4bd702d74e242405fadcd0c73dbb590bb430b54691990800f66109473f3531c01f00"/234], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x40025) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r10, r9, 0x0, 0xffffffffffffffff) 10:18:55 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0xff, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc7e, 0x1, @perf_config_ext, 0x0, 0x20, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="6d0000000100007fff0fffedd6dcc97171cbd2e47acf54f70ec0273a76415e3c98a42a012bc78e310e9677b833f91f493d5351a144998cd0a5d01566fae73c735d9cc10f9c900d8b78b9413f11e32000f8a19d303693c12a726151e19da37debe7bc17c38b6c444d4fb64b565504d7"]) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x0) connect$netlink(r5, 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000100)=0x7fc) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x3, 0x4, 0x8, 0x1e, 0x0, 0xa3d, 0x4, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x275, 0x40}, 0x4000a, 0x80000001, 0x10001, 0x3, 0x0, 0x80000001, 0x9, 0x0, 0x8, 0x0, 0xfff}, 0x0, 0xb, r5, 0x8) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r8}, {}, {r7}, {r7}, {r7}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {r6, r8}, {0x0, r8}, {}, {r7, r8}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {r6}, {}, {0x0, r8}, {r7}, {}, {}, {r7}, {0x0, r8}, {}, {0x0, r8}, {}, {r3, r8}, {0x0, r8}, {r6}, {}, {r7}, {r6}, {}, {r7}, {}, {0x0, r8}, {0x0, r8}, {}, {}, {r7}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r8}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {}, {}, {}, {}, {}, {}, {}, {r7}, {0x0, r8}, {0x0, r8}, {r6}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {}, {r6}, {0x0, r8}, {}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {r7, r8}, {r6, r8}, {r7}, {}, {r6, r8}, {r6}, {}, {}, {r6}, {}, {}, {}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {r6, r8}, {0x0, r8}, {0x0, r8}, {r6, r8}, {0x0, r8}, {}, {}, {r7}, {}, {r2}, {0x0, r8}, {r6}, {}, {r7}, {}, {}, {r7}, {0x0, r8}, {0x0, r8}, {}, {0x0, r8}, {}, {0x0, r8}, {}, {r6}, {}, {}, {}, {0x0, r8}, {r6, r8}, {r7}, {}, {}, {}, {r7}, {}, {}, {}, {r6}, {r6}, {}, {r6}, {r7}, {0x0, r8}, {r6}, {}, {r6}, {0x0, r8}, {r7}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {}, {}, {0x0, r8}, {r7}, {}, {}, {r6}, {}, {0x0, r8}, {r7, r8}, {0x0, r8}, {0x0, r8}, {}, {}, {0x0, r8}, {r6}, {r7}, {r7, r8}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {r7}, {}, {}, {r7}, {}, {}, {}, {}, {0x0, r8}, {}, {r6, r8}, {r6}, {}, {}, {0x0, r8}, {}, {r7, r8}, {r6}, {0x0, r8}, {}, {}, {r6, r8}, {r7, r8}, {r7}, {r6, r8}, {}, {}, {r7}, {r6, r8}, {0x0, r8}, {}, {0x0, r8}, {r7}, {r7}, {r6}, {}, {0x0, r8}, {r7}, {0x0, r8}, {}, {}, {}, {r6, r8}], 0x1, "2156816c73038c"}) r9 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r9, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) 10:18:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000000000000001c002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1093.100321][T32298] loop5: detected capacity change from 0 to 512 [ 1093.103987][T32299] loop4: detected capacity change from 0 to 512 [ 1093.119419][T32298] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1093.129610][T32298] EXT4-fs (loop5): group descriptors corrupted! [ 1093.146284][T32299] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1093.167601][ C1] sd 0:0:1:0: tag#4939 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1093.177484][ C1] sd 0:0:1:0: tag#4939 CDB: opcode=0xe5 (vendor) [ 1093.184075][ C1] sd 0:0:1:0: tag#4939 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c 10:18:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000020002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:55 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x401, 0x8, &(0x7f00000008c0)=[{0x0}, {0x0, 0x0, 0x9}, {&(0x7f0000000180)="5030a6b9906c95e36ee1b07f9e5698893307dd91cd0319578b614ed5f1873eb0", 0x20, 0xfffffffffffffffd}, {&(0x7f0000000340)="2df6157d4494279dde2031db3b2744b435271e65a343796db3da0bb347a3215e9b71", 0x22, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f5bf3f90b3d3e7d7132c3012ab7043e22a6f8edc5e516ee833a4fdcf825d9da3fed17cac003d9dd022d", 0xa4, 0x7fffffff}, {&(0x7f0000000500)="822171b91eb1498a4740794c5db7bc7a965f6bf8c7cf5baee0946ad2aa4b016a8a03bb30b092e47cd74a4fab60e1d1443c33c80fa2ef7af6514920209443a39077bb6a856f3c3e40bb7182a08692593ab13f04b516500ed3b3256325f48aafef3d8ca84cdce2b0609ed9c6346c356964614f21f9699436b6ca419197a0729a46ae7ae36fd203e577f2b03891ce7ba975aa5d47214e98c73647d20e757d1ce2d1990688090eee936562a1b4968deb59f6a2980feca28742afcaf376ab51294f57d6334c86538795c11e018be19db248ea75e1", 0xd2, 0x10000}, {&(0x7f0000000600)="4a6006458a4a1e3060e4cca0086f3b44f908e6941741cf7422f159df72a1cdb68c01ef3f102d2afb1e3e446c41bef79e359d62ed3155330d3b2f5207705e6dfa86f4f655d80ee44134bb9211fed0be8f7f86ff1f4b5abab22df6a1bfed2d66e51791fcbbf6f6926ce384fda7a7e86c17dcc2b2473f22c6d095ade56596ee656b3c596a038658b30895170a9ab2d4379f4f58cc6e", 0x94, 0x9}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f0000000ac0)={[{@dots}, {@fat=@sys_immutable}, {@nodots}, {@fat=@umask}], [{@measure}, {@appraise}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@seclabel}]}) openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f80)={0x1, &(0x7f0000000f40)=[{0x7f}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000fc0), 0xc, &(0x7f0000000200)={&(0x7f0000003940)=ANY=[@ANYRES64=r7, @ANYRESHEX, @ANYRES32=r6, @ANYRESOCT=r3, @ANYRESOCT=r4, @ANYBLOB="16de71cf0766d82ab6b67f0cd7508e3ee2643e2e5026c3ea1ccfde1fe0912c50f4450c9c7749b181ae244aa09bb447092b0b62871d5ab9b62bc1121905ff995d268176192bba6bbfe4ff322f3370ce1ac7b5dd004238de507070dc0002cfe8ca03a81158f62018fe98245631fc021061fec067e33a1c01f786dafad477a72fcf767c43d28917995da3bd4df41908d180cd9517f24d97f14674a9a15bb602dca6587204d6571e02a456eb415ea3208e6afe4ed4f3533d7cf074ed4bd702d74e242405fadcd0c73dbb590bb430b54691990800f66109473f3531c01f00"/234], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x40025) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000100)=0x81) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000280)={0x7, 0x80, 0xff, 0x4, 0x8a, 0x0, 0x0, 0x9, 0x4400, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000140), 0x7}, 0x14a82, 0x3, 0x1f, 0x9, 0xfef, 0xff, 0x5, 0x0, 0x3, 0x0, 0xffff}) sendfile(r10, r9, 0x0, 0x100000002) [ 1093.193134][ C1] sd 0:0:1:0: tag#4939 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1093.202271][ C1] sd 0:0:1:0: tag#4939 CDB[20]: ba [ 1093.237975][T32317] loop2: detected capacity change from 0 to 264192 [ 1093.267451][T32299] loop4: detected capacity change from 0 to 512 [ 1093.278291][T32298] loop5: detected capacity change from 0 to 512 [ 1093.287650][T32317] msdos filesystem being mounted at /root/syzkaller-testdir156917949/syzkaller.TDnRSM/2051/file1 supports timestamps until 2107 (0x10391447e) [ 1093.289275][T32299] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1093.309701][T32298] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1093.319905][T32298] EXT4-fs (loop5): group descriptors corrupted! 10:18:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f680000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000026002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce0074000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) [ 1093.409455][ C1] sd 0:0:1:0: tag#4940 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1093.419317][ C1] sd 0:0:1:0: tag#4940 CDB: opcode=0xe5 (vendor) [ 1093.425650][ C1] sd 0:0:1:0: tag#4940 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1093.434713][ C1] sd 0:0:1:0: tag#4940 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1093.443752][ C1] sd 0:0:1:0: tag#4940 CDB[20]: ba [ 1093.496196][T32350] loop5: detected capacity change from 0 to 512 [ 1093.518011][T32350] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1093.528113][T32350] EXT4-fs (loop5): group descriptors corrupted! [ 1093.553094][T32357] loop4: detected capacity change from 0 to 512 [ 1093.561154][T32357] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1093.644710][T32357] loop4: detected capacity change from 0 to 512 [ 1093.655582][T32357] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:18:56 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {}, {r5}, {}, {r5}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {r4}, {}, {0x0, r6}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {0x0, r6}, {}, {r2, r6}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {}, {r5}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {}, {}, {r4}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {}, {r1}, {0x0, r6}, {r4}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {r5}, {}, {}, {r5}, {r5}, {}, {}, {}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {}, {r5, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5, r6}, {r5}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4, r6}], 0x1, "2156816c73038c"}) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) 10:18:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000000000000052b002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f6c0000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce007a000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000000000000003f002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1093.831579][T32377] loop4: detected capacity change from 0 to 512 [ 1093.841874][T32378] loop5: detected capacity change from 0 to 512 [ 1093.857950][T32378] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1093.868062][T32378] EXT4-fs (loop5): group descriptors corrupted! [ 1093.886886][T32377] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1093.907878][T32392] loop2: detected capacity change from 0 to 264192 10:18:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f740000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000040002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:56 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r2) r3 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x401, 0x8, &(0x7f00000008c0)=[{0x0}, {0x0, 0x0, 0x9}, {&(0x7f0000000180)="5030a6b9906c95e36ee1b07f9e5698893307dd91cd0319578b614ed5f1873eb0", 0x20, 0xfffffffffffffffd}, {&(0x7f0000000340)="2df6157d4494279dde2031db3b2744b435271e65a343796db3da0bb347a3215e9b71", 0x22, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f5bf3f90b3d3e7d7132c3012ab7043e22a6f8edc5e516ee833a4fdcf825d9da3fed17cac003d9dd022d", 0xa4, 0x7fffffff}, {&(0x7f0000000500)="822171b91eb1498a4740794c5db7bc7a965f6bf8c7cf5baee0946ad2aa4b016a8a03bb30b092e47cd74a4fab60e1d1443c33c80fa2ef7af6514920209443a39077bb6a856f3c3e40bb7182a08692593ab13f04b516500ed3b3256325f48aafef3d8ca84cdce2b0609ed9c6346c356964614f21f9699436b6ca419197a0729a46ae7ae36fd203e577f2b03891ce7ba975aa5d47214e98c73647d20e757d1ce2d1990688090eee936562a1b4968deb59f6a2980feca28742afcaf376ab51294f57d6334c86538795c11e018be19db248ea75e1", 0xd2, 0x10000}, {&(0x7f0000000600)="4a6006458a4a1e3060e4cca0086f3b44f908e6941741cf7422f159df72a1cdb68c01ef3f102d2afb1e3e446c41bef79e359d62ed3155330d3b2f5207705e6dfa86f4f655d80ee44134bb9211fed0be8f7f86ff1f4b5abab22df6a1bfed2d66e51791fcbbf6f6926ce384fda7a7e86c17dcc2b2473f22c6d095ade56596ee656b3c596a038658b30895170a9ab2d4379f4f58cc6e", 0x94, 0x9}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f0000000980)=ANY=[@ANYBLOB="646f74732c7379735f696d6ddee0502e757461626c652c6e6f646f74732c756d6173eb3d30303030303030303030303030303030303030303030302c6d6561737572652c61707072616973652c66736d616769633d3078303030303030303030303030303230302c636f6e746578743d73797361646d5f752c666f776e65723ea8e8cdae30998908db6a5122f4695b0a95eb6856a6204a91fc", @ANYRESDEC, @ANYBLOB=',euid=', @ANYRESDEC, @ANYBLOB=',seclabel,\x00']) openat(r3, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r6 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f80)={0x1, &(0x7f0000000f40)=[{0x7f}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r6, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000fc0), 0xc, &(0x7f0000000200)={&(0x7f0000003940)=ANY=[@ANYRES64=r8, @ANYRESHEX, @ANYRES32=r7, @ANYRESOCT=r4, @ANYRESOCT=r5, @ANYBLOB="16de71cf0766d82ab6b67f0cd79e8e3ee2643e2e5026c3ea1ccfde1fe0912c50f4450c9c7749b181ae244aa09bb447092b0b62871d5ab9b62bc1121905ff995d268176192bba6bbfe4ff322f3370ce1ac7b5dd004238de507070dc0002cfe8ca03a81158f62018fe98245631fc021061fec067e33a1c01f786dafad477a72fcf767c43d28917995da3bd4df41908d180cd9517f24d97f14674a9a15bb602dca6587204d6571e02a456eb415ea3208e6afe4ed4f3533d7cf074ed4bd702d74e242405fadcd0c73dbb590bb430b54691990800f66109473f3531c01f00"/234], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x40025) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r11 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r11, r10, 0x0, 0x100000002) 10:18:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce00fe000f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) [ 1093.967307][T32377] loop4: detected capacity change from 0 to 512 [ 1093.975051][T32392] msdos filesystem being mounted at /root/syzkaller-testdir156917949/syzkaller.TDnRSM/2052/file1 supports timestamps until 2107 (0x10391447e) [ 1093.991776][T32377] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:18:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000480002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1094.060271][T32411] loop5: detected capacity change from 0 to 512 [ 1094.076369][T32416] loop4: detected capacity change from 0 to 512 [ 1094.083266][T32411] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1094.093552][T32411] EXT4-fs (loop5): group descriptors corrupted! 10:18:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000000000000fffe002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1094.110625][ C1] sd 0:0:1:0: tag#4969 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1094.121018][ C1] sd 0:0:1:0: tag#4969 CDB: opcode=0xe5 (vendor) [ 1094.127369][ C1] sd 0:0:1:0: tag#4969 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1094.136400][ C1] sd 0:0:1:0: tag#4969 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1094.138280][T32416] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1094.145443][ C1] sd 0:0:1:0: tag#4969 CDB[20]: ba [ 1094.187236][T32411] loop5: detected capacity change from 0 to 512 [ 1094.195158][T32411] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1094.205342][T32411] EXT4-fs (loop5): group descriptors corrupted! 10:18:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000000000000feff002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1094.237012][T32416] loop4: detected capacity change from 0 to 512 [ 1094.268750][T32416] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:18:56 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {}, {r5}, {}, {r5}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {r4}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {r4}, {}, {0x0, r6}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {0x0, r6}, {}, {r2, r6}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {}, {r5}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {}, {}, {r4}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {}, {r1}, {0x0, r6}, {r4}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {r5}, {}, {}, {r5}, {r5}, {}, {}, {}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {}, {r5, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5, r6}, {r5}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4, r6}], 0x1, "2156816c73038c"}) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) 10:18:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f7a0000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000003000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce0004020f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:56 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x401, 0x8, &(0x7f00000008c0)=[{0x0}, {0x0, 0x0, 0x9}, {&(0x7f0000000180)="5030a6b9906c95e36ee1b07f9e5698893307dd91cd0319578b614ed5f1873eb0", 0x20, 0xfffffffffffffffd}, {&(0x7f0000000340)="2df6157d4494279dde2031db3b2744b435271e65a343796db3da0bb347a3215e9b71", 0x22, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f5bf3f90b3d3e7d7132c3012ab7043e22a6f8edc5e516ee833a4fdcf825d9da3fed17cac003d9dd022d", 0xa4, 0x7fffffff}, {&(0x7f0000000500)="822171b91eb1498a4740794c5db7bc7a965f6bf8c7cf5baee0946ad2aa4b016a8a03bb30b092e47cd74a4fab60e1d1443c33c80fa2ef7af6514920209443a39077bb6a856f3c3e40bb7182a08692593ab13f04b516500ed3b3256325f48aafef3d8ca84cdce2b0609ed9c6346c356964614f21f9699436b6ca419197a0729a46ae7ae36fd203e577f2b03891ce7ba975aa5d47214e98c73647d20e757d1ce2d1990688090eee936562a1b4968deb59f6a2980feca28742afcaf376ab51294f57d6334c86538795c11e018be19db248ea75e1", 0xd2, 0x10000}, {&(0x7f0000000600)="4a6006458a4a1e3060e4cca0086f3b44f908e6941741cf7422f159df72a1cdb68c01ef3f102d2afb1e3e446c41bef79e359d62ed3155330d3b2f5207705e6dfa86f4f655d80ee44134bb9211fed0be8f7f86ff1f4b5abab22df6a1bfed2d66e51791fcbbf6f6926ce384fda7a7e86c17dcc2b2473f22c6d095ade56596ee656b3c596a038658b30895170a9ab2d4379f4f58cc6e", 0x94, 0x9}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f0000000ac0)={[{@dots}, {@fat=@sys_immutable}, {@nodots}, {@fat=@umask}], [{@measure}, {@appraise}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@seclabel}]}) openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f80)={0x1, &(0x7f0000000f40)=[{0x7f}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000fc0), 0xc, &(0x7f0000000200)={&(0x7f0000003940)=ANY=[@ANYRES64=r7, @ANYRESHEX, @ANYRES32=r6, @ANYRESOCT=r3, @ANYRESOCT=r4, @ANYBLOB="16de71cf0766d82ab6b67f0cd79e8e3ee2643e2e5026c3ea1ccfde1fe0912c50f4450c9c7749b181ae244aa09bb447092b0b62871d5ab9b62bc1121905ff995d268176192bba6bbfe4ff322f3370ce1ac7b5dd004238de507070dc0002cfe8ca03a81158f62018fe98245631fc021061fec067e33a1c01f786dafad477a72fcf767c43d28917995da3bd4df41908d180cd9517f24d97f14674a9a15bb602dca6587204d6571e02a456eb415ea3208e6afe4ed4f353240df074ed4bd702d74e242405fadcd0c73dbb590bb430b54691990800f66109473f3531c01f00"/234], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x40025) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r10, r9, 0x0, 0x100000002) [ 1094.563657][T32453] loop5: detected capacity change from 0 to 512 [ 1094.573854][T32451] loop4: detected capacity change from 0 to 512 [ 1094.586912][T32453] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1094.597032][T32453] EXT4-fs (loop5): group descriptors corrupted! 