e0\x00', &(0x7f00000000c0)='bpf\x00', 0x2102040, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0x8000000000007}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x2445}}, {@mode={'mode', 0x3d, 0x20}}, {@mode={'mode'}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode'}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x9}}], [{@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}) creat(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) 07:02:52 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x10080, 0x0) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e24, @rand_addr=0x64010100}}}, 0x84) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_CQM(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000100)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010000000000000000003f00000008000300", @ANYRES32=r4, @ANYBLOB="0c005e8008000500000045e4935e643aef6dc56bffb5580000"], 0x28}}, 0x0) [ 771.847802][T29044] loop0: detected capacity change from 1024 to 0 [ 771.876282][T29043] loop4: detected capacity change from 1024 to 0 [ 771.921638][T29051] loop1: detected capacity change from 1024 to 0 07:02:52 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x58248}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x400, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB="000000d964000000001f000031455bb92be4111fe212e1c3560000000000000000", @ANYRESHEX, @ANYBLOB="2c6f626a5f757365723d6370752ae86c772c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',fowner<', @ANYRESDEC=0xee01, @ANYBLOB=',subj_user=,subj_role=ip6gre\x00,\x00']) r2 = socket(0x10, 0x803, 0x0) mknod$loop(&(0x7f0000000380)='./file0\x00', 0xc000, 0x1) syz_mount_image$nilfs2(&(0x7f0000000080)='nilfs2\x00', &(0x7f0000000280)='./file0\x00', 0x100, 0x2, &(0x7f0000000640)=[{&(0x7f0000000440)="0d26a95a26f75003b69880711e882aaec40a66ab99a3171c3a004625382d54ea0074c2b9461135ca9b444f93fcb8dc25e7fb11527a57dd47aabaacd7f12e48051bd70cc4b4cf51fe8a51478c605a633abe095bc8204a5c8f4d1a34f32485fb44f974e40acace49d908d9f0c4265fd91593b4a8725278d3a7e200b4b7f87738defa86ffae8db92e2291c11d075b98c1753af650d6b92d69be1062c9e4d756f3184c8a", 0xa2, 0xfff}, {&(0x7f00000002c0)="1e5466cfef00c04c73be582b1403c99473f8f51965af49effe8dfccb53aef1c0f0fe05f67e292770951fa17311057caabaf71cac8bb59d426700fa9fe3ff07ccf5b80b28", 0x44, 0x8}], 0x2800000, &(0x7f00000003c0)={[{@order_strict='order=strict'}, {@norecovery='norecovery'}, {@order_strict='order=strict'}], [{@fsuuid={'fsuuid', 0x3d, {[0x37, 0x65, 0x32, 0x35, 0x66, 0x63, 0x34, 0x35], 0x2d, [0x32, 0x66, 0x66, 0x37], 0x2d, [0x36, 0x35, 0x55, 0x62], 0x2d, [0x39, 0x62, 0x65, 0x35], 0x2d, [0x66, 0x61, 0x62, 0x33, 0x32, 0x66, 0x39, 0x33]}}}, {@context={'context', 0x3d, 'staff_u'}}, {@seclabel='seclabel'}, {@obj_user={'obj_user', 0x3d, 'rfdno'}}]}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={0x0}, 0x1, 0x0, 0x0, 0x100}, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0) ioctl$F2FS_IOC_PRECACHE_EXTENTS(r3, 0xf50f, 0x0) getsockopt$inet_mreq(r2, 0x0, 0x20, &(0x7f00000000c0)={@broadcast, @broadcast}, &(0x7f0000000180)=0x8) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000500)=@newlink={0x5c, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x800}, [@IFLA_LINKINFO={0x34, 0x12, 0x0, 0x1, @ip6gre={{0xb, 0x1, 'ip6gre\x00'}, {0x24, 0x2, 0x0, 0x1, [@IFLA_GRE_REMOTE={0x14, 0x7, @mcast1}, @IFLA_GRE_IFLAGS={0x6}, @IFLA_GRE_COLLECT_METADATA={0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) 07:02:52 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e22, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x0, 0x0, @empty}], 0x64) [ 771.994158][T29043] EXT4-fs error (device loop4): ext4_orphan_get:1411: comm syz-executor.4: bad orphan inode 17 [ 772.008629][T29044] EXT4-fs error (device loop0): ext4_orphan_get:1411: comm syz-executor.0: bad orphan inode 17 [ 772.027224][T29051] EXT4-fs error (device loop1): ext4_orphan_get:1411: comm syz-executor.1: bad orphan inode 17 [ 772.074199][T29043] ext4_test_bit(bit=16, block=4) = 0 [ 772.080299][T29044] ext4_test_bit(bit=16, block=4) = 0 [ 