10:18:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000002002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1094.625387][T32451] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1094.635760][ C0] sd 0:0:1:0: tag#4944 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1094.645612][ C0] sd 0:0:1:0: tag#4944 CDB: opcode=0xe5 (vendor) [ 1094.651968][ C0] sd 0:0:1:0: tag#4944 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1094.661025][ C0] sd 0:0:1:0: tag#4944 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1094.670068][ C0] sd 0:0:1:0: tag#4944 CDB[20]: ba 10:18:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000003002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1094.692997][T32471] loop2: detected capacity change from 0 to 264192 [ 1094.753842][T32471] msdos filesystem being mounted at /root/syzkaller-testdir156917949/syzkaller.TDnRSM/2053/file1 supports timestamps until 2107 (0x10391447e) [ 1094.788982][T32451] loop4: detected capacity change from 0 to 512 [ 1094.797012][T32453] loop5: detected capacity change from 0 to 512 10:18:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000004002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000005002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1094.804138][T32453] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1094.814267][T32453] EXT4-fs (loop5): group descriptors corrupted! [ 1094.832444][T32451] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:18:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000ffe0000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce0000030f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) [ 1094.957258][T32500] loop5: detected capacity change from 0 to 512 [ 1094.984924][T32500] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1094.995037][T32500] EXT4-fs (loop5): group descriptors corrupted! [ 1095.000991][T32505] loop4: detected capacity change from 0 to 512 10:18:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000006002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1095.038710][T32505] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1095.081095][T32505] loop4: detected capacity change from 0 to 512 [ 1095.089682][T32500] loop5: detected capacity change from 0 to 512 [ 1095.102737][T32505] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1095.103674][T32500] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1095.120179][T32500] EXT4-fs (loop5): group descriptors corrupted! 10:18:57 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {}, {r5}, {}, {r5}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {r4}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {r4}, {}, {0x0, r6}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {0x0, r6}, {}, {r2, r6}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {}, {r5}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {}, {}, {r4}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {}, {r1}, {0x0, r6}, {r4}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {r5}, {}, {}, {r5}, {r5}, {}, {}, {}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {}, {r5, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5, r6}, {r5}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4, r6}], 0x1, "2156816c73038c"}) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) 10:18:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000007002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce0002040f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000fe50100010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:57 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x401, 0x8, &(0x7f00000008c0)=[{0x0}, {0x0, 0x0, 0x9}, {&(0x7f0000000180)="5030a6b9906c95e36ee1b07f9e5698893307dd91cd0319578b614ed5f1873eb0", 0x20, 0xfffffffffffffffd}, {&(0x7f0000000340)="2df6157d4494279dde2031db3b2744b435271e65a343796db3da0bb347a3215e9b71", 0x22, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f5bf3f90b3d3e7d7132c3012ab7043e22a6f8edc5e516ee833a4fdcf825d9da3fed17cac003d9dd022d", 0xa4, 0x7fffffff}, {&(0x7f0000000500)="822171b91eb1498a4740794c5db7bc7a965f6bf8c7cf5baee0946ad2aa4b016a8a03bb30b092e47cd74a4fab60e1d1443c33c80fa2ef7af6514920209443a39077bb6a856f3c3e40bb7182a08692593ab13f04b516500ed3b3256325f48aafef3d8ca84cdce2b0609ed9c6346c356964614f21f9699436b6ca419197a0729a46ae7ae36fd203e577f2b03891ce7ba975aa5d47214e98c73647d20e757d1ce2d1990688090eee936562a1b4968deb59f6a2980feca28742afcaf376ab51294f57d6334c86538795c11e018be19db248ea75e1", 0xd2, 0x10000}, {&(0x7f0000000600)="4a6006458a4a1e3060e4cca0086f3b44f908e6941741cf7422f159df72a1cdb68c01ef3f102d2afb1e3e446c41bef79e359d62ed3155330d3b2f5207705e6dfa86f4f655d80ee44134bb9211fed0be8f7f86ff1f4b5abab22df6a1bfed2d66e51791fcbbf6f6926ce384fda7a7e86c17dcc2b2473f22c6d095ade56596ee656b3c596a038658b30895170a9ab2d4379f4f58cc6e", 0x94, 0x9}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f0000000980)=ANY=[@ANYBLOB="646f74732cf2e4919badc48305377b0c495a6d7379735f696d6d757461626c652c6e6f646f74732c756d61736b3d30303030303030303030303030303030303030303030302c6d656173757072616973652c66736d616769633d3078303030303030303030303030303230302c636f6e746578743cad51ed033d73797361646d5f752c666f776e65723e", @ANYRESDEC, @ANYBLOB=',euid=', @ANYRESDEC, @ANYBLOB=',seclabel,\x00']) openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000001200)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x1, "2156816c73038c"}) r6 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f80)={0x1, &(0x7f0000000f40)=[{0x7f}]}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000140)='appraise') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r6, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) creat(&(0x7f0000000080)='./file0/file0\x00', 0x18) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000fc0), 0xc, &(0x7f0000000200)={&(0x7f0000003940)=ANY=[@ANYRES64=r8, @ANYRESHEX, @ANYRES32=r7, @ANYRESOCT=r4, @ANYRESOCT=r5, @ANYBLOB="16de71cf0766d82ab6b67f0cd79e8e3ee2643e2e5026c3ea1ccfdeb181ae244aa09bb447092b0b62871d5ab9b62bc1121905ff995d268176192bba6bbfe4ff322f3370ce1ac7b5dd004238de507070dc0002cfe8ca03a81158f62018fe98245631fc021061fec067e33a1c01f786dafad477a72fcf767c43d28917995da3bd4df41908d180cd9517f24d97f14674a9a15bb602dca6587204d6571e02a456eb415ea3208e6afe4ed4f3533d7cf074ed4bd702d74e242405fadcd0c73dbb590bb430b54691992400f66109473f3531c01f00"/223], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x40025) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r10, 0xffffffffffffffff, 0x0, 0x100000002) 10:18:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000008002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1095.324681][T32534] loop5: detected capacity change from 0 to 512 [ 1095.335717][T32536] loop4: detected capacity change from 0 to 512 [ 1095.352035][T32536] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1095.383769][T32534] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1095.387748][ C1] sd 0:0:1:0: tag#4987 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1095.393890][T32534] EXT4-fs (loop5): group descriptors corrupted! [ 1095.403682][ C1] sd 0:0:1:0: tag#4987 CDB: opcode=0xe5 (vendor) [ 1095.416273][ C1] sd 0:0:1:0: tag#4987 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1095.420197][T32551] loop2: detected capacity change from 0 to 264192 10:18:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000018002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000000000000001c002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1095.425318][ C1] sd 0:0:1:0: tag#4987 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1095.425350][ C1] sd 0:0:1:0: tag#4987 CDB[20]: ba [ 1095.451411][T32551] msdos filesystem being mounted at /root/syzkaller-testdir156917949/syzkaller.TDnRSM/2054/file1 supports timestamps until 2107 (0x10391447e) 10:18:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000026002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:57 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x401, 0x8, &(0x7f00000008c0)=[{0x0}, {0x0, 0x0, 0x9}, {&(0x7f0000000180)="5030a6b9906c95e36ee1b07f9e5698893307dd91cd0319578b614ed5f1873eb0", 0x20, 0xfffffffffffffffd}, {&(0x7f0000000340)="2df6157d4494279dde2031db3b2744b435271e65a343796db3da0bb347a3215e9b71", 0x22, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f5bf3f90b3d3e7d7132c3012ab7043e22a6f8edc5e516ee833a4fdcf825d9da3fed17cac003d9dd022d", 0xa4, 0x7fffffff}, {&(0x7f0000000500)="822171b91eb1498a4740794c5db7bc7a965f6bf8c7cf5baee0946ad2aa4b016a8a03bb30b092e47cd74a4fab60e1d1443c33c80fa2ef7af6514920209443a39077bb6a856f3c3e40bb7182a08692593ab13f04b516500ed3b3256325f48aafef3d8ca84cdce2b0609ed9c6346c356964614f21f9699436b6ca419197a0729a46ae7ae36fd203e577f2b03891ce7ba975aa5d47214e98c73647d20e757d1ce2d1990688090eee936562a1b4968deb59f6a2980feca28742afcaf376ab51294f57d6334c86538795c11e018be19db248ea75e1", 0xd2, 0x10000}, {&(0x7f0000000600)="4a6006458a4a1e3060e4cca0086f3b44f908e6941741cf7422f159df72a1cdb68c01ef3f102d2afb1e3e446c41bef79e359d62ed3155330d3b2f5207705e6dfa86f4f655d80ee44134bb9211fed0be8f7f86ff1f4b5abab22df6a1bfed2d66e51791fcbbf6f6926ce384fda7a7e86c17dcc2b2473f22c6d095ade56596ee656b3c596a038658b30895170a9ab2d4379f4f58cc6e", 0x94, 0x9}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f0000000ac0)={[{@dots}, {@fat=@sys_immutable}, {@nodots}, {@fat=@umask}], [{@measure}, {@appraise}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@seclabel}]}) openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f80)={0x1, &(0x7f0000000f40)=[{0x7f}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000fc0), 0xc, &(0x7f0000000200)={&(0x7f0000003940)=ANY=[@ANYRES64=r7, @ANYRESHEX, @ANYRES32=r6, @ANYRESOCT=r3, @ANYRESOCT=r4, @ANYBLOB="16de71cf0766d82ab6b67f0cd79e8e3ee2643e2e5026c3ea1ccfde1fe0912c50f4450c9c7749b181ae244aa09bb447092b0b62871d5ab9b62bc1121905ff995d268176192bba6bbfe4ff322f3370ce1ac7b5dd004238de507070dc0002cfe8ca03a81158f62018fe98245631fc021061fec067e33a1c01f786dafad477a72fcf767c43d28917995da3bd4df41908d180cd9517f24d97f14674a9a15bb602dca6587204d6571e02a456eb415ea3208e6afe4ed4f3533d7cf074ed4bd702d74e242405fadcd0c73dbb590bb430b54691990800f66109473f3531c01f00"/234], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x40025) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r10, r9, 0x0, 0x100000002) 10:18:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce0006040f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) [ 1095.584212][T32534] loop5: detected capacity change from 0 to 512 [ 1095.593082][T32534] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1095.603330][T32534] EXT4-fs (loop5): group descriptors corrupted! 10:18:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000000000fe002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1095.628144][ C0] sd 0:0:1:0: tag#4988 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1095.637261][T32575] loop4: detected capacity change from 0 to 512 [ 1095.638010][ C0] sd 0:0:1:0: tag#4988 CDB: opcode=0xe5 (vendor) [ 1095.650556][ C0] sd 0:0:1:0: tag#4988 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1095.659599][ C0] sd 0:0:1:0: tag#4988 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1095.668745][ C0] sd 0:0:1:0: tag#4988 CDB[20]: ba [ 1095.728125][T32575] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:18:58 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {}, {r5}, {}, {r5}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {r4}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {r4}, {}, {0x0, r6}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {0x0, r6}, {}, {r2, r6}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {}, {r5}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {}, {}, {r4}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {}, {r1}, {0x0, r6}, {r4}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {r5}, {}, {}, {r5}, {r5}, {}, {}, {}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {}, {r5, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5, r6}, {r5}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4, r6}], 0x1, "2156816c73038c"}) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) 10:18:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000004022000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000fe60100010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce0010040f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) [ 1095.774406][T32575] loop4: detected capacity change from 0 to 512 [ 1095.795808][T32575] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:18:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000032000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1095.868562][T32599] loop5: detected capacity change from 0 to 512 [ 1095.879661][T32598] loop4: detected capacity change from 0 to 512 [ 1095.893791][T32599] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1095.903940][T32599] EXT4-fs (loop5): group descriptors corrupted! 10:18:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f040200010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000002042000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1095.940412][T32598] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1095.974169][T32613] loop2: detected capacity change from 0 to 264192 [ 1095.989806][T32598] loop4: detected capacity change from 0 to 512 [ 1095.999784][T32623] loop5: detected capacity change from 0 to 512 [ 1096.022745][T32598] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:18:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce0000050f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) [ 1096.032044][T32613] msdos filesystem being mounted at /root/syzkaller-testdir156917949/syzkaller.TDnRSM/2055/file1 supports timestamps until 2107 (0x10391447e) [ 1096.049772][T32623] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1096.060095][T32623] EXT4-fs (loop5): group descriptors corrupted! 10:18:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000006042000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:58 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x401, 0x8, &(0x7f00000008c0)=[{0x0}, {0x0, 0x0, 0x9}, {&(0x7f0000000180)="5030a6b9906c95e36ee1b07f9e5698893307dd91cd0319578b614ed5f1873eb0", 0x20, 0xfffffffffffffffd}, {&(0x7f0000000340)="2df6157d4494279dde2031db3b2744b435271e65a343796db3da0bb347a3215e9b71", 0x22, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f5bf3f90b3d3e7d7132c3012ab7043e22a6f8edc5e516ee833a4fdcf825d9da3fed17cac003d9dd022d", 0xa4, 0x7fffffff}, {&(0x7f0000000500)="822171b91eb1498a4740794c5db7bc7a965f6bf8c7cf5baee0946ad2aa4b016a8a03bb30b092e47cd74a4fab60e1d1443c33c80fa2ef7af6514920209443a39077bb6a856f3c3e40bb7182a08692593ab13f04b516500ed3b3256325f48aafef3d8ca84cdce2b0609ed9c6346c356964614f21f9699436b6ca419197a0729a46ae7ae36fd203e577f2b03891ce7ba975aa5d47214e98c73647d20e757d1ce2d1990688090eee936562a1b4968deb59f6a2980feca28742afcaf376ab51294f57d6334c86538795c11e018be19db248ea75e1", 0xd2, 0x10000}, {&(0x7f0000000600)="4a6006458a4a1e3060e4cca0086f3b44f908e6941741cf7422f159df72a1cdb68c01ef3f102d2afb1e3e446c41bef79e359d62ed3155330d3b2f5207705e6dfa86f4f655d80ee44134bb9211fed0be8f7f86ff1f4b5abab22df6a1bfed2d66e51791fcbbf6f6926ce384fda7a7e86c17dcc2b2473f22c6d095ade56596ee656b3c596a038658b30895170a9ab2d4379f4f58cc6e", 0x94, 0x9}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f0000000ac0)={[{@dots}, {@fat=@sys_immutable}, {@nodots}, {@fat=@umask}], [{@measure}, {@appraise}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@seclabel}]}) openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f80)={0x1, &(0x7f0000000f40)=[{0x7f}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000fc0), 0xc, &(0x7f0000000200)={&(0x7f0000003940)=ANY=[@ANYRES64=r7, @ANYRESHEX, @ANYRES32=r6, @ANYRESOCT=r3, @ANYRESOCT=r4, @ANYBLOB="16de71cf0766d82ab6b67f0cd79e8e3ee2643e2e5026c3ea1ccfde1fe0912c50f4450c9c7749b181ae244aa09bb447092b0b62871d5ab9b62bc1121905ff995d268176192bba6bbfe4ff322f3370ce1ac7b5dd004238de507070dc000201000000a81158f62018fe98245631fc021061fec067e33a1c01f786dafad477a72fcf767c43d28917995da3bd4df41908d180cd9517f24d97f14674a9a15bb602dca6587204d6571e02a456eb415ea3208e6afe4ed4f3533d7cf074ed4bd702d74e242405fadcd0c73dbb590bb430b54691990800f66109473f3531c01f00"/234], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x40025) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r10, r9, 0x0, 0x100000002) [ 1096.123898][T32623] loop5: detected capacity change from 0 to 512 [ 1096.135031][T32623] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1096.145253][T32623] EXT4-fs (loop5): group descriptors corrupted! [ 1096.165737][T32644] loop4: detected capacity change from 0 to 512 10:18:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000080042000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f190200010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) [ 