772.086044][T29051] ext4_test_bit(bit=16, block=4) = 0 [ 772.103301][T29080] 9pnet: Insufficient options for proto=fd 07:02:52 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e22, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x0, 0x0, @empty}], 0x64) [ 772.120197][T29043] EXT4-fs (loop4): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 772.126314][T29044] EXT4-fs (loop0): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 772.143212][T29043] ext4 filesystem being mounted at /root/syzkaller-testdir361905062/syzkaller.3sALX4/1689/file0 supports timestamps until 2038 (0x7fffffff) [ 772.145608][T29051] EXT4-fs (loop1): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 772.192487][T29080] loop5: detected capacity change from 15 to 0 [ 772.218006][T29051] ext4 filesystem being mounted at /root/syzkaller-testdir179269531/syzkaller.S04UpC/1774/file0 supports timestamps until 2038 (0x7fffffff) 07:02:53 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000180)=0x5) 07:02:53 executing program 2: ioctl$SNDCTL_TMR_SELECT(0xffffffffffffffff, 0x40045408) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000f0000000000000000000084292cdbb4d55e0a00a1e00007a6b485e7ac48278a192d6b839400049cc3b009c7c96d4573cfe3bde837a0c0ed8f4ee085479e7c46d70b818398e1ed0f244e9bc45ba9e74dec9aa93ccc485f17e3e038f88a88977a04e000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00', r0}, 0x10) r2 = open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x88000) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000001980)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) socketpair(0x15, 0x0, 0x6cb, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_J1939_FILTER(r4, 0x6b, 0x1, &(0x7f0000000400)=[{0x0, 0x0, {0x1, 0xff, 0x2}, {0x1, 0xf0, 0x1}, 0x2, 0xfd}, {0x3, 0x3, {0x0, 0x0, 0x2}, {0x2, 0x0, 0x2}, 0x1, 0xff}, {0x2, 0x2, {0x1, 0xff, 0x2}, {0x0, 0x0, 0x2}, 0x2, 0x1}], 0x60) setsockopt$inet6_MCAST_LEAVE_GROUP(r3, 0x29, 0x2d, &(0x7f0000000480)={0x0, {{0xa, 0x4e22, 0x8a, @private1, 0x7}}}, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'vxcan1\x00'}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$RTC_VL_CLR(r2, 0x7014) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r5, 0x8983, &(0x7f0000000140)={0x8, 'veth0_to_batadv\x00', {'ip_vti0\x00'}, 0xdb}) r6 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADDIR(r6, &(0x7f0000000100)=ANY=[], 0xbf) sendfile(r6, r6, &(0x7f0000000240), 0x7fff) 07:02:53 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) [ 772.234085][T29044] ext4 filesystem being mounted at /root/syzkaller-testdir479981418/syzkaller.slpvwc/1756/file0 supports timestamps until 2038 (0x7fffffff) [ 772.267741][T29080] NILFS (loop5): couldn't find nilfs on the device 07:02:53 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000180)=0x5) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) 07:02:53 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e22, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x0, 0x0, @empty}], 0x64) 07:02:53 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e22, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x0, 0x0, @empty}], 0x64) [ 772.390657][T29080] 9pnet: Insufficient options for proto=fd [ 772.431435][T29099] loop4: detected capacity change from 1024 to 0 [ 772.442498][T29104] loop5: detected capacity change from 15 to 0 [ 772.452209][T29103] loop1: detected capacity change from 1024 to 0 [ 772.467867][T29104] NILFS (loop5): couldn't find nilfs on the device [ 772.488084][T29099] EXT4-fs error (device loop4): ext4_orphan_get:1411: comm syz-executor.4: bad orphan inode 17 [ 772.509145][T29103] EXT4-fs error (device loop1): ext4_orphan_get:1411: comm syz-executor.1: bad orphan inode 17 07:02:53 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e22, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x0, 0x0, @empty}], 0x64) 07:02:53 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e22, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x0, 0x0, @empty}], 0x64) [ 772.559759][T29099] ext4_test_bit(bit=16, block=4) = 0 [ 772.559904][T29124] loop0: detected capacity change from 1024 to 0 [ 772.565081][T29099] EXT4-fs (loop4): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 772.582436][T29099] ext4 filesystem being mounted at /root/syzkaller-testdir361905062/syzkaller.3sALX4/1690/file0 supports timestamps until 2038 (0x7fffffff) 07:02:53 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e22, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x0, 0x0, @empty}], 0x64) [ 772.605090][T29103] ext4_test_bit(bit=16, block=4) = 0 [ 772.618742][T29103] EXT4-fs (loop1): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 772.620825][T29124] EXT4-fs error (device loop0): ext4_orphan_get:1411: comm syz-executor.0: bad orphan inode 17 [ 772.645432][T29103] ext4 filesystem being mounted at /root/syzkaller-testdir179269531/syzkaller.S04UpC/1775/file0 supports timestamps until 2038 (0x7fffffff) [ 772.650773][T29124] ext4_test_bit(bit=16, block=4) = 0 [ 772.673731][T29124] EXT4-fs (loop0): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. 07:02:53 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) 07:02:53 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000180)=0x5) [ 772.703873][T29124] ext4 filesystem being mounted at /root/syzkaller-testdir479981418/syzkaller.slpvwc/1757/file0 supports timestamps until 2038 (0x7fffffff) 07:02:53 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) 07:02:53 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e22, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x0, 0x0, @empty}], 0x64) [ 772.854457][T29141] loop4: detected capacity change from 1024 to 0 [ 772.882846][T29147] loop5: detected capacity change from 1024 to 0 [ 772.928775][T29141] EXT4-fs error (device loop4): ext4_orphan_get:1411: comm syz-executor.4: bad orphan inode 17 [ 772.951778][T29156] loop1: detected capacity change from 1024 to 0 [ 772.963749][T29147] EXT4-fs error (device loop5): ext4_orphan_get:1411: comm syz-executor.5: bad orphan inode 17 [ 772.964641][T29141] ext4_test_bit(bit=16, block=4) = 0 [ 772.981156][T29147] ext4_test_bit(bit=16, block=4) = 0 [ 772.987329][T29147] EXT4-fs (loop5): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 773.052242][T29156] EXT4-fs error (device loop1): ext4_orphan_get:1411: comm syz-executor.1: bad orphan inode 17 [ 773.074216][T29141] EXT4-fs (loop4): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 773.085333][T29147] ext4 filesystem being mounted at /root/syzkaller-testdir546118600/syzkaller.crFpTh/1718/file0 supports timestamps until 2038 (0x7fffffff) [ 773.102259][T29156] ext4_test_bit(bit=16, block=4) = 0 [ 773.105405][T29141] ext4 filesystem being mounted at /root/syzkaller-testdir361905062/syzkaller.3sALX4/1691/file0 supports timestamps until 2038 (0x7fffffff) [ 773.109832][T29156] EXT4-fs (loop1): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 773.150561][T29156] ext4 filesystem being mounted at /root/syzkaller-testdir179269531/syzkaller.S04UpC/1776/file0 supports timestamps until 2038 (0x7fffffff) 07:02:54 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) 07:02:54 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e22, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x0, 0x0, @empty}], 0x64) 07:02:54 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000180)=0x5) 07:02:54 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) 07:02:54 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) 07:02:54 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 07:02:54 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e22, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x0, 0x0, @empty}], 0x64) 07:02:54 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) 07:02:54 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) [ 773.373924][T29176] loop0: detected capacity change from 1024 to 0 07:02:54 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 07:02:54 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 773.467195][T29180] loop5: detected capacity change from 1024 to 0 07:02:54 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 