1096.201373][T32644] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1096.273790][T32656] loop5: detected capacity change from 0 to 512 [ 1096.292233][T32656] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1096.296724][ C1] sd 0:0:1:0: tag#4950 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1096.302342][T32656] EXT4-fs (loop5): group descriptors corrupted! [ 1096.312256][ C1] sd 0:0:1:0: tag#4950 CDB: opcode=0xe5 (vendor) [ 1096.324772][ C1] sd 0:0:1:0: tag#4950 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1096.333812][ C1] sd 0:0:1:0: tag#4950 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1096.342966][ C1] sd 0:0:1:0: tag#4950 CDB[20]: ba 10:18:58 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {}, {r5}, {}, {r5}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {r4}, {0x0, r6}, {}, {}, {r4}, {r5}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {r4}, {}, {0x0, r6}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {0x0, r6}, {}, {r2, r6}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {}, {r5}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {}, {}, {r4}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {}, {r1}, {0x0, r6}, {r4}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {r5}, {}, {}, {r5}, {r5}, {}, {}, {}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {}, {r5, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5, r6}, {r5}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4, r6}], 0x1, "2156816c73038c"}) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) 10:18:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce0000060f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000052000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f1a0200010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000000000000002b052000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1096.568310][T32671] loop4: detected capacity change from 0 to 512 [ 1096.569290][T32672] loop5: detected capacity change from 0 to 512 [ 1096.593038][T32671] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:18:59 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x401, 0x8, &(0x7f00000008c0)=[{0x0}, {0x0, 0x0, 0x9}, {&(0x7f0000000180)="5030a6b9906c95e36ee1b07f9e5698893307dd91cd0319578b614ed5f1873eb0", 0x20, 0xfffffffffffffffd}, {&(0x7f0000000340)="2df6157d4494279dde2031db3b2744b435271e65a343796db3da0bb347a3215e9b71", 0x22, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f5bf3f90b3d3e7d7132c3012ab7043e22a6f8edc5e516ee833a4fdcf825d9da3fed17cac003d9dd022d", 0xa4, 0x7fffffff}, {&(0x7f0000000500)="822171b91eb1498a4740794c5db7bc7a965f6bf8c7cf5baee0946ad2aa4b016a8a03bb30b092e47cd74a4fab60e1d1443c33c80fa2ef7af6514920209443a39077bb6a856f3c3e40bb7182a08692593ab13f04b516500ed3b3256325f48aafef3d8ca84cdce2b0609ed9c6346c356964614f21f9699436b6ca419197a0729a46ae7ae36fd203e577f2b03891ce7ba975aa5d47214e98c73647d20e757d1ce2d1990688090eee936562a1b4968deb59f6a2980feca28742afcaf376ab51294f57d6334c86538795c11e018be19db248ea75e1", 0xd2, 0x10000}, {&(0x7f0000000600)="4a6006458a4a1e3060e4cca0086f3b44f908e6941741cf7422f159df72a1cdb68c01ef3f102d2afb1e3e446c41bef79e359d62ed3155330d3b2f5207705e6dfa86f4f655d80ee44134bb9211fed0be8f7f86ff1f4b5abab22df6a1bfed2d66e51791fcbbf6f6926ce384fda7a7e86c17dcc2b2473f22c6d095ade56596ee656b3c596a038658b30895170a9ab2d4379f4f58cc6e", 0x94, 0x9}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f0000000ac0)={[{@dots}, {@fat=@sys_immutable}, {@nodots}, {@fat=@umask}], [{@measure}, {@appraise}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@seclabel}]}) openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x1, "2156816c73038c"}) r6 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f80)={0x1, &(0x7f0000000f40)=[{0x7f}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r6, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000fc0), 0xc, &(0x7f0000000200)={&(0x7f0000003940)=ANY=[@ANYRES64=r8, @ANYRESHEX, @ANYRES32=r7, @ANYRESOCT=r3, @ANYRESOCT=r4, @ANYBLOB="16de71cf0766d82ab6b67f0cd79e8e3ee2643e2e5026c3ea1ccfde1fe0912c50f4450c9c7749b181ae244aa09bb447092b0b62871d5ab9b62bc1121905ff995d268176192bba6bbfe4ff322f3370ce1ac7b5dd004238de507070dc0002cfe8ca03a81158f62018fe98245631fc021061fec067e33a1c01f786dafad477a72fcf767c43d28917995da3bd4df41908d180cd9517f24d97f14674a9a15bb602dca6587204d6571e02a456eb415ea3208e6afe4ed4f3533d7cf074ed4bd702d74e242405fadcd0c73dbb590bb430b54691990800f66109473f3531c01f00"/234], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x40025) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000001200)={0x0, r5, "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", "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"}) r11 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r11, r10, 0x0, 0x100000002) 10:18:59 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000062000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1096.623554][T32672] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1096.633787][T32672] EXT4-fs (loop5): group descriptors corrupted! [ 1096.635104][T32683] loop2: detected capacity change from 0 to 264192 [ 1096.682894][T32671] loop4: detected capacity change from 0 to 512 [ 1096.690298][T32672] loop5: detected capacity change from 0 to 512 [ 1096.705353][T32671] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1096.719465][T32672] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1096.729662][T32672] EXT4-fs (loop5): group descriptors corrupted! [ 1096.745262][ C0] sd 0:0:1:0: tag#4939 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1096.755139][ C0] sd 0:0:1:0: tag#4939 CDB: opcode=0xe5 (vendor) [ 1096.761483][ C0] sd 0:0:1:0: tag#4939 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c 10:18:59 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000004062000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce0004060f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) [ 1096.765330][T32683] msdos filesystem being mounted at /root/syzkaller-testdir156917949/syzkaller.TDnRSM/2056/file1 supports timestamps until 2107 (0x10391447e) [ 1096.770520][ C0] sd 0:0:1:0: tag#4939 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1096.793934][ C0] sd 0:0:1:0: tag#4939 CDB[20]: ba 10:18:59 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000072000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:59 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000182000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000300010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) [ 1096.954803][T32721] loop4: detected capacity change from 0 to 512 [ 1096.990145][T32721] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1097.011226][T32727] loop5: detected capacity change from 0 to 512 [ 1097.026498][T32721] loop4: detected capacity change from 0 to 512 [ 1097.045400][T32727] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1097.055565][T32727] EXT4-fs (loop5): group descriptors corrupted! [ 1097.066447][T32721] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1097.146600][T32727] loop5: detected capacity change from 0 to 512 [ 1097.162808][T32727] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1097.173006][T32727] EXT4-fs (loop5): group descriptors corrupted! 10:18:59 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {}, {r5}, {}, {r5}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {r4}, {0x0, r6}, {}, {}, {r4}, {r5}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {r4}, {}, {0x0, r6}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {0x0, r6}, {}, {r2, r6}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {}, {r5}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {}, {}, {r4}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {}, {r1}, {0x0, r6}, {r4}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {r5}, {}, {}, {r5}, {r5}, {}, {}, {}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {}, {r5, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5, r6}, {r5}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4, r6}], 0x1, "2156816c73038c"}) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) 10:18:59 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000000000001c2000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:18:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce0000070f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f020400010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:18:59 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000140)={0x8264, 0x3, 0x3, 0x8000, 0x12, "70509abd5829b3dc"}) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x401, 0x8, &(0x7f00000008c0)=[{0x0}, {0x0, 0x0, 0x9}, {&(0x7f0000000180)="5030a6b9906c95e36ee1b07f9e5698893307dd91cd0319578b614ed5f1873eb0", 0x20, 0xfffffffffffffffd}, {&(0x7f0000000340)="2df6157d4494279dde2031db3b2744b435271e65a343796db3da0bb347a3215e9b71", 0x22, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f5bf3f90b3d3e7d7132c3012ab7043e22a6f8edc5e516ee833a4fdcf825d9da3fed17cac003d9dd022d", 0xa4, 0x7fffffff}, {&(0x7f0000000500)="822171b91eb1498a4740794c5db7bc7a965f6bf8c7cf5baee0946ad2aa4b016a8a03bb30b092e47cd74a4fab60e1d1443c33c80fa2ef7af6514920209443a39077bb6a856f3c3e40bb7182a08692593ab13f04b516500ed3b3256325f48aafef3d8ca84cdce2b0609ed9c6346c356964614f21f9699436b6ca419197a0729a46ae7ae36fd203e577f2b03891ce7ba975aa5d47214e98c73647d20e757d1ce2d1990688090eee936562a1b4968deb59f6a2980feca28742afcaf376ab51294f57d6334c86538795c11e018be19db248ea75e1", 0xd2, 0x10000}, {&(0x7f0000000600)="4a6006458a4a1e3060e4cca0086f3b44f908e6941741cf7422f159df72a1cdb68c01ef3f102d2afb1e3e446c41bef79e359d62ed3155330d3b2f5207705e6dfa86f4f655d80ee44134bb9211fed0be8f7f86ff1f4b5abab22df6a1bfed2d66e51791fcbbf6f6926ce384fda7a7e86c17dcc2b2473f22c6d095ade56596ee656b3c596a038658b30895170a9ab2d4379f4f58cc6e", 0x94, 0x9}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f0000000980)=ANY=[@ANYBLOB='dots,sys_immutable,nodots,umask=00000000000000000000000,measure,appraise,fsmagic=0x0000000000000200,context=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB=',euid=', @ANYRESDEC, @ANYBLOB="004d000000000500000000000000000076893379fe00c117d8c4fe9d61d7bb654c93f846193bf69eed8a8024da65246de1421745874ca4"]) openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000280), 0x3f, 0x3) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f80)={0x1, &(0x7f0000000f40)=[{0x7f}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000fc0), 0xc, &(0x7f0000000200)={&(0x7f0000003940)=ANY=[@ANYRES64=r7, @ANYRESHEX, @ANYRES32=r6, @ANYRESOCT=r3, @ANYRESOCT=r4, @ANYBLOB="16de71cf0766d82ab6b67f0cd79e8e3ee2643e2e5026c3ea1ccfde1fe0912c50f4450c9c7749b181ae244aa09bb447092b0b62871d5ab9b62bc1121905ff995d268176192bba6bbfe4ff322f3370ce1ac7b5dd004238de507070dc0002cfe8ca03a81158f62018fe98245631fc021061fec067e33a1c01f786dafad477a72fcf767c43d28917995da3bd4df41908d180cd9517f24d97f14674a9a15bb602dca6587204d6571e02a456eb415ea3208e6afe4ed4f3533d7cf074ed4bd702d74e242405fadcd0c73dbb590bb430b54691990800f66109473f3531c01f00"/234], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x40025) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r10, r9, 0x0, 0x100000002) 10:18:59 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000202000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1097.481321][T32753] loop4: detected capacity change from 0 to 512 [ 1097.491057][T32758] loop5: detected capacity change from 0 to 512 [ 1097.519178][T32753] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1097.540533][T32758] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1097.550704][T32758] EXT4-fs (loop5): group descriptors corrupted! [ 1097.551205][ C1] sd 0:0:1:0: tag#4978 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1097.566788][ C1] sd 0:0:1:0: tag#4978 CDB: opcode=0xe5 (vendor) [ 1097.571202][ T301] loop2: detected capacity change from 0 to 264192 [ 1097.573121][ C1] sd 0:0:1:0: tag#4978 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c 10:18:59 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000262000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1097.588685][ C1] sd 0:0:1:0: tag#4978 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1097.597728][ C1] sd 0:0:1:0: tag#4978 CDB[20]: ba [ 1097.634716][ T301] msdos filesystem being mounted at /root/syzkaller-testdir156917949/syzkaller.TDnRSM/2057/file1 supports timestamps until 2107 (0x10391447e) [ 1097.666764][T32758] loop5: detected capacity change from 0 to 512 [ 1097.674872][T32753] loop4: detected capacity change from 0 to 512 10:19:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000000000052b2000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1097.682973][T32758] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1097.693089][T32758] EXT4-fs (loop5): group descriptors corrupted! [ 1097.697104][T32753] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:19:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f060400010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:19:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000000000003f2000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:19:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce0000090f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) [ 1097.779378][ T333] loop5: detected capacity change from 0 to 512 [ 1097.806752][ T333] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1097.816985][ T333] EXT4-fs (loop5): group descriptors corrupted! 10:19:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000402000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1097.824873][ T340] loop4: detected capacity change from 0 to 512 [ 1097.873245][ T340] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1097.885682][ T333] loop5: detected capacity change from 0 to 512 [ 1097.902974][ T333] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1097.913110][ T333] EXT4-fs (loop5): group descriptors corrupted! [ 1097.935384][ T340] loop4: detected capacity change from 0 to 512 [ 1097.944452][ T340] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:19:00 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {}, {r5}, {}, {r5}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {r4}, {0x0, r6}, {}, {}, {r4}, {r5}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {r4}, {}, {0x0, r6}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {0x0, r6}, {}, {r2, r6}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {}, {r5}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {}, {}, {r4}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {}, {r1}, {0x0, r6}, {r4}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {r5}, {}, {}, {r5}, {r5}, {}, {}, {}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {}, {r5, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5, r6}, {r5}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4, r6}], 0x1, "2156816c73038c"}) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) 10:19:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000004802000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:19:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f100400010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:19:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce00000a0f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:19:00 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x401, 0x8, &(0x7f00000008c0)=[{0x0}, {0x0, 0x0, 0x9}, {&(0x7f0000000180)="5030a6b9906c95e36ee1b07f9e5698893307dd91cd0319578b614ed5f1873eb0", 0x20, 0xfffffffffffffffd}, {&(0x7f0000000340)="2df6157d4494279dde2031db3b2744b435271e65a343796db3da0bb347a3215e9b71", 0x22, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f5bf3f90b3d3e7d7132c3012ab7043e22a6f8edc5e516ee833a4fdcf825d9da3fed17cac003d9dd022d", 0xa4, 0x7fffffff}, {&(0x7f0000000500)="822171b91eb1498a4740794c5db7bc7a965f6bf8c7cf5baee0946ad2aa4b016a8a03bb30b092e47cd74a4fab60e1d1443c33c80fa2ef7af6514920209443a39077bb6a856f3c3e40bb7182a08692593ab13f04b516500ed3b3256325f48aafef3d8ca84cdce2b0609ed9c6346c356964614f21f9699436b6ca419197a0729a46ae7ae36fd203e577f2b03891ce7ba975aa5d47214e98c73647d20e757d1ce2d1990688090eee936562a1b4968deb59f6a2980feca28742afcaf376ab51294f57d6334c86538795c11e018be19db248ea75e1", 0xd2, 0x10000}, {&(0x7f0000000600)="4a6006458a4a1e3060e4cca0086f3b44f908e6941741cf7422f159df72a1cdb68c01ef3f102d2afb1e3e446c41bef79e359d62ed3155330d3b2f5207705e6dfa86f4f655d80ee44134bb9211fed0be8f7f86ff1f4b5abab22df6a1bfed2d66e51791fcbbf6f6926ce384fda7a7e86c17dcc2b2473f22c6d095ade56596ee656b3c596a038658b30895170a9ab2d4379f4f58cc6e", 0x94, 0x9}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f0000000ac0)={[{@dots}, {@fat=@sys_immutable}, {@nodots}, {@fat=@umask}], [{@measure}, {@appraise}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@seclabel}]}) openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f80)={0x1, &(0x7f0000000f40)=[{0x7f}]}) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000140)={0x3, 0x20, 0xd07, 0x6, 0x7bbe24fe}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000fc0), 0xc, &(0x7f0000000200)={&(0x7f0000003940)=ANY=[@ANYRES64=r7, @ANYRESHEX, @ANYRES32=r6, @ANYRESOCT=r3, @ANYRESOCT=r4, @ANYBLOB="16de71cf0766d82ab6b67f0cd79e8e3ee2643e2e5026c3ea1ccfde1fe0912c50f4450c9c7749b181ae244aa09bb447092b0b62871d5ab9b62bc1121905ff995d268176192bba6bbfe4ff322f3370ce1ac7b5dd004238de507070dc0002cfe8ca03a81158f62018fe98245631fc021061fec067e33a1c01f786dafad477a72fcf767c43d28917995da3bd4df41908d180cd9517f24d97f14674a9a15bb602dca6587204d6571e02a456eb415ea3208e6afe4ed4f3533d7cf074ed4bd702d74e242405fadcd0c73dbb590bb430b54691990800f66109473f3531c01f00"/234], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x40025) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r10, r9, 0x0, 0x100000002) 10:19:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000000000fffe2000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1098.181257][ T369] loop4: detected capacity change from 0 to 512 [ 1098.206800][ T369] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1098.219026][ T375] loop5: detected capacity change from 0 to 512 [ 1098.256763][ T375] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1098.267926][ T375] EXT4-fs (loop5): group descriptors corrupted! [ 1098.283654][ C0] sd 0:0:1:0: tag#4955 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1098.283781][ T369] loop4: detected capacity change from 0 to 512 [ 1098.293533][ C0] sd 0:0:1:0: tag#4955 CDB: opcode=0xe5 (vendor) 10:19:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000000000feff2000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1098.306231][ C0] sd 0:0:1:0: tag#4955 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1098.315283][ C0] sd 0:0:1:0: tag#4955 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1098.324381][ C0] sd 0:0:1:0: tag#4955 CDB[20]: ba [ 1098.338154][ T369] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1098.354909][ T396] loop2: detected capacity change from 0 to 264192 10:19:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000006000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1098.410020][ T396] msdos filesystem being mounted at /root/syzkaller-testdir156917949/syzkaller.TDnRSM/2058/file1 supports timestamps until 2107 (0x10391447e) [ 1098.430823][ T375] loop5: detected capacity change from 0 to 512 10:19:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce00000b0f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:19:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000000a00000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1098.459478][ T375] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1098.469903][ T375] EXT4-fs (loop5): group descriptors corrupted! [ 1098.510805][ T415] loop4: detected capacity change from 0 to 512 10:19:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000000b00000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:19:00 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x401, 0x8, &(0x7f00000008c0)=[{0x0}, {0x0, 0x0, 0x9}, {&(0x7f0000000180)="5030a6b9906c95e36ee1b07f9e5698893307dd91cd0319578b614ed5f1873eb0", 0x20, 0xfffffffffffffffd}, {&(0x7f0000000340)="2df6157d4494279dde2031db3b2744b435271e65a343796db3da0bb347a3215e9b71", 0x22, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f5bf3f90b3d3e7d7132c3012ab7043e22a6f8edc5e516ee833a4fdcf825d9da3fed17cac003d9dd022d", 0xa4, 0x7fffffff}, {&(0x7f0000000500)="822171b91eb1498a4740794c5db7bc7a965f6bf8c7cf5baee0946ad2aa4b016a8a03bb30b092e47cd74a4fab60e1d1443c33c80fa2ef7af6514920209443a39077bb6a856f3c3e40bb7182a08692593ab13f04b516500ed3b3256325f48aafef3d8ca84cdce2b0609ed9c6346c356964614f21f9699436b6ca419197a0729a46ae7ae36fd203e577f2b03891ce7ba975aa5d47214e98c73647d20e757d1ce2d1990688090eee936562a1b4968deb59f6a2980feca28742afcaf376ab51294f57d6334c86538795c11e018be19db248ea75e1", 0xd2, 0x10000}, {&(0x7f0000000600)="4a6006458a4a1e3060e4cca0086f3b44f908e6941741cf7422f159df72a1cdb68c01ef3f102d2afb1e3e446c41bef79e359d62ed3155330d3b2f5207705e6dfa86f4f655d80ee44134bb9211fed0be8f7f86ff1f4b5abab22df6a1bfed2d66e51791fcbbf6f6926ce384fda7a7e86c17dcc2b2473f22c6d095ade56596ee656b3c596a038658b30895170a9ab2d4379f4f58cc6e", 0x94, 0x9}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f0000000ac0)={[{@dots}, {@fat=@sys_immutable}, {@nodots}, {@fat=@umask}], [{@measure}, {@appraise}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@seclabel}]}) r3 = openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) read$usbmon(r3, &(0x7f0000000140)=""/38, 0x26) r6 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f80)={0x1, &(0x7f0000000f40)=[{0x7f}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r6, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000fc0), 0xc, &(0x7f0000000200)={&(0x7f0000003940)=ANY=[@ANYRES64=r8, @ANYRESHEX, @ANYRES32=r7, @ANYRESOCT=r4, @ANYRESOCT=r5, @ANYBLOB="16de71cf0766d82ab6b67f0cd79e8e3ee2643e2e5026c3ea1ccfde1fe0912c50f4450c9c7749b181ae244aa09bb447092b0b62871d5ab9b62bc1121905ff995d268176192bba6bbfe4ff322f3370ce1ac7b5dd004238de507070dc0002cfe8ca03a81158f62018fe98245631fc021061fec067e33a1c01f786dafad477a72fcf767c43d28917995da3bd4df41908d180cd9517f24d97f14674a9a15bb602dca6587204d6571e02a456eb415ea3208e6afe4ed4f3533d7cf074ed4bd702d74e242405fadcd0c73dbb590bb430b54691990800f66109473f3531c01f00"/234], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x40025) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r11 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r11, r10, 0x0, 0x100000002) [ 1098.554245][ T415] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1098.637851][ T415] loop4: detected capacity change from 0 to 512 [ 1098.654003][ T415] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1098.681104][ C0] sd 0:0:1:0: tag#4948 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1098.690967][ C0] sd 0:0:1:0: tag#4948 CDB: opcode=0xe5 (vendor) [ 1098.697412][ C0] sd 0:0:1:0: tag#4948 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1098.706484][ C0] sd 0:0:1:0: tag#4948 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1098.715623][ C0] sd 0:0:1:0: tag#4948 CDB[20]: ba 10:19:01 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {}, {r5}, {}, {r5}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {r4}, {}, {}, {}, {r4, r6}, {r5}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {r4}, {}, {0x0, r6}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {0x0, r6}, {}, {r2, r6}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {}, {r5}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {}, {}, {r4}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {}, {r1}, {0x0, r6}, {r4}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {r5}, {}, {}, {r5}, {r5}, {}, {}, {}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {}, {r5, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5, r6}, {r5}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4, r6}], 0x1, "2156816c73038c"}) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) 10:19:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000500010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:19:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000000c00000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:19:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce00000c0f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:19:01 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}], 0x8, "7e6830ead6b793"}) r378 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r378, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r378, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r384}, {0x0, r384}, {r383}, {r383}, {r383, r384}, {}, {}, {0x0, r384}, {}, {r383, r384}, {0x0, r384}, {}, {r382, r384}, {0x0, r384}, {}, {r383, r384}, {0x0, r384}, {}, {}, {}, {0x0, r384}, {r383}, {0x0, r384}, {0x0, r384}, {r383}, {0x0, r384}, {r382}, {}, {r382}, {0x0, r384}, {}, {r383}, {r382, r384}, {r383}, {}, {0x0, r384}, {r383, r384}, {0x0, r384}, {r382, r384}, {}, {0x0, r384}, {}, {}, {0x0, r384}, {r383}, {}, {r383}, {0x0, r384}, {r385}, {0x0, r384}, {0x0, r384}, {r382}, {}, {r383}, {r382}, {}, {0x0, r384}, {}, {}, {0x0, r384}, {0x0, r384}, {0x0, r384}, {}, {0x0, r384}, {0x0, r384}, {}, {r383}, {r382, r384}, {}, {r382}, {}, {}, {0x0, r384}, {}, {r383}, {r382}, {}, {}, {}, {0x0, r384}, {r383}, {}, {}, {0x0, r384}, {r382, r384}, {0x0, r384}, {}, {0x0, r384}, {r382, r384}, {}, {}, {0x0, r384}, {}, {r382}, {0x0, r384}, {}, {r383}, {r382, r384}, {0x0, r384}, {r382}, {r383, r384}, {0x0, r384}, {0x0, r384}, {0x0, r384}, {}, {0x0, r384}, {r382}, {r382, r384}, {}, {0x0, r384}, {r382, r384}, {}, {0x0, r384}, {r382, r384}, {r383}, {}, {r382, r384}, {r382}, {0x0, r384}, {}, {r382}, {r382, r384}, {}, {}, {0x0, r384}, {0x0, r384}, {0x0, r384}, {r383, r384}, {}, {}, {r382, r384}, {0x0, r384}, {r383, r384}, {r382, r384}, {r383, r384}, {0x0, r384}, {}, {r383, r384}, {r383}, {}, {0x0, r384}, {r382}, {0x0, r384}, {r383, r384}, {r382}, {0x0, r384}, {r383, r384}, {0x0, r384}, {0x0, r384}, {}, {0x0, r384}, {r383}, {0x0, r384}, {r383}, {r382}, {}, {}, {}, {0x0, r384}, {}, {r383, r384}, {}, {0x0, r384}, {}, {r383}, {0x0, r384}, {}, {}, {r382}, {}, {0x0, r384}, {r382, r384}, {r383}, {0x0, r384}, {r382}, {0x0, r384}, {r382}, {0x0, r384}, {r383}, {0x0, r384}, {r382, r384}, {0x0, r384}, {0x0, r384}, {}, {}, {0x0, r384}, {r383}, {r382}, {}, {}, {r382}, {0x0, r384}, {0x0, r384}, {0x0, r384}, {r383, r384}, {0x0, r384}, {}, {r383, r384}, {r382, r384}, {r383}, {r383, r384}, {}, {}, {r382}, {}, {r382}, {}, {}, {r382, r384}, {}, {}, {r382, r384}, {r383, r384}, {0x0, r384}, {r382}, {r383}, {r383, r384}, {}, {}, {r383}, {0x0, r384}, {0x0, r384}, {r382, r384}, {r382}, {}, {0x0, r384}, {0x0, r384}, {}, {r383, r384}, {}, {}, {}, {r383, r384}, {r382, r384}, {r383, r384}, {r383}, {r382}, {}, {}, {r383}, {r382, r384}, {0x0, r384}, {0x0, r384}, {}, {}, {r383}, {r382}, {0x0, r384}, {r383}, {r382}, {}, {}, {}, {0x0, r384}, {0x0, r384}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f000005bc40)={0x3, [{r305, r367}, {r316, r101}, {r353}, {r282, r185}, {r331, r328}, {r51, r91}, {r157, r342}, {r233, r162}, {r37, r360}, {r236}, {r288}, {r254, r86}, {r117, r370}, {r53, r312}, {0x0, r262}, {r264, r32}, {r307, r281}, {r43, r147}, {r24, r265}, {r108, r166}, {r364, r265}, {r374, r57}, {r71, r190}, {r180, r372}, {r296, r278}, {}, {r212, r211}, {r106, r116}, {r145, r328}, {r245, r268}, {r299, r350}, {r75, r101}, {r379, r128}, {r361, r120}, {r197, r99}, {r284, r126}, {r336, r95}, {r214, r142}, {r148, r112}, {r55, r171}, {r131, r170}, {r251, r76}, {r226, r283}, {r49, r10}, {r347, r181}, {r138, r173}, {r279, r137}, {r26, r268}, {r165, r285}, {r224, r27}, {r257, r107}, {r202, r164}, {r250, r217}, {r33, r229}, {r313, r188}, {r286, r276}, {0x0, r275}, {r366, r34}, {r251, r326}, {r3, r19}, {r341, r120}, {r189, r17}, {r25, r52}, {r311, r69}, {r159, r343}, {}, {r143, r89}, {r49, r319}, {r277, r64}, {r8, r10}, {0x0, r152}, {r92, r275}, {r123}, {r315}, {r292, r87}, {r197, r219}, {0x0, r265}, {r165, r59}, {r339, r373}, {r28}, {r16, r12}, {r65, r365}, {r347, r182}, {r204, r312}, {r359, r114}, {r56, r201}, {r193, r95}, {r77, r66}, {r167, r289}, {r187, r99}, {r176, r34}, {r172, r130}, {r228, r57}, {r226, r57}, {r253, r7}, {r11, r330}, {r56, r215}, {0x0, r149}, {0x0, r146}, {0x0, r120}, {r273, r375}, {r294, r321}, {r187}, {r5, r321}, {r169, r242}, {0x0, r44}, {r364, r13}, {r316, r109}, {r113, r179}, {r316, r199}, {r121, r300}, {}, {r131}, {r71}, {r325, r323}, {r274, r266}, {r47, r205}, {r5, r263}, {r88, r259}, {r61}, {r228, r287}, {r176, r329}, {r304, r15}, {0x0, r60}, {r61}, {r151, r59}, {r243, r192}, {r180, r29}, {r202, r222}, {r313, r291}, {r226, r350}, {r31, r39}, {r61, r72}, {r298, r293}, {0x0, r164}, {r198, r7}, {r187}, {0x0, r205}, {r307, r314}, {r110, r41}, {r117, r192}, {r310, r297}, {r88, r283}, {r73, r4}, {r28, r309}, {r349, r132}, {r218, r21}, {r369, r252}, {r104, r188}, {r221}, {r322, r356}, {r376, r139}, {r228, r74}, {r197, r377}, {r45, r103}, {r65}, {r298, r319}, {r212, r370}, {r340, r289}, {r161, r217}, {r117, r231}, {r223, r268}, {0x0, r225}, {r308, r287}, {r143, r337}, {r129, r154}, {r349, r345}, {r200, r84}, {r248, r330}, {r136}, {r269, r232}, {r18, r222}, {r234, r328}, {r133, r164}, {r316, r260}, {r16, r128}, {r261, r126}, {r230, r41}, {r122}, {r159, r354}, {r77, r7}, {r35, r137}, {r63, r328}, {r163, r192}, {r51, r237}, {r191, r370}, {r284, r181}, {r261}, {r153, r346}, {r195, r317}, {r45, r343}, {r364, r48}, {r43, r147}, {0x0, r207}, {r280, r287}, {0x0, r263}, {r327, r72}, {r67, r263}, {r249, r355}, {r71, r237}, {r322, r343}, {r105, r178}, {r208, r348}, {r6, r320}, {r117, r10}, {r77, r87}, {r364, r9}, {r339, r81}, {r376, r32}, {r223, r247}, {r257, r34}, {r165, r42}, {r58, r203}, {r351}, {r26, r79}, {r371}, {r3, r116}, {0x0, r156}, {r187, r116}, {r371}, {r198, r91}, {r77, r285}, {r28, r358}, {r299, r302}, {r65, r242}, {r352, r201}, {r193, r130}, {r308, r312}, {r83, r126}, {r49, r69}, {r100, r160}, {r56, r300}, {r127, r183}, {r131, r252}, {r93, r219}, {r191}, {r318, r185}, {r49, r118}, {r123, r271}, {r243, r41}, {r359, r126}, {r40, r342}, {r307, r295}, {r28, r132}, {r18, r175}, {r246, r231}, {r220, r68}, {r92}, {r119, r79}, {r296}, {r49, r154}, {r371, r99}, {r20}, {r105, r306}, {r3, r150}], 0x6e, "4d1824137b83e7"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f000005cc40)={0x8, [{}, {r290}, {}, {r200}, {}, {r167, r194}, {0x0, r309}, {}, {0x0, r158}, {r336}, {r117, r23}, {0x0, r237}, {}, {r90}, {r238}, {r206}, {}, {}, {0x0, r363}, {0x0, r235}, {r214}, {r187, r186}, {r362}, {r308}, {0x0, r201}, {}, {r228, r139}, {0x0, r213}, {0x0, r203}, {r264, r256}, {r255, r368}, {}, {0x0, r211}, {r226, r147}, {r290, r329}, {r198, r130}, {0x0, r135}, {r246, r323}, {r14}, {r267}, {r37, r171}, {0x0, r229}, {0x0, r94}, {}, {0x0, r314}, {r145}, {r102}, {0x0, r19}, {r85, r115}, {r195, r97}, {r98, r240}, {r206}, {r223}, {r177}, {r125, r368}, {0x0, r275}, {}, {r221}, {r50, r268}, {r134, r354}, {r38}, {0x0, r328}, {0x0, r46}, {}, {0x0, r23}, {r334, r306}, {}, {r189}, {}, {}, {}, {r53}, {0x0, r152}, {r151}, {}, {}, {}, {r279, r150}, {0x0, r149}, {r212}, {0x0, r270}, {}, {0x0, r285}, {r31}, {}, {}, {r234}, {}, {0x0, r142}, {0x0, r70}, {r318, r338}, {}, {r274}, {}, {}, {r224}, {0x0, r190}, {r80}, {}, {r331}, {}, {}, {r341, r348}, {r43}, {r308}, {r111}, {0x0, r52}, {}, {}, {0x0, r324}, {r204}, {0x0, r258}, {}, {r322, r196}, {}, {r241, r302}, {r318}, {0x0, r344}, {0x0, r355}, {r20}, {}, {r290, r219}, {}, {0x0, r387}, {r55}, {0x0, r275}, {r198}, {0x0, r289}, {}, {r245}, {0x0, r170}, {r243}, {}, {r369}, {r102}, {}, {}, {}, {r216, r365}, {r209}, {0x0, r62}, {}, {0x0, r237}, {r379}, {}, {r35, r227}, {}, {}, {0x0, r363}, {r298, r272}, {r341, r32}, {r200}, {r210, r128}, {0x0, r84}, {}, {0x0, r300}, {0x0, r303}, {0x0, r34}, {0x0, r229}, {r16}, {0x0, r36}, {r180}, {r113}, {0x0, r320}, {0x0, r289}, {0x0, r314}, {r357}, {r35}, {}, {}, {}, {r140}, {}, {}, {}, {r22, r367}, {r73}, {}, {}, {r2}, {r351}, {r124, r335}, {0x0, r283}, {}, {r176}, {}, {}, {r35, r144}, {}, {}, {}, {0x0, r386}, {r71}, {0x0, r247}, {r315, r69}, {0x0, r211}, {r78, r272}, {}, {r333, r312}, {r184, r263}, {}, {r125, r54}, {}, {r100, r42}, {r223}, {}, {r233}, {r82}, {0x0, r99}, {r174, r375}, {0x0, r199}, {}, {}, {}, {0x0, r239}, {r209}, {r113}, {r141}, {}, {}, {r51}, {r244, r258}, {0x0, r144}, {r301, r70}, {0x0, r39}, {r129}, {0x0, r7}, {}, {}, {r236}, {0x0, r332}, {r331}, {r246}, {r234}, {}, {r104, r275}, {0x0, r242}, {}, {0x0, r168}, {r108}, {}, {}, {}, {0x0, r260}, {r58}, {r155}, {r153}, {r155}, {r157}, {r96}, {0x0, r66}, {0x0, r321}, {0x0, r384}, {r224, r107}, {r307, r388}], 0x80, "6cda647d18a45c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r381}, {}, {r380}, {r380}, {r380}, {}, {}, {0x0, r381}, {}, {}, {}, {}, {r379, r381}, {0x0, r381}, {}, {r380, r381}, {0x0, r381}, {}, {}, {}, {0x0, r381}, {}, {0x0, r381}, {0x0, r381}, {}, {}, {}, {}, {r379}, {0x0, r381}, {}, {}, {r379, r381}, {r380}, {}, {0x0, r381}, {r380, r381}, {0x0, r381}, {r379}, {}, {0x0, r381}, {r380}, {}, {}, {r380}, {0x0, r381}, {}, {0x0, r381}, {}, {r189, r381}, {0x0, r381}, {r379}, {}, {r380}, {r379}, {}, {r380}, {}, {0x0, r381}, {0x0, r381}, {}, {}, {r380}, {0x0, r381}, {0x0, r381}, {0x0, r381}, {r380}, {0x0, r381}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r381}, {}, {}, {}, {0x0, r381}, {r379}, {0x0, r381}, {}, {}, {r379, r381}, {}, {}, {}, {}, {}, {}, {}, {r380}, {0x0, r381}, {0x0, r381}, {r379}, {r380, r381}, {0x0, r381}, {0x0, r381}, {}, {}, {}, {r379}, {0x0, r381}, {}, {0x0, r381}, {0x0, r381}, {0x0, r381}, {r380, r381}, {r379, r381}, {r380}, {}, {r379, r381}, {r379}, {}, {}, {r379}, {}, {}, {}, {0x0, r381}, {0x0, r381}, {0x0, r381}, {0x0, r381}, {}, {}, {r379, r381}, {0x0, r381}, {0x0, r381}, {r379, r381}, {0x0, r381}, {}, {}, {r380}, {}, {r30}, {0x0, r381}, {r379}, {}, {r380}, {}, {}, {r380}, {0x0, r381}, {0x0, r381}, {}, {0x0, r381}, {}, {0x0, r381}, {}, {r379}, {}, {}, {}, {0x0, r381}, {r379, r381}, {r380}, {}, {}, {}, {r380}, {}, {}, {}, {r379}, {r379}, {}, {r379}, {r380}, {0x0, r381}, {r379}, {}, {r379}, {0x0, r381}, {r380}, {r379, r381}, {0x0, r381}, {}, {0x0, r381}, {}, {}, {0x0, r381}, {r380}, {}, {}, {r379}, {}, {0x0, r381}, {r380, r381}, {0x0, r381}, {0x0, r381}, {}, {}, {0x0, r381}, {r379}, {r380}, {r380, r381}, {}, {}, {}, {}, {}, {}, {}, {0x0, r381}, {}, {}, {}, {r380}, {}, {}, {r380}, {r380}, {}, {}, {}, {0x0, r381}, {}, {r379, r381}, {r379}, {}, {}, {0x0, r381}, {}, {r380, r381}, {r379}, {0x0, r381}, {}, {}, {r379, r381}, {r380, r381}, {r380}, {r379, r381}, {}, {}, {r380}, {r379, r381}, {0x0, r381}, {}, {0x0, r381}, {r380}, {r380}, {r379}, {}, {0x0, r381}, {r380}, {0x0, r381}, {}, {}, {}, {r379, r381}], 0x1, "2156816c73038c"}) r389 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r389, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) 10:19:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000022000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1099.200413][ T445] loop5: detected capacity change from 0 to 512 [ 1099.218267][ T449] loop4: detected capacity change from 0 to 512 [ 1099.232662][ T445] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1099.242885][ T445] EXT4-fs (loop5): group descriptors corrupted! 