07:02:54 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 773.531695][T29176] EXT4-fs error (device loop0): ext4_orphan_get:1411: comm syz-executor.0: bad orphan inode 17 [ 773.563589][T29200] loop1: detected capacity change from 1024 to 0 [ 773.576690][T29176] ext4_test_bit(bit=16, block=4) = 0 07:02:54 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e22, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x0, 0x0, @empty}], 0x64) [ 773.615216][T29176] EXT4-fs (loop0): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 773.634988][T29176] ext4 filesystem being mounted at /root/syzkaller-testdir479981418/syzkaller.slpvwc/1758/file0 supports timestamps until 2038 (0x7fffffff) [ 773.685389][T29209] loop4: detected capacity change from 1024 to 0 07:02:54 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 07:02:54 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) 07:02:54 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) [ 773.803600][T29200] EXT4-fs error (device loop1): ext4_orphan_get:1411: comm syz-executor.1: bad orphan inode 17 [ 773.815676][T29200] ext4_test_bit(bit=16, block=4) = 0 [ 773.815685][T29209] EXT4-fs error (device loop4): ext4_orphan_get:1411: comm syz-executor.4: bad orphan inode 17 [ 773.820997][T29200] EXT4-fs (loop1): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 773.843704][T29200] ext4 filesystem being mounted at /root/syzkaller-testdir179269531/syzkaller.S04UpC/1777/file0 supports timestamps until 2038 (0x7fffffff) [ 773.863261][T29230] loop5: detected capacity change from 1024 to 0 [ 773.876339][T29209] ext4_test_bit(bit=16, block=4) = 0 [ 773.881741][T29209] EXT4-fs (loop4): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 773.893717][T29209] ext4 filesystem being mounted at /root/syzkaller-testdir361905062/syzkaller.3sALX4/1693/file0 supports timestamps until 2038 (0x7fffffff) 07:02:54 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) 07:02:54 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e22, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x0, 0x0, @empty}], 0x64) 07:02:54 executing program 2: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0xc2) ftruncate(r1, 0x12081ff) fcntl$setstatus(r0, 0x4, 0x6100) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) setresuid(0x0, 0x0, 0xee00) write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r2 = open(&(0x7f0000000080)='./file0\x00', 0x14b042, 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000800)='./file1\x00', 0x0, 0x0, 0x0, 0x3040000, 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000000c0)={0x2, &(0x7f00000002c0)=[{}, {}]}) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=0xffffffffffffffff, 0x4) ioctl$F2FS_IOC_RESIZE_FS(r3, 0x4008f510, &(0x7f00000001c0)=0xffffffffffffffc9) fallocate(r3, 0x5f, 0xfffffffffffffffe, 0x4003be) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000180)={0x0, r0}) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000280)={0x5, 0x100, 0xfffffffc, 0x9, 0x0, 0x789}) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x7f, 0x0, 0x0, 0x80, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0x6612, 0x0) [ 773.927281][T29234] loop0: detected capacity change from 1024 to 0 07:02:54 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 773.989987][T29230] EXT4-fs error (device loop5): ext4_orphan_get:1411: comm syz-executor.5: bad orphan inode 17 [ 774.000886][T29230] ext4_test_bit(bit=16, block=4) = 0 [ 774.006943][T29230] EXT4-fs (loop5): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 774.019433][T29230] ext4 filesystem being mounted at /root/syzkaller-testdir546118600/syzkaller.crFpTh/1720/file0 supports timestamps until 2038 (0x7fffffff) 07:02:54 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0) [ 774.020066][T29234] EXT4-fs error (device loop0): ext4_orphan_get:1411: comm syz-executor.0: bad orphan inode 17 07:02:54 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 07:02:54 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 774.069946][T29234] ext4_test_bit(bit=16, block=4) = 0 [ 774.077560][T29234] EXT4-fs (loop0): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 774.089663][T29234] ext4 filesystem being mounted at /root/syzkaller-testdir479981418/syzkaller.slpvwc/1759/file0 supports timestamps until 2038 (0x7fffffff) 07:02:54 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 07:02:55 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 07:02:55 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0) [ 774.226526][T29260] loop4: detected capacity change from 1024 to 0 07:02:55 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 07:02:55 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 774.328115][T29261] loop1: detected capacity change from 1024 to 0 [ 774.354626][T29262] loop0: detected capacity change from 1024 to 0 [ 774.379501][T29265] loop5: detected capacity change from 1024 to 0 [ 774.436839][T29260] EXT4-fs error (device loop4): ext4_orphan_get:1411: comm syz-executor.4: bad orphan inode 17 [ 774.448113][T29260] ext4_test_bit(bit=16, block=4) = 0 [ 774.453447][T29260] EXT4-fs (loop4): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 774.466532][T29260] ext4 filesystem being mounted at /root/syzkaller-testdir361905062/syzkaller.3sALX4/1694/file0 supports timestamps until 2038 (0x7fffffff) [ 774.477086][T29261] EXT4-fs error (device loop1): ext4_orphan_get:1411: comm syz-executor.1: bad orphan inode 17 [ 774.510520][T29261] ext4_test_bit(bit=16, block=4) = 0 [ 774.515963][T29261] EXT4-fs (loop1): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 774.528470][T29261] ext4 filesystem being mounted at /root/syzkaller-testdir179269531/syzkaller.S04UpC/1778/file0 supports timestamps until 2038 (0x7fffffff) 07:02:55 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) 07:02:55 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0) 07:02:55 executing program 2: ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000180)=""/166, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe, 0x40}, 0x0, 0x1000, 0x4, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r1, 0x4) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="500000000206850100000000000000000000000005000400000000000900020073797a3000000000050001000600000005000500020000000c00078008001240580100000c000300686173683a69700067ad508df9a1c6ef0e6fb9384c77ec864f74cdc3daab24e4263e681a1d70331e4dc6f2e7e9ebde89c3d181576c15e4776df4dab020624607037a3f97d99d339bb9baa8847491c634e350151d1f22f5cf33e4029466dd"], 0x50}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_DEASSIGN_PCI_DEVICE(r4, 0x4040ae72, &(0x7f0000000040)={0x80000001, 0x6, 0x7, 0x2, 0x3}) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000300), 0x17}, 0xd00d4, 0x7f, 0x1, 0x3, 0x0, 0x9, 0x3}, 0xffffffffffffffff, 0x400000000c, 0xffffffffffffffff, 0x2) 07:02:55 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 07:02:55 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 07:02:55 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 07:02:55 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e22, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x48) [ 774.719807][T29309] syz-executor.2: vmalloc: allocation failure: 17179869208 bytes, mode:0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0-1 [ 774.735406][T29309] CPU: 0 PID: 29309 Comm: syz-executor.2 Not tainted 5.11.0-rc1-syzkaller #0 [ 774.744283][T29309] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 774.754324][T29309] Call Trace: [ 774.757599][T29309] dump_stack+0x116/0x15d [ 774.761921][T29309] warn_alloc+0x105/0x160 [ 774.766227][T29309] ? __vmalloc_node_range+0x79/0x500 [ 774.771509][T29309] __vmalloc_node_range+0x1de/0x500 [ 774.776913][T29309] ? ip_set_alloc+0x1b/0x20 [ 774.781405][T29309] __vmalloc_node+0x61/0x70 [ 774.785931][T29309] ? ip_set_alloc+0x1b/0x20 [ 774.790413][T29309] kvmalloc_node+0xbc/0xf0 [ 774.794807][T29309] ip_set_alloc+0x1b/0x20 [ 774.799142][T29309] hash_ip_create+0x399/0x970 [ 774.803899][T29309] ? __nla_parse+0x3c/0x50 [ 774.808292][T29309] ip_set_create+0x30f/0x850 [ 774.812924][T29309] ? __nla_parse+0x3c/0x50 [ 774.817320][T29309] ? ip_set_protocol+0x300/0x300 [ 774.822251][T29309] nfnetlink_rcv_msg+0x3d4/0x4a0 [ 774.827186][T29309] ? try_charge+0x36/0xa00 [ 774.831626][T29309] ? get_page_from_freelist+0x366/0x630 [ 774.837237][T29309] ? aa_get_newest_label+0x74/0x250 [ 774.842506][T29309] netlink_rcv_skb+0x13e/0x240 [ 774.847260][T29309] ? nfnetlink_bind+0xb0/0xb0 [ 774.851980][T29309] nfnetlink_rcv+0x15d/0x1270 [ 774.856645][T29309] ? __kfree_skb+0xfe/0x150 [ 774.861127][T29309] ? __kfree_skb+0xfe/0x150 [ 774.865617][T29309] ? consume_skb+0x4b/0x160 [ 774.870122][T29309] ? nlmon_xmit+0x47/0x50 [ 774.874611][T29309] ? xmit_one+0x173/0x2e0 [ 774.878923][T29309] ? local_bh_enable+0x1b/0x20 [ 774.883667][T29309] ? __dev_queue_xmit+0xbf2/0x1500 [ 774.888784][T29309] ? __skb_clone+0x2a9/0x2c0 [ 774.893368][T29309] ? __rcu_read_unlock+0x51/0x250 [ 774.898462][T29309] ? netlink_deliver_tap+0x74/0x460 [ 774.903692][T29309] netlink_unicast+0x5df/0x6b0 [ 774.908489][T29309] netlink_sendmsg+0x6f8/0x7c0 [ 774.913322][T29309] ? netlink_getsockopt+0x720/0x720 [ 774.918549][T29309] ____sys_sendmsg+0x352/0x4c0 [ 774.923291][T29309] ? import_iovec+0xb8/0xd0 [ 774.927774][T29309] __sys_sendmsg+0x1ed/0x270 [ 774.932344][T29309] ? percpu_counter_add_batch+0xe1/0x100 [ 774.938064][T29309] ? alloc_empty_file+0x107/0x1c0 [ 774.943097][T29309] ? errseq_sample+0x2b/0x40 [ 774.947698][T29309] ? alloc_file+0x253/0x280 [ 774.952275][T29309] ? ktime_get_ts64+0x2c9/0x300 [ 774.957101][T29309] ? should_fail+0x2a/0x240 [ 774.961579][T29309] ? _copy_to_user+0x77/0x90 [ 774.966187][T29309] ? put_timespec64+0x61/0x90 [ 774.970888][T29309] __x64_sys_sendmsg+0x42/0x50 [ 774.975654][T29309] do_syscall_64+0x39/0x80 [ 774.980061][T29309] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 774.985991][T29309] RIP: 0033:0x45e219 [ 774.989863][T29309] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 775.009472][T29309] RSP: 002b:00007f9735c44c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 775.017865][T29309] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e219 [ 775.025813][T29309] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000007 [ 775.033956][T29309] RBP: 000000000119bfc0 R08: 0000000000000000 R09: 0000000000000000 [ 775.041960][T29309] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000119bf8c [ 775.049921][T29309] R13: 00007ffc84a85bff R14: 00007f9735c459c0 R15: 000000000119bf8c [ 775.075180][T29309] Mem-Info: [ 775.077458][T29308] loop4: detected capacity change from 1024 to 0 [ 775.084821][T29309] active_anon:282 inactive_anon:225549 isolated_anon:0 [ 775.084821][T29309] active_file:10454 inactive_file:63410 isolated_file:0 [ 775.084821][T29309] unevictable:768 dirty:207 writeback:0 [ 775.084821][T29309] slab_reclaimable:10572 slab_unreclaimable:21217 [ 775.084821][T29309] mapped:60747 shmem:6101 pagetables:1583 bounce:0 [ 775.084821][T29309] free:1590275 free_pcp:744 free_cma:0 [ 775.126562][T29309] Node 0 active_anon:1128kB inactive_anon:903888kB active_file:41684kB inactive_file:253640kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:243088kB dirty:824kB writeback:0kB shmem:22424kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 612352kB writeback_tmp:0kB kernel_stack:4592kB pagetables:6428kB all_unreclaimable? no [ 775.127436][T29307] loop0: detected capacity change from 1024 to 0 07:02:55 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e22, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x48) [ 775.158519][T29309] Node 1 active_anon:0kB inactive_anon:444kB active_file:132kB inactive_file:0kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:1980kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:0kB pagetables:4kB all_unreclaimable? no [ 775.194826][T29309] Node 0 DMA free:15904kB min:176kB low:220kB high:264kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 775.221407][T29309] lowmem_reserve[]: 0 2866 3825 3825 3825 [ 775.227387][T29309] Node 0 DMA32 free:2166328kB min:32804kB low:41004kB high:49204kB reserved_highatomic:0KB active_anon:116kB inactive_anon:320472kB active_file:17408kB inactive_file:165012kB