10:19:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000032000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1099.274992][ T449] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1099.309550][ T463] loop2: detected capacity change from 0 to 264192 [ 1099.332203][ T449] loop4: detected capacity change from 0 to 512 [ 1099.345862][ T445] loop5: detected capacity change from 0 to 512 [ 1099.354703][ T463] msdos filesystem being mounted at /root/syzkaller-testdir156917949/syzkaller.TDnRSM/2059/file1 supports timestamps until 2107 (0x10391447e) [ 1099.356065][ T449] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1099.371532][ T445] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1099.386589][ T445] EXT4-fs (loop5): group descriptors corrupted! 10:19:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000042000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:19:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000600010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:19:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000052000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:19:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000062000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:19:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce00000d0f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) [ 1099.506636][ C1] sd 0:0:1:0: tag#4955 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1099.516589][ C1] sd 0:0:1:0: tag#4955 CDB: opcode=0xe5 (vendor) [ 1099.522922][ C1] sd 0:0:1:0: tag#4955 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1099.531978][ C1] sd 0:0:1:0: tag#4955 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1099.541019][ C1] sd 0:0:1:0: tag#4955 CDB[20]: ba [ 1099.652598][ T501] loop5: detected capacity change from 0 to 512 [ 1099.671310][ T501] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1099.676145][ T506] loop4: detected capacity change from 0 to 512 [ 1099.681511][ T501] EXT4-fs (loop5): group descriptors corrupted! [ 1099.732191][ T506] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1099.742802][ T501] loop5: detected capacity change from 0 to 512 [ 1099.760868][ T501] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1099.771096][ T501] EXT4-fs (loop5): group descriptors corrupted! [ 1099.787448][ T506] loop4: detected capacity change from 0 to 512 [ 1099.794712][ T506] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:19:02 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x401, 0x8, &(0x7f00000008c0)=[{0x0}, {0x0, 0x0, 0x9}, {&(0x7f0000000180)="5030a6b9906c95e36ee1b07f9e5698893307dd91cd0319578b614ed5f1873eb0", 0x20, 0xfffffffffffffffd}, {&(0x7f0000000340)="2df6157d4494279dde2031db3b2744b435271e65a343796db3da0bb347a3215e9b71", 0x22, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f5bf3f90b3d3e7d7132c3012ab7043e22a6f8edc5e516ee833a4fdcf825d9da3fed17cac003d9dd022d", 0xa4, 0x7fffffff}, {&(0x7f0000000500)="822171b91eb1498a4740794c5db7bc7a965f6bf8c7cf5baee0946ad2aa4b016a8a03bb30b092e47cd74a4fab60e1d1443c33c80fa2ef7af6514920209443a39077bb6a856f3c3e40bb7182a08692593ab13f04b516500ed3b3256325f48aafef3d8ca84cdce2b0609ed9c6346c356964614f21f9699436b6ca419197a0729a46ae7ae36fd203e577f2b03891ce7ba975aa5d47214e98c73647d20e757d1ce2d1990688090eee936562a1b4968deb59f6a2980feca28742afcaf376ab51294f57d6334c86538795c11e018be19db248ea75e1", 0xd2, 0x10000}, {&(0x7f0000000600)="4a6006458a4a1e3060e4cca0086f3b44f908e6941741cf7422f159df72a1cdb68c01ef3f102d2afb1e3e446c41bef79e359d62ed3155330d3b2f5207705e6dfa86f4f655d80ee44134bb9211fed0be8f7f86ff1f4b5abab22df6a1bfed2d66e51791fcbbf6f6926ce384fda7a7e86c17dcc2b2473f22c6d095ade56596ee656b3c596a038658b30895170a9ab2d4379f4f58cc6e", 0x94, 0x9}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f0000000980)=ANY=[@ANYBLOB='dots,sys_immutable,nodots,umask=00000000000000000000000,measure,appraise,fsmagic=0x0000000000000200,context=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB="2af81a64c9c4a95af0594052e39f4ebe2c657769643d", @ANYRESDEC, @ANYBLOB=',seclabel,\x00']) openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f80)={0x1, &(0x7f0000000f40)=[{0x7f}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000fc0), 0xc, &(0x7f0000000200)={&(0x7f0000003940)=ANY=[@ANYRES64=r7, @ANYRESHEX, @ANYRES32=r6, @ANYRESOCT=r3, @ANYRESOCT=r4, @ANYBLOB="16de71cf0766d82ab6b67f0cd79e8e3ee2643e2e5026c3ea1ccfde1fe0912ca09bb447092b0b62871d5ab9b62bc1121905ff995d268176192bba6bbfe4ff322f3370ce1ac7b5dd004a38de507070dc0002cfe8ca03a81158f62018fe98245631fc021061fec067e33a1c01f786dafad477a72fcf767c43d28917995da3bd4df41908d180cd9517f24d97f14674a9a15bb602dca6587204d6571e02a456eb415ea3208e6afe4ed4f3533d7cf074ed43d702d74e242405fadcb9c73dbb590bb430b5469199f50fc03776db2d2355da18dc0800f66109473f3531c01f000000"], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x40025) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r10, r9, 0x0, 0x100000002) 10:19:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000072000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:19:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce00000e0f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:19:02 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {}, {r5}, {}, {r5}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {r4}, {}, {}, {}, {r4, r6}, {r5}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {r4}, {}, {0x0, r6}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {0x0, r6}, {}, {r2, r6}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {}, {r5}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {}, {}, {r4}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {}, {r1}, {0x0, r6}, {r4}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {r5}, {}, {}, {r5}, {r5}, {}, {}, {}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {}, {r5, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5, r6}, {r5}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4, r6}], 0x1, "2156816c73038c"}) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) 10:19:02 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) open(&(0x7f0000000100)='./file1\x00', 0x101001, 0xf9) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0) connect$netlink(r4, 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r4, 0x40086607, &(0x7f0000000100)=0x81) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000280)={0x53, 0xffffffffffffffff, 0x1000, 0x8, @buffer={0x0, 0x66, &(0x7f0000000180)=""/102}, &(0x7f0000000a40)="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", &(0x7f0000001a40)=""/4096, 0xc6, 0x10010, 0x2, &(0x7f0000000240)}) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r7}, {}, {r6}, {r6}, {r6}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {r5, r7}, {0x0, r7}, {}, {r6, r7}, {0x0, r7}, {}, {}, {}, {0x0, r7}, {}, {0x0, r7}, {0x0, r7}, {}, {}, {}, {}, {r5}, {0x0, r7}, {}, {}, {r5, r7}, {r6}, {}, {0x0, r7}, {r6, r7}, {0x0, r7}, {r5}, {}, {0x0, r7}, {r6}, {}, {}, {r6}, {0x0, r7}, {}, {0x0, r7}, {}, {r2, r7}, {0x0, r7}, {r5}, {}, {r6}, {r5}, {}, {r6}, {}, {0x0, r7}, {0x0, r7}, {}, {}, {r6}, {0x0, r7}, {0x0, r7}, {0x0, r7}, {r6}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {0x0, r7}, {r5}, {0x0, r7}, {}, {}, {r5, r7}, {}, {}, {}, {}, {}, {}, {}, {r6}, {0x0, r7}, {0x0, r7}, {r5}, {r6, r7}, {0x0, r7}, {0x0, r7}, {}, {}, {}, {r5}, {0x0, r7}, {}, {0x0, r7}, {0x0, r7}, {0x0, r7}, {r6, r7}, {r5, r7}, {r6}, {}, {r5, r7}, {r5}, {}, {}, {r5}, {}, {}, {}, {0x0, r7}, {0x0, r7}, {0x0, r7}, {0x0, r7}, {}, {}, {r5, r7}, {0x0, r7}, {0x0, r7}, {r5, r7}, {0x0, r7}, {}, {}, {r6}, {}, {r1}, {0x0, r7}, {r5}, {}, {r6}, {}, {}, {r6}, {0x0, r7}, {0x0, r7}, {}, {0x0, r7}, {}, {0x0, r7}, {}, {r5}, {}, {}, {}, {0x0, r7}, {r5, r7}, {r6}, {}, {}, {}, {r6}, {}, {}, {}, {r5}, {r5}, {}, {r5}, {r6}, {0x0, r7}, {r5}, {}, {r5}, {0x0, r7}, {r6}, {r5, r7}, {0x0, r7}, {}, {0x0, r7}, {}, {}, {0x0, r7}, {r6}, {}, {}, {r5}, {}, {0x0, r7}, {r6, r7}, {0x0, r7}, {0x0, r7}, {}, {}, {0x0, r7}, {r5}, {r6}, {r6, r7}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {r6}, {}, {}, {r6}, {r6}, {}, {}, {}, {0x0, r7}, {}, {r5, r7}, {r5}, {}, {}, {0x0, r7}, {}, {r6, r7}, {r5}, {0x0, r7}, {}, {}, {r5, r7}, {r6, r7}, {r6}, {r5, r7}, {}, {}, {r6}, {r5, r7}, {0x0, r7}, {}, {0x0, r7}, {r6}, {r6}, {r5}, {}, {0x0, r7}, {r6}, {0x0, r7}, {}, {}, {}, {r5, r7}], 0x1, "2156816c73038c"}) r8 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r8, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) 10:19:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f040600010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:19:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000082000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1100.173065][ T533] loop4: detected capacity change from 0 to 512 [ 1100.211958][ T533] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1100.248137][ T544] loop2: detected capacity change from 0 to 264192 [ 1100.257529][ C1] sd 0:0:1:0: tag#4972 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1100.267380][ C1] sd 0:0:1:0: tag#4972 CDB: opcode=0xe5 (vendor) [ 1100.273740][ C1] sd 0:0:1:0: tag#4972 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1100.282942][ C1] sd 0:0:1:0: tag#4972 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1100.291973][ C1] sd 0:0:1:0: tag#4972 CDB[20]: ba 10:19:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000182000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1100.298110][ T544] msdos filesystem being mounted at /root/syzkaller-testdir156917949/syzkaller.TDnRSM/2060/file1 supports timestamps until 2107 (0x10391447e) [ 1100.303801][ T549] loop5: detected capacity change from 0 to 512 [ 1100.330186][ T549] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1100.340381][ T549] EXT4-fs (loop5): group descriptors corrupted! 10:19:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce00000f0f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) [ 1100.358745][ T533] loop4: detected capacity change from 0 to 512 [ 1100.373681][ T533] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1100.377978][ T552] EXT4-fs warning (device sda1): ext4_group_extend:1805: can't shrink FS - resize aborted 10:19:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000000000001c2000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:19:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000700010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) [ 1100.482860][ T576] loop4: detected capacity change from 0 to 512 [ 1100.500759][ T580] loop5: detected capacity change from 0 to 512 [ 1100.522759][ T576] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:19:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000262000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1100.530429][ T580] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1100.540620][ T580] EXT4-fs (loop5): group descriptors corrupted! [ 1100.611223][ T576] loop4: detected capacity change from 0 to 512 [ 1100.620421][ T576] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1100.635320][ T580] loop5: detected capacity change from 0 to 512 [ 1100.650862][ T580] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1100.661043][ T580] EXT4-fs (loop5): group descriptors corrupted! 10:19:03 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x401, 0x8, &(0x7f00000008c0)=[{0x0}, {0x0, 0x0, 0x9}, {&(0x7f0000000180)="5030a6b9906c95e36ee1b07f9e5698893307dd91cd0319578b614ed5f1873eb0", 0x20, 0xfffffffffffffffd}, {&(0x7f0000000340)="2df6157d4494279dde2031db3b2744b435271e65a343796db3da0bb347a3215e9b71", 0x22, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f5bf3f90b3d3e7d7132c3012ab7043e22a6f8edc5e516ee833a4fdcf825d9da3fed17cac003d9dd022d", 0xa4, 0x7fffffff}, {&(0x7f0000000500)="822171b91eb1498a4740794c5db7bc7a965f6bf8c7cf5baee0946ad2aa4b016a8a03bb30b092e47cd74a4fab60e1d1443c33c80fa2ef7af6514920209443a39077bb6a856f3c3e40bb7182a08692593ab13f04b516500ed3b3256325f48aafef3d8ca84cdce2b0609ed9c6346c356964614f21f9699436b6ca419197a0729a46ae7ae36fd203e577f2b03891ce7ba975aa5d47214e98c73647d20e757d1ce2d1990688090eee936562a1b4968deb59f6a2980feca28742afcaf376ab51294f57d6334c86538795c11e018be19db248ea75e1", 0xd2, 0x10000}, {&(0x7f0000000600)="4a6006458a4a1e3060e4cca0086f3b44f908e6941741cf7422f159df72a1cdb68c01ef3f102d2afb1e3e446c41bef79e359d62ed3155330d3b2f5207705e6dfa86f4f655d80ee44134bb9211fed0be8f7f86ff1f4b5abab22df6a1bfed2d66e51791fcbbf6f6926ce384fda7a7e86c17dcc2b2473f22c6d095ade56596ee656b3c596a038658b30895170a9ab2d4379f4f58cc6e", 0x94, 0x9}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f0000000ac0)={[{@dots}, {@fat=@sys_immutable}, {@nodots}, {@fat=@umask}], [{@measure}, {@appraise}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@seclabel}]}) openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f80)={0x1, &(0x7f0000000f40)=[{0x7f}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000280)='./file0\x00', 0x1, 0x4, &(0x7f0000000a00)=[{&(0x7f00000002c0)="3d6c3879d667b5f59b5e396adf3259e91857959c3b81c1919bb79d0ab435195b67617774e3a8e7c200bbfcb69c932bb961d55093f4dd943ad54ba11ecc42dfed1365dd8f1e269ef14a3056f4f4d9a3185a33c79d112ddb34958bbdf94218827b3d531afa736077a273944d45a973f4", 0x6f}, {&(0x7f0000000980)="fb0ae1fd", 0x4, 0x6b}, {&(0x7f00000009c0)="704bf6e39ef49ab44c38e32a76d1", 0xe, 0x9}, {&(0x7f0000000b80)="389714c1ac8f39dfe798488634d24e1c174b383c2aaf487c07a9977caa39930e28cfbb85313eb97f2029f1b2e9b22fa94c943b69eacd312485ae14ffa8f7faa4c497b41c8f2eda76ba87446ab2d808ecc0de5a6fdb7d0b14a8507c2a575d54faaa64e8bb196122bc74d7cedd475568124ea66ed70d3672ddcec9d924af7b673d762d3050279ee989e4f458b771e1e3d00a880c9e6d0f5e114d9548022ce4f80d4109a85367cabcd8e149443ff8753f38452b1696f6248a00ba6dc6d1aac934c8d34d639bdb3b41dc2cfa36528f3869576c6593a0b0f38723762867712f965a9602eb42ebeb558a0883187ed1", 0xec, 0xfc}], 0x1, &(0x7f0000000c80)={[{@dots}], [{@permit_directio}, {@func={'func', 0x3d, 'MODULE_CHECK'}}, {@obj_type={'obj_type', 0x3d, 'umask'}}, {@hash}]}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000fc0), 0xc, &(0x7f0000000200)={&(0x7f0000003940)=ANY=[@ANYRES64=r7, @ANYRESHEX, @ANYRES32=r6, @ANYRESOCT=r3, @ANYRESOCT=r4, @ANYBLOB="16de71cf0766d82ab6b67f0cd79e8e3ee2643e2e5026c3ea1ccfde1fe0912c50f4450c9c7749b181ae244aa09bb447092b0b62871d5ab9b62bc1121905ff995d268176192bba6bbfe4ff322f3370ce1ac7b5dd004238de507070dc0002cfe8ca03a81158f62018fe98245631fc021061fec067e33a1c01f786dafad477a72fcf767c43d28917995da3bd4df41908d180cd9517f24d97f14674a9a15bb602dca6587204d6571e02a456eb415ea3208e6afe4ed4f3533d7cf074ed4bd702d74e242405fadcd0c73dbb590bb430b54691990800f66109473f3531c01f00"/234], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x40025) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r10, r9, 0x0, 0x100000002) 10:19:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000fe2000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:19:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce0004100f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) [ 1100.858504][ T612] loop4: detected capacity change from 0 to 512 [ 1100.877305][ T612] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1100.921384][ T612] loop4: detected capacity change from 0 to 512 [ 1100.930114][ T612] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1100.955615][ C0] sd 0:0:1:0: tag#4969 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1100.965495][ C0] sd 0:0:1:0: tag#4969 CDB: opcode=0xe5 (vendor) [ 1100.971836][ C0] sd 0:0:1:0: tag#4969 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1100.981193][ C0] sd 0:0:1:0: tag#4969 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1100.990238][ C0] sd 0:0:1:0: tag#4969 CDB[20]: ba [ 1101.033286][ T612] ================================================================== [ 1101.041379][ T612] BUG: KCSAN: data-race in __lru_add_drain_all / lru_cache_add [ 1101.048974][ T612] [ 1101.051293][ T612] write to 0xffff888237c22528 of 1 bytes by task 570 on cpu 0: [ 1101.059176][ T612] lru_cache_add+0x75/0x150 [ 1101.063686][ T612] add_to_page_cache_lru+0x150/0x1b0 [ 1101.068979][ T612] pagecache_get_page+0x6ad/0x910 [ 1101.074094][ T612] grab_cache_page_write_begin+0x3f/0x70 [ 1101.079733][ T612] ext4_da_write_begin+0x2f9/0x7f0 [ 1101.084941][ T612] generic_perform_write+0x1b8/0x3e0 [ 1101.090231][ T612] ext4_buffered_write_iter+0x305/0x400 [ 1101.095774][ T612] ext4_file_write_iter+0x2e7/0x11f0 [ 1101.101142][ T612] do_iter_readv_writev+0x2de/0x380 [ 1101.106348][ T612] do_iter_write+0x192/0x5c0 [ 1101.110938][ T612] vfs_iter_write+0x4c/0x70 [ 1101.115444][ T612] iter_file_splice_write+0x43a/0x790 [ 1101.120831][ T612] direct_splice_actor+0x80/0xa0 [ 1101.125766][ T612] splice_direct_to_actor+0x345/0x650 [ 1101.131147][ T612] do_splice_direct+0x106/0x190 [ 1101.135994][ T612] do_sendfile+0x63e/0xbb0 [ 1101.140409][ T612] __x64_sys_sendfile64+0x102/0x140 [ 1101.145604][ T612] do_syscall_64+0x44/0xa0 [ 1101.150018][ T612] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1101.155916][ T612] [ 1101.158229][ T612] read to 0xffff888237c22528 of 1 bytes by task 612 on cpu 1: [ 1101.165673][ T612] __lru_add_drain_all+0x12c/0x3e0 [ 1101.170798][ T612] lru_add_drain_all+0xc/0x10 [ 1101.175472][ T612] invalidate_bdev+0x56/0x80 [ 1101.180064][ T612] __loop_clr_fd+0x521/0x850 [ 1101.184652][ T612] lo_ioctl+0xac5/0x13e0 [ 1101.188894][ T612] blkdev_ioctl+0x1d0/0x3f0 [ 1101.193397][ T612] block_ioctl+0x6e/0x80 [ 1101.197632][ T612] __se_sys_ioctl+0xcb/0x140 [ 1101.202214][ T612] __x64_sys_ioctl+0x3f/0x50 [ 1101.206797][ T612] do_syscall_64+0x44/0xa0 [ 1101.211218][ T612] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1101.217119][ T612] [ 1101.219429][ T612] value changed: 0x0e -> 0x01 [ 1101.224099][ T612] [ 1101.226407][ T612] Reported by Kernel Concurrency Sanitizer on: [ 1101.232557][ T612] CPU: 1 PID: 612 Comm: syz-executor.4 Not tainted 5.15.0-rc2-syzkaller #0 [ 1101.241237][ T612] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1101.251289][ T612] ================================================================== 10:19:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000900010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:19:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000003000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:19:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce0020100f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:19:03 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {}, {r5}, {}, {r5}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {r4}, {}, {}, {}, {r4, r6}, {r5}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {r4}, {}, {0x0, r6}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {0x0, r6}, {}, {r2, r6}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {}, {r5}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {}, {}, {r4}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {}, {r1}, {0x0, r6}, {r4}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {r5}, {}, {}, {r5}, {r5}, {}, {}, {}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {}, {r5, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5, r6}, {r5}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4, r6}], 0x1, "2156816c73038c"}) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) [ 1101.321390][ T634] loop5: detected capacity change from 0 to 512 [ 1101.324386][ T633] EXT4-fs warning (device sda1): ext4_group_extend:1805: can't shrink FS - resize aborted [ 1101.345295][ T634] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1101.355433][ T634] EXT4-fs (loop5): group descriptors corrupted! [ 1101.390431][ T634] loop5: detected capacity change from 0 to 512 [ 1101.404860][ T634] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1101.415015][ T634] EXT4-fs (loop5): group descriptors corrupted! [ 1101.427106][ T650] loop2: detected capacity change from 0 to 264192 10:19:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000006000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1101.436398][ T653] loop4: detected capacity change from 0 to 512 [ 1101.458393][ T650] msdos filesystem being mounted at /root/syzkaller-testdir156917949/syzkaller.TDnRSM/2061/file1 supports timestamps until 2107 (0x10391447e) [ 1101.479180][ T653] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:19:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000a00010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) [ 1101.523044][ T653] loop4: detected capacity change from 0 to 512 [ 1101.538394][ T653] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:19:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000000a00000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:19:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000b00010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:19:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce0000110f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) [ 1101.568266][ T671] loop5: detected capacity change from 0 to 512 [ 1101.577252][ T671] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1101.587486][ T671] EXT4-fs (loop5): group descriptors corrupted! [ 1101.659413][ T684] loop4: detected capacity change from 0 to 512 [ 1101.668490][ T685] loop5: detected capacity change from 0 to 512 [ 1101.693737][ T684] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:19:04 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x401, 0x8, &(0x7f00000008c0)=[{0x0}, {0x0, 0x0, 0x9}, {&(0x7f0000000180)="5030a6b9906c95e36ee1b07f9e5698893307dd91cd0319578b614ed5f1873eb0", 0x20, 0xfffffffffffffffd}, {&(0x7f0000000340)="2df6157d4494279dde2031db3b2744b435271e65a343796db3da0bb347a3215e9b71", 0x22, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f5bf3f90b3d3e7d7132c3012ab7043e22a6f8edc5e516ee833a4fdcf825d9da3fed17cac003d9dd022d", 0xa4, 0x7fffffff}, {&(0x7f0000000500)="822171b91eb1498a4740794c5db7bc7a965f6bf8c7cf5baee0946ad2aa4b016a8a03bb30b092e47cd74a4fab60e1d1443c33c80fa2ef7af6514920209443a39077bb6a856f3c3e40bb7182a08692593ab13f04b516500ed3b3256325f48aafef3d8ca84cdce2b0609ed9c6346c356964614f21f9699436b6ca419197a0729a46ae7ae36fd203e577f2b03891ce7ba975aa5d47214e98c73647d20e757d1ce2d1990688090eee936562a1b4968deb59f6a2980feca28742afcaf376ab51294f57d6334c86538795c11e018be19db248ea75e1", 0xd2, 0x10000}, {&(0x7f0000000600)="4a6006458a4a1e3060e4cca0086f3b44f908e6941741cf7422f159df72a1cdb68c01ef3f102d2afb1e3e446c41bef79e359d62ed3155330d3b2f5207705e6dfa86f4f655d80ee44134bb9211fed0be8f7f86ff1f4b5abab22df6a1bfed2d66e51791fcbbf6f6926ce384fda7a7e86c17dcc2b2473f22c6d095ade56596ee656b3c596a038658b30895170a9ab2d4379f4f58cc6e", 0x94, 0x9}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f0000000280)=ANY=[@ANYBLOB='dots,sys_immutable,nodots,umask=00000000000000000000000,measure,appraise,fsmagic=0x0000000000000200,context=sysadm_u,fowner>', @ANYRESDEC, @ANYBLOB="34c1113226694f568af4", @ANYRESDEC, @ANYBLOB=',seclabel,\x00']) openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f80)={0x1, &(0x7f0000000f40)=[{0x7f}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000fc0), 0xc, &(0x7f0000000200)={&(0x7f0000003940)=ANY=[@ANYRES64=r7, @ANYRESHEX, @ANYRES32=r6, @ANYRESOCT=r3, @ANYRESOCT=r4, @ANYBLOB="16de71cf0766d82ab6b67f0cd79e8e3ee2643e2e5026c3ea1ccfde1fe0912c50f4450c9c7749b181ae244aa09bb447092b0b62871d5ab9b62bc1121905ff995d268176192bba6bbfe4ff322f3370ce1ac7b5dd004238de507070dc0002cfe8ca03a81158f62018fe98245631fc021061fec067e33a1c01f786dafad477a72fcf767c43d28917995da3bd4df41908d180cd9517f24d97f14674a9a15bb602dca6587204d6571e02a456eb415ea3208e6afe4ed4f3533d7cf074ed4bd702d74e242405fadcd0c73dbb590bb430b54691990800f66109473f3531c01f00"/234], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x40025) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r10, r9, 0x0, 0x100000002) [ 1101.705600][ T685] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1101.715712][ T685] EXT4-fs (loop5): group descriptors corrupted! [ 1101.728391][ T684] loop4: detected capacity change from 0 to 512 [ 1101.747070][ T684] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:19:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000000b00000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:19:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000c00010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:19:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce0000120f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:19:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000000c00000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1101.843734][ T708] loop5: detected capacity change from 0 to 512 [ 1101.868332][ T713] loop4: detected capacity change from 0 to 512 [ 1101.886263][ T708] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1101.896701][ T708] EXT4-fs (loop5): group descriptors corrupted! [ 1101.908177][ T713] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1101.911250][ C1] sd 0:0:1:0: tag#4967 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1101.925409][ C1] sd 0:0:1:0: tag#4967 CDB: opcode=0xe5 (vendor) [ 1101.931727][ C1] sd 0:0:1:0: tag#4967 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c 10:19:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000003000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1101.940781][ C1] sd 0:0:1:0: tag#4967 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1101.949916][ C1] sd 0:0:1:0: tag#4967 CDB[20]: ba 10:19:04 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {}, {r5}, {}, {r5}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {r4, r6}, {r5}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {r4}, {}, {0x0, r6}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {0x0, r6}, {}, {r2, r6}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {}, {r5}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {}, {}, {r4}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {}, {r1}, {0x0, r6}, {r4}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {r5}, {}, {}, {r5}, {r5}, {}, {}, {}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {}, {r5, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5, r6}, {r5}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4, r6}], 0x1, "2156816c73038c"}) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) 10:19:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000000000000000000200000000a000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1102.037345][ T708] loop5: detected capacity change from 0 to 512 [ 1102.043847][ T713] loop4: detected capacity change from 0 to 512 [ 1102.053266][ T708] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1102.059772][ T713] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1102.063409][ T708] EXT4-fs (loop5): group descriptors corrupted! 10:19:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000d00010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:19:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce0000140f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:19:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000000000000000000200000000b000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1102.192604][ T747] loop5: detected capacity change from 0 to 512 [ 1102.206075][ T750] loop4: detected capacity change from 0 to 512 [ 1102.221621][ T747] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1102.231808][ T747] EXT4-fs (loop5): group descriptors corrupted! 10:19:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000000000000000000200000000c000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1102.256813][ T750] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1102.280976][ T760] loop2: detected capacity change from 0 to 264192 [ 1102.332625][ T747] loop5: detected capacity change from 0 to 512 [ 1102.339316][ T750] loop4: detected capacity change from 0 to 512 [ 1102.342565][ T747] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1102.355644][ T747] EXT4-fs (loop5): group descriptors corrupted! [ 1102.362525][ T750] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1102.371167][ T760] msdos filesystem being mounted at /root/syzkaller-testdir156917949/syzkaller.TDnRSM/2062/file1 supports timestamps until 2107 (0x10391447e) 10:19:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000e00010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:19:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002002000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:19:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce0000200f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) [ 1102.576713][ T788] loop5: detected capacity change from 0 to 512 [ 1102.603303][ T788] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1102.613498][ T788] EXT4-fs (loop5): group descriptors corrupted! 10:19:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002003000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1102.629953][ T795] loop4: detected capacity change from 0 to 512 [ 1102.665396][ T795] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1102.674988][ T788] loop5: detected capacity change from 0 to 512 [ 1102.687595][ T788] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1102.697699][ T788] EXT4-fs (loop5): group descriptors corrupted! 10:19:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002004000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:19:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000f00010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) [ 1102.740548][ T795] loop4: detected capacity change from 0 to 512 [ 1102.754838][ T795] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1102.828878][ T822] loop5: detected capacity change from 0 to 512 [ 1102.847507][ T822] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1102.857761][ T822] EXT4-fs (loop5): group descriptors corrupted! 10:19:05 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x401, 0x8, &(0x7f00000008c0)=[{0x0}, {0x0, 0x0, 0x9}, {&(0x7f0000000180)="5030a6b9906c95e36ee1b07f9e5698893307dd91cd0319578b614ed5f1873eb0", 0x20, 0xfffffffffffffffd}, {&(0x7f0000000340)="2df6157d4494279dde2031db3b2744b435271e65a343796db3da0bb347a3215e9b71", 0x22, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f5bf3f90b3d3e7d7132c3012ab7043e22a6f8edc5e516ee833a4fdcf825d9da3fed17cac003d9dd022d", 0xa4, 0x7fffffff}, {&(0x7f0000000500)="822171b91eb1498a4740794c5db7bc7a965f6bf8c7cf5baee0946ad2aa4b016a8a03bb30b092e47cd74a4fab60e1d1443c33c80fa2ef7af6514920209443a39077bb6a856f3c3e40bb7182a08692593ab13f04b516500ed3b3256325f48aafef3d8ca84cdce2b0609ed9c6346c356964614f21f9699436b6ca419197a0729a46ae7ae36fd203e577f2b03891ce7ba975aa5d47214e98c73647d20e757d1ce2d1990688090eee936562a1b4968deb59f6a2980feca28742afcaf376ab51294f57d6334c86538795c11e018be19db248ea75e1", 0xd2, 0x10000}, {&(0x7f0000000600)="4a6006458a4a1e3060e4cca0086f3b44f908e6941741cf7422f159df72a1cdb68c01ef3f102d2afb1e3e446c41bef79e359d62ed3155330d3b2f5207705e6dfa86f4f655d80ee44134bb9211fed0be8f7f86ff1f4b5abab22df6a1bfed2d66e51791fcbbf6f6926ce384fda7a7e86c17dcc2b2473f22c6d095ade56596ee656b3c596a038658b30895170a9ab2d4379f4f58cc6e", 0x94, 0x9}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f0000000ac0)={[{@dots}, {@fat=@sys_immutable}, {@nodots}, {@fat=@umask}], [{@measure}, {@appraise}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@seclabel}]}) openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000002200)={{0x0, 0x9, 0x2, 0x9, 0x9, 0x2000000, 0x2f3, 0x8000, 0xffffff00, 0x1, 0x5d18, 0x3, 0x3ab6, 0x7fff, 0x1000}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000001200)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "4d00473972fba9"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}], 0x1, "2156816c73038c"}) r8 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f80)={0x1, &(0x7f0000000f40)=[{0x7f}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r8, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000fc0), 0xc, &(0x7f0000000200)={&(0x7f0000003940)=ANY=[@ANYRES64=r10, @ANYRESHEX, @ANYRES32=r9, @ANYRESOCT=r6, @ANYRESOCT=r7, @ANYBLOB="16de71cf0766d82ab6b67f0cd79e8e3ee2643e2e5026c3ea1ccfde1fe0912c50f4450c9c7749b181ae244aa09bb447092b0b62871d5ab9b62bc1121905ff995d268176192bba6bbfe4ff322f3370ce1ac7b5dd004238de507070dc0002cfe8ca03a81158f62018fe98245631fc021061fec067e33a1c01f786dafad477a72fcf767c43d28917995da3bd4df41908d180cd9517f24d97f14674a9a15bb602dca6587204d6571e02a456eb415ea3208e6afe4ed4f3533d7cf074ed4bd702d74e242405fadcd0c73dbb590bb430b54691990800f66109473f3531c01f00"/234], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x40025) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r13 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r13, r12, 0x0, 0x100000002) 10:19:05 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {}, {r5}, {}, {r5}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {r4, r6}, {r5}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {r4}, {}, {0x0, r6}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {0x0, r6}, {}, {r2, r6}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {}, {r5}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {}, {}, {r4}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {}, {r1}, {0x0, r6}, {r4}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {r5}, {}, {}, {r5}, {r5}, {}, {}, {}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {}, {r5, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5, r6}, {r5}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4, r6}], 0x1, "2156816c73038c"}) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) 10:19:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce0010200f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:19:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002005000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1102.903375][ T822] loop5: detected capacity change from 0 to 512 [ 1102.911869][ T822] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1102.922060][ T822] EXT4-fs (loop5): group descriptors corrupted! 10:19:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f041000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:19:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002006000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1102.989376][ T837] loop4: detected capacity change from 0 to 512 [ 1103.027404][ T837] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1103.054805][ C1] sd 0:0:1:0: tag#4960 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1103.054931][ T851] loop2: detected capacity change from 0 to 264192 [ 1103.064767][ C1] sd 0:0:1:0: tag#4960 CDB: opcode=0xe5 (vendor) [ 1103.072179][ T853] loop5: detected capacity change from 0 to 512 [ 1103.077586][ C1] sd 0:0:1:0: tag#4960 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1103.093059][ C1] sd 0:0:1:0: tag#4960 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d 10:19:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002007000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1103.102083][ C1] sd 0:0:1:0: tag#4960 CDB[20]: ba [ 1103.107834][ T853] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1103.117938][ T853] EXT4-fs (loop5): group descriptors corrupted! 