unevictable:0kB writepending:476kB present:3129332kB managed:2940016kB mlocked:0kB bounce:0kB free_pcp:1884kB local_pcp:1076kB free_cma:0kB [ 775.258231][T29306] loop5: detected capacity change from 1024 to 0 [ 775.266031][T29321] loop1: detected capacity change from 1024 to 0 07:02:56 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000180)=0x5) 07:02:56 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 07:02:56 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e22, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x48) [ 775.295955][T29309] lowmem_reserve[]: 0 0 959 959 959 [ 775.303135][T29309] Node 0 Normal free:122076kB min:10980kB low:13724kB high:16468kB reserved_highatomic:0KB active_anon:1012kB inactive_anon:583356kB active_file:24276kB inactive_file:88628kB unevictable:1536kB writepending:348kB present:1048576kB managed:982580kB mlocked:0kB bounce:0kB free_pcp:1056kB local_pcp:264kB free_cma:0kB [ 775.358032][T29309] lowmem_reserve[]: 0 0 0 0 0 [ 775.362871][T29309] Node 1 Normal free:4054744kB min:46144kB low:57680kB high:69216kB reserved_highatomic:0KB active_anon:0kB inactive_anon:444kB active_file:132kB inactive_file:0kB unevictable:1536kB writepending:4kB present:4194304kB managed:4128312kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 775.391296][T29309] lowmem_reserve[]: 0 0 0 0 0 [ 775.396430][T29309] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 775.411327][T29309] Node 0 DMA32: 543*4kB (UME) 247*8kB (UME) 86*16kB (UME) 42*32kB (UME) 24*64kB (UME) 3*128kB (UM) 1*256kB (M) 2*512kB (UE) 2*1024kB (UE) 6*2048kB (UME) 524*4096kB (M) = 2170708kB [ 775.429324][T29309] Node 0 Normal: 881*4kB (M) 1641*8kB (M) 1377*16kB (M) 902*32kB (M) 470*64kB (M) 71*128kB (M) 30*256kB (M) 9*512kB (M) 3*1024kB (M) 0*2048kB 0*4096kB = 122076kB [ 775.445746][T29309] Node 1 Normal: 4*4kB (UME) 5*8kB (UME) 4*16kB (UME) 3*32kB (UME) 4*64kB (UME) 2*128kB (U) 2*256kB (UE) 1*512kB (E) 2*1024kB (UM) 2*2048kB (UM) 988*4096kB (M) = 4054744kB [ 775.463031][T29309] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 775.472975][T29309] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 775.482553][T29309] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 775.492379][T29309] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 775.502361][T29309] 52166 total pagecache pages [ 775.507088][T29309] 0 pages in swap cache [ 775.511230][T29309] Swap cache stats: add 0, delete 0, find 0/0 [ 775.524393][T29309] Free swap = 0kB [ 775.524741][T29341] loop0: detected capacity change from 1024 to 0 [ 775.542712][T29309] Total swap = 0kB [ 775.547968][T29309] 2097051 pages RAM [ 775.549066][T29343] loop4: detected capacity change from 1024 to 0 07:02:56 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e22, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:02:56 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) 07:02:56 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 07:02:56 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) [ 775.553977][T29309] 0 pages HighMem/MovableOnly [ 775.564066][T29309] 80348 pages reserved [ 775.568322][T29309] 0 pages cma reserved 07:02:56 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) 07:02:56 executing program 2: openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r2, 0x8001000000000000, 0x40, &(0x7f0000001a00)=@raw={'raw\x00', 0x8, 0x3, 0x1288, 0x1158, 0x11, 0x148, 0x1158, 0x0, 0x11f0, 0x2a8, 0x2a8, 0x11f0, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x10f8, 0x1158, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'ip_vti0\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0x3, 0x7}}}, @common=@unspec=@cgroup1={{0x1030, 'cgroup\x00'}, {0x1, 0x8, 0x0, 0x0, './cgroup.net/syz1\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x12e8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) connect$unix(r4, &(0x7f0000000040)=@abs={0x1, 0x0, 0x4e22}, 0x6e) [ 775.662707][T29343] EXT4-fs error (device loop4): ext4_orphan_get:1411: comm syz-executor.4: bad orphan inode 17 07:02:56 