10:19:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002008000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1103.237605][ T851] msdos filesystem being mounted at /root/syzkaller-testdir156917949/syzkaller.TDnRSM/2063/file1 supports timestamps until 2107 (0x10391447e) 10:19:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002018000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1103.281429][ T853] loop5: detected capacity change from 0 to 512 [ 1103.289086][ T837] loop4: detected capacity change from 0 to 512 [ 1103.311606][ T853] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1103.321856][ T853] EXT4-fs (loop5): group descriptors corrupted! 10:19:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce0000220f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) [ 1103.328480][ T837] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:19:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f201000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:19:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000000000000000000201c000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1103.432777][ T888] loop4: detected capacity change from 0 to 512 [ 1103.453344][ T888] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:19:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002026000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1103.480909][ T892] loop5: detected capacity change from 0 to 512 [ 1103.507539][ T892] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1103.517651][ T892] EXT4-fs (loop5): group descriptors corrupted! [ 1103.532467][ T888] loop4: detected capacity change from 0 to 512 [ 1103.541989][ T888] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1103.632228][ T892] loop5: detected capacity change from 0 to 512 [ 1103.644458][ T892] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1103.654706][ T892] EXT4-fs (loop5): group descriptors corrupted! 10:19:06 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {}, {r5}, {}, {r5}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {r4, r6}, {r5}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {r4}, {}, {0x0, r6}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {0x0, r6}, {}, {r2, r6}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {}, {r5}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {}, {}, {r4}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {}, {r1}, {0x0, r6}, {r4}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {r5}, {}, {}, {r5}, {r5}, {}, {}, {}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {}, {r5, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5, r6}, {r5}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4, r6}], 0x1, "2156816c73038c"}) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) 10:19:06 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x401, 0x8, &(0x7f00000008c0)=[{0x0}, {0x0, 0x0, 0x9}, {&(0x7f0000000180)="5030a6b9906c95e36ee1b07f9e5698893307dd91cd0319578b614ed5f1873eb0", 0x20, 0xfffffffffffffffd}, {&(0x7f0000000340)="2df6157d4494279dde2031db3b2744b435271e65a343796db3da0bb347a3215e9b71", 0x22, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f5bf3f90b3d3e7d7132c3012ab7043e22a6f8edc5e516ee833a4fdcf825d9da3fed17cac003d9dd022d", 0xa4, 0x7fffffff}, {&(0x7f0000000500)="822171b91eb1498a4740794c5db7bc7a965f6bf8c7cf5baee0946ad2aa4b016a8a03bb30b092e47cd74a4fab60e1d1443c33c80fa2ef7af6514920209443a39077bb6a856f3c3e40bb7182a08692593ab13f04b516500ed3b3256325f48aafef3d8ca84cdce2b0609ed9c6346c356964614f21f9699436b6ca419197a0729a46ae7ae36fd203e577f2b03891ce7ba975aa5d47214e98c73647d20e757d1ce2d1990688090eee936562a1b4968deb59f6a2980feca28742afcaf376ab51294f57d6334c86538795c11e018be19db248ea75e1", 0xd2, 0x10000}, {&(0x7f0000000600)="4a6006458a4a1e3060e4cca0086f3b44f908e6941741cf7422f159df72a1cdb68c01ef3f102d2afb1e3e446c41bef79e359d62ed3155330d3b2f5207705e6dfa86f4f655d80ee44134bb9211fed0be8f7f86ff1f4b5abab22df6a1bfed2d66e51791fcbbf6f6926ce384fda7a7e86c17dcc2b2473f22c6d095ade56596ee656b3c596a038658b30895170a9ab2d4379f4f58cc6e", 0x94, 0x9}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f0000001200)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',euid=', @ANYRESDEC, @ANYBLOB=',seclabel,\x00']) openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f80)={0x1, &(0x7f0000000f40)=[{0x7f}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000fc0), 0xc, &(0x7f0000000200)={&(0x7f0000003940)=ANY=[@ANYRES64=r7, @ANYRESHEX, @ANYRES32=r6, @ANYRESOCT=r3, @ANYRESOCT=r4, @ANYBLOB="16de71cf0766d82ab6b67f0cd79e8e3ee2643e2e5026c3ea1ccfde1fe0912c50f4450c9c7749b181ae244aa09bb447092b0b62871d5ab9b62bc1121905ff995d268176192bba6bbfe4ff322f3370ce1ac7b5dd004238de507070dc0002cfe8ca03a81158f62018fe98245631fc021061fec067e33a1c01f786dafad477a72fcf767c43d28917995da3bd4df41908d180cd9517f24d97f14674a9a15bb602dca6587204d6571e02a456eb415ea3208e6afe4ed4f3533d7cf074ed4bd702d74e242405fadcd0c73dbb590bb430b54691990800f66109473f3531c01f00"/234], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x40025) r9 = dup(0xffffffffffffffff) dup(r9) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r11 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r11, r10, 0x0, 0x100000002) 10:19:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000000000000020fe000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:19:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce0000250f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:19:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f001100010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:19:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002004020020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1103.941006][ T925] loop4: detected capacity change from 0 to 512 [ 1103.961816][ T929] loop5: detected capacity change from 0 to 512 [ 1103.983994][ T925] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1103.998256][ T935] loop2: detected capacity change from 0 to 264192 [ 1104.007293][ T929] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1104.013563][ C1] sd 0:0:1:0: tag#4939 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1104.017412][ T929] EXT4-fs (loop5): group descriptors corrupted! [ 1104.027374][ C1] sd 0:0:1:0: tag#4939 CDB: opcode=0xe5 (vendor) 10:19:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000030020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1104.027395][ C1] sd 0:0:1:0: tag#4939 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1104.049002][ C1] sd 0:0:1:0: tag#4939 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1104.058047][ C1] sd 0:0:1:0: tag#4939 CDB[20]: ba [ 1104.065408][ T935] msdos filesystem being mounted at /root/syzkaller-testdir156917949/syzkaller.TDnRSM/2064/file1 supports timestamps until 2107 (0x10391447e) 10:19:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002002040020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:19:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002006040020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1104.186156][ T929] loop5: detected capacity change from 0 to 512 [ 1104.192711][ T925] loop4: detected capacity change from 0 to 512 [ 1104.202229][ T929] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1104.211059][ T925] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1104.212540][ T929] EXT4-fs (loop5): group descriptors corrupted! 10:19:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce00002e0f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:19:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002080040020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:19:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f001200010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) [ 1104.328248][ T964] loop4: detected capacity change from 0 to 512 [ 1104.357659][ T964] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1104.412651][ T964] loop4: detected capacity change from 0 to 512 [ 1104.422499][ T964] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1104.434814][ T977] loop5: detected capacity change from 0 to 512 [ 1104.468953][ T977] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1104.479327][ T977] EXT4-fs (loop5): group descriptors corrupted! [ 1104.559014][ T977] loop5: detected capacity change from 0 to 512 [ 1104.568087][ T977] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1104.578252][ T977] EXT4-fs (loop5): group descriptors corrupted! 10:19:07 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {}, {r5}, {}, {r5}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {}, {}, {}, {}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {r4}, {}, {0x0, r6}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {0x0, r6}, {}, {r2, r6}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {}, {r5}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {}, {}, {r4}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {}, {r1}, {0x0, r6}, {r4}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {r5}, {}, {}, {r5}, {r5}, {}, {}, {}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {}, {r5, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5, r6}, {r5}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4, r6}], 0x1, "2156816c73038c"}) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) 10:19:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000050020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:19:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce00003f0f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:19:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f001400010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:19:07 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x401, 0x8, &(0x7f00000008c0)=[{0x0}, {0x0, 0x0, 0x9}, {&(0x7f0000000180)="5030a6b9906c95e36ee1b07f9e5698893307dd91cd0319578b614ed5f1873eb0", 0x20, 0xfffffffffffffffd}, {&(0x7f0000000340)="2df6157d4494279dde2031db3b2744b435271e65a343796db3da0bb347a3215e9b71", 0x22, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f5bf3f90b3d3e7d7132c3012ab7043e22a6f8edc5e516ee833a4fdcf825d9da3fed17cac003d9dd022d", 0xa4, 0x7fffffff}, {&(0x7f0000000500)="822171b91eb1498a4740794c5db7bc7a965f6bf8c7cf5baee0946ad2aa4b016a8a03bb30b092e47cd74a4fab60e1d1443c33c80fa2ef7af6514920209443a39077bb6a856f3c3e40bb7182a08692593ab13f04b516500ed3b3256325f48aafef3d8ca84cdce2b0609ed9c6346c356964614f21f9699436b6ca419197a0729a46ae7ae36fd203e577f2b03891ce7ba975aa5d47214e98c73647d20e757d1ce2d1990688090eee936562a1b4968deb59f6a2980feca28742afcaf376ab51294f57d6334c86538795c11e018be19db248ea75e1", 0xd2, 0x10000}, {&(0x7f0000000600)="4a6006458a4a1e3060e4cca0086f3b44f908e6941741cf7422f159df72a1cdb68c01ef3f102d2afb1e3e446c41bef79e359d62ed3155330d3b2f5207705e6dfa86f4f655d80ee44134bb9211fed0be8f7f86ff1f4b5abab22df6a1bfed2d66e51791fcbbf6f6926ce384fda7a7e86c17dcc2b2473f22c6d095ade56596ee656b3c596a038658b30895170a9ab2d4379f4f58cc6e", 0x94, 0x9}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f0000000ac0)={[{@dots}, {@fat=@sys_immutable}, {@nodots}, {@fat=@umask}], [{@measure}, {@appraise}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@seclabel}]}) openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f80)={0x1, &(0x7f0000000f40)=[{0x7f}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000fc0), 0xc, &(0x7f0000000200)={&(0x7f0000003940)=ANY=[@ANYRES64=r7, @ANYRESHEX, @ANYRES32=r6, @ANYRESOCT=r3, @ANYRESOCT=r4, @ANYBLOB="16de71cf0766d82ab6b67f0cd79e8e3ee2643e2e5026c3ea1ccfde1fe0912c50f4450c9c7749b181ae244aa09bb447092b0b62871d5ab9b62bc1121905ff995d268176192bba6bbfe4ff322f3370ce1ac7b5dd004238de507070dc0002cfe8ca03a81158f62018fe98245631fc021061fec067e33a1c01f786dafad477a72fcf767c43d28917995da3bd4df41908d180cd9517f24d97f14674a9a15bb602dca6587204d6571e02a456eb415ea3208e6afe4ed4f3533d7cf074ed4bd702d74e242405fadcd0c73dbb590bb430b54691990800f66109473f3531c01f00"/234], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x40025) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r10, r9, 0x0, 0x100000002) 10:19:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f00000001000000000000000000000000202b050020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1104.856341][ T1006] loop5: detected capacity change from 0 to 512 [ 1104.865910][ T1006] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1104.876067][ T1006] EXT4-fs (loop5): group descriptors corrupted! [ 1104.889069][ T1012] loop4: detected capacity change from 0 to 512 10:19:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000060020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1104.934188][ T1012] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1104.943363][ T1026] loop2: detected capacity change from 0 to 264192 [ 1104.967883][ C0] sd 0:0:1:0: tag#4986 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1104.977736][ C0] sd 0:0:1:0: tag#4986 CDB: opcode=0xe5 (vendor) [ 1104.984639][ C0] sd 0:0:1:0: tag#4986 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1104.993683][ C0] sd 0:0:1:0: tag#4986 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1105.002827][ C0] sd 0:0:1:0: tag#4986 CDB[20]: ba [ 1105.011124][ T1006] loop5: detected capacity change from 0 to 512 [ 1105.022840][ T1006] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! 10:19:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002004060020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1105.033064][ T1006] EXT4-fs (loop5): group descriptors corrupted! [ 1105.047283][ T1012] loop4: detected capacity change from 0 to 512 [ 1105.052625][ T1026] msdos filesystem being mounted at /root/syzkaller-testdir156917949/syzkaller.TDnRSM/2065/file1 supports timestamps until 2107 (0x10391447e) [ 1105.083013][ T1012] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 10:19:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce0000400f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:19:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f021900010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:19:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000070020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1105.203560][ T1061] loop4: detected capacity change from 0 to 512 10:19:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000180020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1105.244011][ T1061] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1105.258695][ T1071] loop5: detected capacity change from 0 to 512 [ 1105.290071][ T1071] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1105.300363][ T1071] EXT4-fs (loop5): group descriptors corrupted! [ 1105.312599][ T1061] loop4: detected capacity change from 0 to 512 [ 1105.328416][ T1061] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1105.391142][ T1071] loop5: detected capacity change from 0 to 512 [ 1105.401339][ T1071] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1105.411481][ T1071] EXT4-fs (loop5): group descriptors corrupted! 10:19:08 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "7e6830ead6b793"}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r6}, {}, {r5}, {}, {r5}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {}, {}, {}, {}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {r4}, {}, {0x0, r6}, {r5}, {}, {}, {r5}, {0x0, r6}, {}, {0x0, r6}, {}, {r2, r6}, {0x0, r6}, {r4}, {}, {r5}, {r4}, {}, {r5}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {r4}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {r4, r6}, {r5}, {}, {r4, r6}, {r4}, {}, {}, {r4}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4, r6}, {0x0, r6}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {}, {r5}, {}, {r1}, {0x0, r6}, {r4}, {}, {r5}, {}, {}, {r5}, {0x0, r6}, {0x0, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r4}, {}, {}, {}, {0x0, r6}, {r4, r6}, {r5}, {}, {}, {}, {r5}, {}, {}, {}, {r4}, {r4}, {}, {r4}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {r5}, {r4, r6}, {}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {}, {r4}, {}, {0x0, r6}, {r5, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {r4}, {r5}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {r5}, {}, {}, {r5}, {r5}, {}, {}, {}, {0x0, r6}, {}, {r4, r6}, {r4}, {}, {}, {0x0, r6}, {}, {r5, r6}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {r5, r6}, {r5}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {0x0, r6}, {}, {0x0, r6}, {r5}, {r5}, {r4}, {}, {0x0, r6}, {r5}, {0x0, r6}, {}, {}, {}, {r4, r6}], 0x1, "2156816c73038c"}) r7 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) 10:19:08 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r3 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x401, 0x8, &(0x7f00000008c0)=[{0x0}, {0x0, 0x0, 0x9}, {&(0x7f0000000180)="5030a6b9906c95e36ee1b07f9e5698893307dd91cd0319578b614ed5f1873eb0", 0x20, 0xfffffffffffffffd}, {&(0x7f0000000340)="2df6157d4494279dde2031db3b2744b435271e65a343796db3da0bb347a3215e9b71", 0x22, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f5bf3f90b3d3e7d7132c3012ab7043e22a6f8edc5e516ee833a4fdcf825d9da3fed17cac003d9dd022d", 0xa4, 0x7fffffff}, {&(0x7f0000000500)="822171b91eb1498a4740794c5db7bc7a965f6bf8c7cf5baee0946ad2aa4b016a8a03bb30b092e47cd74a4fab60e1d1443c33c80fa2ef7af6514920209443a39077bb6a856f3c3e40bb7182a08692593ab13f04b516500ed3b3256325f48aafef3d8ca84cdce2b0609ed9c6346c356964614f21f9699436b6ca419197a0729a46ae7ae36fd203e577f2b03891ce7ba975aa5d47214e98c73647d20e757d1ce2d1990688090eee936562a1b4968deb59f6a2980feca28742afcaf376ab51294f57d6334c86538795c11e018be19db248ea75e1", 0xd2, 0x10000}, {&(0x7f0000000600)="4a6006458a4a1e3060e4cca0086f3b44f908e6941741cf7422f159df72a1cdb68c01ef3f102d2afb1e3e446c41bef79e359d62ed3155330d3b2f5207705e6dfa86f4f655d80ee44134bb9211fed0be8f7f86ff1f4b5abab22df6a1bfed2d66e51791fcbbf6f6926ce384fda7a7e86c17dcc2b2473f22c6d095ade56596ee656b3c596a038658b30895170a9ab2d4379f4f58cc6e", 0x94, 0x9}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f0000000ac0)={[{@dots}, {@fat=@sys_immutable}, {@nodots}, {@fat=@umask}], [{@measure}, {@appraise}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@seclabel}]}) openat(r3, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) r4 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000b80)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r4, 0xd000943e, &(0x7f0000001200)={r6, r5, "7e9040159f6b8882d17377e103c74712a4d3903d6190ecbe9866aa2969eca0f0e057d14de816022faba81e5c6c9ea7cb0d2170eac67f3a4028d92626121ae168b80477c210c84bc5fccb9ed543e1908ca7be250bec6d7f31219835fa7d0e19a208d942db1fd1a57ea450fcdc98ecf87fa948a77c583d8b00d9e8e0ade5dd1e08d82ad289d99cd03119ed85b60c5d347a50e467cf61340da8db8444ed4d78edbe1892f2a480ba438c6ce8cda963b4c9c42181ee175571ab1d3a8294eccd16baf17ee727686ec8d301852bc9b7580d07d257645a4ba0870931a131184a28637c0ec8812752ce24731e7a39fe253ab5a4ecb5845bd97f58e716e8ea9a2fba964dc1", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x1, "2156816c73038c"}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f80)={0x1, &(0x7f0000000f40)=[{0x7f}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000002200)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000fc0), 0xc, &(0x7f0000000200)={&(0x7f0000003940)=ANY=[@ANYRES64=r11, @ANYRESHEX, @ANYRES32=r10, @ANYRESOCT=r8, @ANYRESOCT=r9, @ANYBLOB="16de71cf0766d82ab6b67f0cd79e8e3ee2643e2e5026c3ea1ccfde1fe0912c50f4450c9c7749b181ae244aa09bb447092b0b62871d5ab9b62bc1121905ff995d268176192bba6bbfe4ff322f3370ce1ac7b5dd004238de507070dc0002cfe8ca03a81158f62018fe98245631fc021061fec067e33a1c01f786dafad477a72fcf767c43d28917995da3bd4df41908d180cd9517f24d97f14674a9a15bb602dca6587204d6571e02a456eb415ea3208e6afe4ed4f3533d7cf074ed4bd702d74e242405fadcd0c73dbb590bb430b54691990800f66109473f3531c01f00"/234], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x40025) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r14 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r14, r13, 0x0, 0x100000002) 10:19:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000000000000020001c0020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:19:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce0000480f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:19:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f021a00010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:19:08 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054300)={0x0, [{0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0}, {}, {0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x8, "7e6830ead6b793"}) r193 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r193, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x1f, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf1", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FICLONE(r193, 0x40049409, 0xffffffffffffffff) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r193, 0x81f8943c, &(0x7f0000000840)={0x0, ""/256, 0x0, 0x0}) r197 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r197, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r200}, {0x0, r200}, {r199}, {r199}, {r199, r200}, {}, {}, {0x0, r200}, {}, {r199, r200}, {0x0, r200}, {}, {r198, r200}, {0x0, r200}, {}, {r199, r200}, {0x0, r200}, {}, {}, {}, {0x0, r200}, {r199}, {0x0, r200}, {0x0, r200}, {r199}, {0x0, r200}, {r198}, {}, {r198}, {0x0, r200}, {}, {r199}, {r198, r200}, {r199}, {}, {0x0, r200}, {r199, r200}, {0x0, r200}, {r198, r200}, {}, {0x0, r200}, {}, {}, {0x0, r200}, {r199}, {}, {r199}, {0x0, r200}, {r201}, {0x0, r200}, {0x0, r200}, {r198}, {}, {r199}, {r198}, {}, {0x0, r200}, {}, {}, {0x0, r200}, {0x0, r200}, {0x0, r200}, {}, {0x0, r200}, {0x0, r200}, {}, {r199}, {r198, r200}, {}, {r198}, {}, {}, {0x0, r200}, {}, {r199}, {r198}, {}, {}, {}, {0x0, r200}, {r199}, {}, {}, {0x0, r200}, {r198, r200}, {0x0, r200}, {}, {0x0, r200}, {r198, r200}, {}, {}, {0x0, r200}, {}, {r198}, {0x0, r200}, {}, {r199}, {r198, r200}, {0x0, r200}, {r198}, {r199, r200}, {0x0, r200}, {0x0, r200}, {0x0, r200}, {}, {0x0, r200}, {r198}, {r198, r200}, {}, {0x0, r200}, {r198, r200}, {}, {0x0, r200}, {r198, r200}, {r199}, {}, {r198, r200}, {r198}, {0x0, r200}, {}, {r198}, {r198, r200}, {}, {}, {0x0, r200}, {0x0, r200}, {0x0, r200}, {r199, r200}, {}, {}, {r198, r200}, {0x0, r200}, {r199, r200}, {r198, r200}, {r199, r200}, {0x0, r200}, {}, {r199, r200}, {r199}, {}, {0x0, r200}, {r198}, {0x0, r200}, {r199, r200}, {r198}, {0x0, r200}, {r199, r200}, {0x0, r200}, {0x0, r200}, {}, {0x0, r200}, {r199}, {0x0, r200}, {r199}, {r198}, {}, {}, {}, {0x0, r200}, {}, {r199, r200}, {}, {0x0, r200}, {}, {r199}, {0x0, r200}, {}, {}, {r198}, {}, {0x0, r200}, {r198, r200}, {r199}, {0x0, r200}, {r198}, {0x0, r200}, {r198}, {0x0, r200}, {r199}, {0x0, r200}, {r198, r200}, {0x0, r200}, {0x0, r200}, {}, {}, {0x0, r200}, {r199}, {r198}, {}, {}, {r198}, {0x0, r200}, {0x0, r200}, {0x0, r200}, {r199, r200}, {0x0, r200}, {}, {r199, r200}, {r198, r200}, {r199}, {r199, r200}, {}, {}, {r198}, {}, {r198}, {}, {}, {r198, r200}, {}, {}, {r198, r200}, {r199, r200}, {0x0, r200}, {r198}, {r199}, {r199, r200}, {}, {}, {r199}, {0x0, r200}, {0x0, r200}, {r198, r200}, {r198}, {}, {0x0, r200}, {0x0, r200}, {}, {r199, r200}, {}, {}, {}, {r199, r200}, {r198, r200}, {r199, r200}, {r199}, {r198}, {}, {}, {r199}, {r198, r200}, {0x0, r200}, {0x0, r200}, {}, {}, {r199}, {r198}, {0x0, r200}, {r199}, {r198}, {}, {}, {}, {0x0, r200}, {0x0, r200}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005dc40)={0x0, [{0x0, r82}, {}, {r119}, {r83, r1}, {}, {r134, r78}, {r49}, {r17}, {r77}, {0x0, r22}, {r148}, {0x0, r59}, {r71, r69}, {0x0, r46}, {r170}, {}, {r166}, {r56, r105}, {r36}, {r42, r41}, {0x0, r62}, {}, {}, {0x0, r84}, {r52, r6}, {r63, r184}, {0x0, r120}, {0x0, r41}, {}, {0x0, r164}, {}, {r106}, {0x0, r123}, {r85, r165}, {r101}, {}, {0x0, r136}, {}, {r168, r160}, {r117, r75}, {0x0, r8}, {r154}, {r178, r123}, {}, {0x0, r91}, {}, {0x0, r159}, {}, {0x0, r169}, {}, {}, {r32}, {}, {}, {}, {0x0, r186}, {r148, r125}, {r14, r13}, {r137}, {0x0, r172}, {r124}, {0x0, r142}, {r87}, {}, {0x0, r26}, {r188, r27}, {r17}, {r158}, {}, {0x0, r55}, {r38}, {}, {0x0, r89}, {0x0, r10}, {}, {0x0, r167}, {0x0, r30}, {r37, r62}, {0x0, r29}, {}, {r171}, {r161, r192}, {}, {}, {}, {r45, r46}, {}, {r44}, {}, {0x0, r162}, {r173}, {0x0, r40}, {0x0, r57}, {0x0, r191}, {r133}, {}, {}, {0x0, r11}, {}, {}, {r88}, {0x0, r156}, {r187}, {r149}, {r146}, {r87}, {0x0, r180}, {0x0, r5}, {}, {0x0, r135}, {0x0, r2}, {r73}, {}, {r99, r13}, {r3, r113}, {r9, r151}, {0x0, r176}, {r194}, {r3, r177}, {}, {r38, r111}, {r108}, {r99}, {r72}, {}, {r126}, {r71, r128}, {r132}, {}, {r54}, {r185, r23}, {r20}, {0x0, r10}, {}, {}, {0x0, r43}, {}, {r104}, {0x0, r127}, {r143}, {0x0, r58}, {0x0, r67}, {r110}, {0x0, r109}, {r68}, {}, {r182}, {0x0, r121}, {0x0, r66}, {}, {r50}, {r152}, {r124}, {r183, r118}, {0x0, r7}, {}, {}, {0x0, r145}, {r181, r76}, {0x0, r95}, {r94, r174}, {0x0, r131}, {r110, r180}, {r20}, {r28, r103}, {}, {}, {r65, r189}, {r31, r10}, {r102, r164}, {r112}, {}, {0x0, r130}, {0x0, r26}, {}, {0x0, r160}, {r70}, {r80}, {r25, r179}, {r107, r81}, {r119}, {0x0, r66}, {r175, r135}, {r24, r115}, {}, {0x0, r15}, {r18}, {}, {r138, r53}, {r60}, {r114}, {}, {}, {0x0, r123}, {r93}, {}, {0x0, r141}, {}, {}, {r99, r153}, {0x0, r122}, {0x0, r64}, {0x0, r19}, {r175}, {r39}, {r129}, {r134}, {0x0, r97}, {}, {r163, r144}, {}, {r47}, {r137}, {0x0, r66}, {0x0, r139}, {}, {}, {r116}, {0x0, r86}, {r90, r48}, {}, {0x0, r35}, {r79}, {r140}, {r92}, {0x0, r98}, {0x0, r150}, {}, {}, {0x0, r113}, {r148, r157}, {}, {}, {r148, r33}, {r61}, {r190, r122}, {}, {r124, r59}, {0x0, r95}, {0x0, r160}, {r12, r64}, {}, {}, {}, {r4}, {}, {r34, r48}, {0x0, r141}, {}, {}, {r181, r147}, {r21, r96}, {}, {r201, r51}, {r155, r118}], 0x81, "872533ce69e89e"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, r196}, {}, {r195}, {r195}, {r74}, {}, {}, {0x0, r196}, {}, {}, {}, {}, {r194, r196}, {0x0, r196}, {}, {r195, r196}, {0x0, r196}, {}, {}, {}, {0x0, r196}, {}, {0x0, r196}, {0x0, r196}, {}, {}, {}, {}, {r194}, {0x0, r196}, {}, {}, {r194, r196}, {r195}, {}, {0x0, r196}, {r195, r196}, {0x0, r196}, {r194}, {}, {0x0, r196}, {r195}, {}, {}, {r195}, {0x0, r196}, {}, {0x0, r196}, {}, {r90, r196}, {0x0, r196}, {r194}, {}, {r195}, {r194}, {}, {r195}, {}, {0x0, r196}, {0x0, r196}, {}, {}, {r195}, {0x0, r196}, {0x0, r196}, {0x0, r196}, {r195}, {0x0, r196}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r196}, {}, {}, {}, {0x0, r196}, {r194}, {0x0, r196}, {}, {}, {r194, r196}, {}, {}, {}, {}, {}, {}, {}, {r195}, {0x0, r196}, {0x0, r196}, {r194}, {r195, r196}, {0x0, r196}, {0x0, r196}, {}, {}, {}, {r194}, {0x0, r196}, {}, {0x0, r196}, {0x0, r196}, {0x0, r196}, {r195, r196}, {r194, r196}, {r195}, {}, {r194, r196}, {}, {}, {}, {r194}, {}, {}, {}, {0x0, r196}, {0x0, r196}, {0x0, r196}, {0x0, r196}, {}, {}, {r194, r196}, {0x0, r196}, {0x0, r196}, {r194, r196}, {0x0, r196}, {}, {}, {r195}, {}, {r16}, {0x0, r196}, {r194}, {}, {r195}, {}, {}, {r195}, {0x0, r196}, {0x0, r196}, {}, {0x0, r196}, {}, {0x0, r196}, {}, {r194}, {}, {}, {}, {0x0, r196}, {r194, r196}, {r195}, {}, {}, {}, {r195}, {}, {}, {}, {r194}, {r194}, {}, {r194}, {r195}, {0x0, r196}, {r194}, {}, {r194}, {0x0, r196}, {r195}, {r194, r196}, {0x0, r196}, {}, {0x0, r196}, {}, {}, {0x0, r196}, {r195}, {}, {}, {r194}, {}, {0x0, r196}, {r195, r196}, {}, {0x0, r196}, {}, {}, {0x0, r196}, {r194}, {r195}, {r195, r196}, {}, {}, {}, {}, {}, {}, {}, {0x0, r196}, {}, {}, {}, {r195}, {}, {}, {r195}, {r195}, {}, {}, {}, {0x0, r100}, {}, {r194, r196}, {r194}, {}, {}, {0x0, r196}, {}, {r195, r196}, {r194}, {0x0, r196}, {}, {}, {r194, r196}, {r195, r196}, {r195}, {r194, r196}, {}, {}, {r195}, {r194, r196}, {0x0, r196}, {}, {0x0, r196}, {r195}, {r195}, {r194}, {}, {0x0, r196}, {r195}, {0x0, r196}, {}, {}, {}, {r194, r196}], 0x1, "2156816c73038c"}) r202 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r0, r202, 0x0, 0x8400fffffffa) open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) [ 1105.840685][ T1109] loop5: detected capacity change from 0 to 512 [ 1105.875089][ T1109] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! 10:19:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000200020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1105.885637][ T1109] EXT4-fs (loop5): group descriptors corrupted! [ 1105.892268][ T1129] loop4: detected capacity change from 0 to 512 [ 1105.929382][ C0] sd 0:0:1:0: tag#4971 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s 10:19:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000260020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1105.930199][ T1129] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1105.939299][ C0] sd 0:0:1:0: tag#4971 CDB: opcode=0xe5 (vendor) [ 1105.952870][ C0] sd 0:0:1:0: tag#4971 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1105.953394][ T1138] loop2: detected capacity change from 0 to 264192 [ 1105.962013][ C0] sd 0:0:1:0: tag#4971 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1105.977546][ C0] sd 0:0:1:0: tag#4971 CDB[20]: ba 10:19:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000000000000020052b0020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:19:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f0000000100000000000000000000000020003f0020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1106.123532][ T1138] msdos filesystem being mounted at /root/syzkaller-testdir156917949/syzkaller.TDnRSM/2066/file1 supports timestamps until 2107 (0x10391447e) [ 1106.140316][ T1109] loop5: detected capacity change from 0 to 512 [ 1106.153985][ T1109] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1106.154349][ T1129] loop4: detected capacity change from 0 to 512 10:19:08 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x24800, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x401, 0x8, &(0x7f00000008c0)=[{0x0}, {0x0, 0x0, 0x9}, {&(0x7f0000000180)="5030a6b9906c95e36ee1b07f9e5698893307dd91cd0319578b614ed5f1873eb0", 0x20, 0xfffffffffffffffd}, {&(0x7f0000000340)="2df6157d4494279dde2031db3b2744b435271e65a343796db3da0bb347a3215e9b71", 0x22, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f5bf3f90b3d3e7d7132c3012ab7043e22a6f8edc5e516ee833a4fdcf825d9da3fed17cac003d9dd022d", 0xa4, 0x7fffffff}, {&(0x7f0000000500)="822171b91eb1498a4740794c5db7bc7a965f6bf8c7cf5baee0946ad2aa4b016a8a03bb30b092e47cd74a4fab60e1d1443c33c80fa2ef7af6514920209443a39077bb6a856f3c3e40bb7182a08692593ab13f04b516500ed3b3256325f48aafef3d8ca84cdce2b0609ed9c6346c356964614f21f9699436b6ca419197a0729a46ae7ae36fd203e577f2b03891ce7ba975aa5d47214e98c73647d20e757d1ce2d1990688090eee936562a1b4968deb59f6a2980feca28742afcaf376ab51294f57d6334c86538795c11e018be19db248ea75e1", 0xd2, 0x10000}, {&(0x7f0000000600)="4a6006458a4a1e3060e4cca0086f3b44f908e6941741cf7422f159df72a1cdb68c01ef3f102d2afb1e3e446c41bef79e359d62ed3155330d3b2f5207705e6dfa86f4f655d80ee44134bb9211fed0be8f7f86ff1f4b5abab22df6a1bfed2d66e51791fcbbf6f6926ce384fda7a7e86c17dcc2b2473f22c6d095ade56596ee656b3c596a038658b30895170a9ab2d4379f4f58cc6e", 0x94, 0x9}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f0000000ac0)={[{@dots}, {@fat=@sys_immutable}, {@nodots}, {@fat=@umask}], [{@measure}, {@appraise}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@seclabel}]}) r3 = openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) r4 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) r7 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000f80)={0x1, &(0x7f0000000f40)=[{0x7f}]}) futimesat(r3, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)={{0x77359400}, {0x0, 0x2710}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r7, 0x81f8943c, &(0x7f0000001000)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000fc0), 0xc, &(0x7f0000000200)={&(0x7f0000003940)=ANY=[@ANYRES64=r9, @ANYRESHEX, @ANYRES32=r8, @ANYRESOCT=r5, @ANYRESOCT=r6, @ANYBLOB="16de71cf0766d82ab6b67f0cd79e8e3ee2643e2e5026c3ea1ccfde1fe0912c50f4450c9c7749b181ae204aa09bb447092b0b62871d5ab9b62bc11219269176192bba6bbfe4ff322f3370ce1ac7b5dd004238de507070dc0002cfe8ca03a81158f6b9201801f786dafad477a72fcf767c43d28917995da3bd4df41908d180cd9517f24d97f10674a9a15bb602dca6587204d6571e02a456eb415ea3208e6afe4ed4f3533d7cf074ed4bd702d74e242405fadcd0c73dbb590bb430b54691990800f66109473f3531c01f0000000000ffff00"/234], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x40025) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r12 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r12, r11, 0x0, 0x100000002) [ 1106.164094][ T1109] EXT4-fs (loop5): group descriptors corrupted! 10:19:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000400020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) [ 1106.216814][ T1129] EXT4-fs (loop4): inodes count not valid: 301989920 vs 32 [ 1106.298598][ C1] sd 0:0:1:0: tag#4936 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1106.308464][ C1] sd 0:0:1:0: tag#4936 CDB: opcode=0xe5 (vendor) [ 1106.314838][ C1] sd 0:0:1:0: tag#4936 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1106.323875][ C1] sd 0:0:1:0: tag#4936 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1106.332916][ C1] sd 0:0:1:0: tag#4936 CDB[20]: ba 10:19:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f002000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:19:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000012000100000c000000ce00004c0f000000010000000000000000000000002000000020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 10:19:09 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002004800020000020000000ddf4655fddf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="03", 0x1, 0x800}], 0x0, &(0x7f0000013800)) 10:19:09 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x7f, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x100, 0x0}) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x401, 0x8, &(0x7f00000008c0)=[{0x0}, {0x0, 0x0, 0x9}, {&(0x7f0000000180)="5030a6b9906c95e36ee1b07f9e5698893307dd91cd0319578b614ed5f1873eb0", 0x20, 0xfffffffffffffffd}, {&(0x7f0000000340)="2df6157d4494279dde2031db3b2744b435271e65a343796db3da0bb347a3215e9b71", 0x22, 0xfff}, {&(0x7f0000000440)="6bf5fb5690171db19af4609036c9bcfd829f57e603790010ced4fc977b6a29821a1448f42739bb113f3c3565af9334acda9bd400f4326ea61c9f4c1b419bf978701a48f8addca5b3168c8b9dfcd0534bfc9c30ae3b5db3f19fd53cb4bf54da7733aed461592ee917aa10b147cc0adccfaeeac9357f78d4b76f078f5bf3f90b3d3e7d7132c3012ab7043e22a6f8edc5e516ee833a4fdcf825d9da3fed17cac003d9dd022d", 0xa4, 0x7fffffff}, {&(0x7f0000000500)="822171b91eb1498a4740794c5db7bc7a965f6bf8c7cf5baee0946ad2aa4b016a8a03bb30b092e47cd74a4fab60e1d1443c33c80fa2ef7af6514920209443a39077bb6a856f3c3e40bb7182a08692593ab13f04b516500ed3b3256325f48aafef3d8ca84cdce2b0609ed9c6346c356964614f21f9699436b6ca419197a0729a46ae7ae36fd203e577f2b03891ce7ba975aa5d47214e98c73647d20e757d1ce2d1990688090eee936562a1b4968deb59f6a2980feca28742afcaf376ab51294f57d6334c86538795c11e018be19db248ea75e1", 0xd2, 0x10000}, {&(0x7f0000000600)="4a6006458a4a1e3060e4cca0086f3b44f908e6941741cf7422f159df72a1cdb68c01ef3f102d2afb1e3e446c41bef79e359d62ed3155330d3b2f5207705e6dfa86f4f655d80ee44134bb9211fed0be8f7f86ff1f4b5abab22df6a1bfed2d66e51791fcbbf6f6926ce384fda7a7e86c17dcc2b2473f22c6d095ade56596ee656b3c596a038658b30895170a9ab2d4379f4f58cc6e", 0x94, 0x9}, {0x0, 0x0, 0x7}], 0x10000, &(0x7f0000000ac0)={[{@dots}, {@fat=@sys_immutable}, {@nodots}, {@fat=@umask}], [{@measure}, {@appraise}, {@fsmagic={'fsmagic', 0x3d, 0x200}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@seclabel}]}) openat(r2, &(0x7f0000000a80)='./file0\x00', 0x80000, 0x20) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}