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e22, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @empty}], 0x38) 07:02:56 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000180)=0x5) [ 775.737100][T29343] ext4_test_bit(bit=16, block=4) = 0 [ 775.742500][T29343] EXT4-fs (loop4): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 775.767345][T29372] loop1: detected capacity change from 1024 to 0 [ 775.775802][T29373] xt_cgroup: path and classid specified 07:02:56 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x101}, 0x0) r0 = getpid() shmget(0x1, 0x2000, 0x400, &(0x7f0000ffc000/0x2000)=nil) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x40, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r1, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4008841}, 0x800) pipe(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x3, 0xac) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) sendmmsg$inet6(r3, &(0x7f00000023c0)=[{{&(0x7f0000000000)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f0000000140)=[@pktinfo={{0x24, 0x29, 0x32, {@mcast2, r4}}}], 0x28}}], 0x1, 0x0) sendmmsg(r2, &(0x7f0000000900)=[{{&(0x7f0000000100)=@ll={0x11, 0x1b, r4, 0x1, 0x9, 0x6, @dev={[], 0x38}}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000200)="3aaa31597864183545e34d6cd0c037ecea59ce53f07a7a9a5dce0d92727602431990b5cf8693fd9977572e82c5ec36f9a49e60ae5a973e82cd30d0a8d9ebdaf7f9f43767052435141fee907a5763ad30f087628413cb316dfd8b622152f106bf", 0x60}, {&(0x7f00000002c0)="f7dfc39d1be18610839e560436f5ed776ed928193956c1373b63896ecf6903b318112f3e605a49659586a615b3e11c1360d4fb94cc8598010d25f9ad6cbd6597fa85b8ccd8eb91a8ee045550ddf5948fbc5bd32d7b2e2a71005ead5b0b6b4211ff63af486e7a971313dfdd57542040ae6fee4e72f44def85eac149ade57f26b3e90f302db540d13a7915ee5937fecbbad0b173df599d33a98c32a2ba73b47ddc1022ec06e17e382745681de3edd893620362cb713563a978b686659dde1a107f14bcedc3aac5cd", 0xc7}, {&(0x7f00000003c0)="ce860599675cb343abeea93a0f27d629e1f1395e5a0264ecf861240cc2aa466b344bc0ec87e0a18dba33c79f7f54fdea812d04682037151a70779d361e58bbcc29646c47395d9baab8e159cf445071b7e5003d9dfceff2df67cdccec1da438de5bf0f50519aac1cbab4687a3d57f0f5ec206f15941c1bcb71f0e03c0b59eb18ca91aa11a51dc7e4a80096f7aa051584a5401e73c90c6a0f1d15575c933aff0f2641459f06c891de69bf0845abcbc361262cc687612c75b43e32167d2ca0fba5ded41e8431df5e489b1d9e2a342698bb874b5e7ee30e9f176bb249382d246779d686819830342e68b367c84412d347f", 0xef}, {&(0x7f0000000180)="aae86e661353401e2e9b57e1b7a2fbdbd130a46d111263241571edc0d05e4c40a2828f63068352e3fb660de26931bcab62c3828b", 0x34}, {&(0x7f00000004c0)="1dc70b5bb06d8d2595856a1ee15906a6f078aaeceb24bd226d185e3773288f940bd56b44b0cb31cf6d7dfdfd08e42fa75158b1fec7155eeddea5dbfeab4a891de99bfdbdc67d23b853eae93c80afe600bf6576344fd7730cf3f778bcc6d588e98c0c8e22d7f1a393694c73e249bc42e89beaf58a24f0af4e8af6d4b4ffa0c80a0aac36006e127961337e5da4859a4d24fc4bcdbf5242dd2715ad848a739b57d7b0a700d4d735b40a59ff4dda177a9d568ac4744b", 0xb4}, {&(0x7f0000000580)="0851ab7b7dec44c4a33652bdf3d3a524f873d45b9403a595d4a4f61c5441135d77ad54ea96de5462c5346b1d2042a30150e05bf8e38e7d42401865e7ac67d5beb8833e6e3d60157a62ab812f1099140bec2f60e09f92ae3876969bff32a0188b71126d19cc21432477db532222a3718a5b018828dd4b3015533ed1a20152a099b8d406e45ab14c8f1e518c67d8d4f1f74f263c00de629742eb41f65da70332b26f793f71cade0e6919c85fe4ca313a58a0105b17b0d1e0460086c32ae7dda31b0700b185d17ef37423426b2f46fbdbd5b08c28f3c3a6df0795d7f7c9da384d6e", 0xe0}, {&(0x7f0000000680)="980766504693aba0204dcfb105e4186fef46472bbb66db705c9e8564dfceac7451295962fba7c50465c5a47ac2e1ef8e3c421ddd15191800", 0x38}, {&(0x7f0000000780)="c60939526341e4b1e9418659feb3d88b537629e02467b1f22238842d07352ddb9f9042382378edc8172e1b22bba850371f4a749f716e572fd6d09ef52e547687377c7405b36422851ee4b4fbd7c934b2c171bf1bfbdc80e0748343a577ab03da466d652c312c96ef5e933969b0be63d2b1ecd95b57954860349e731ab8994a4106ada3b2e9bf8b2ad24c60b24d510d15915747f5e35e5323e4b45992724cd0eeef5cc6b86e928bd8617552d5f207dab20f728985feae8db6ad9bc57cf369f75c59c8b45667269f0e2ffcf130d4b490575c06c155407519b64c5105f921d46f2543bdf8dc", 0xe4}], 0x8, &(0x7f00000006c0)=[{0x30, 0x10f, 0xa91, "20569ae59b4b9691bb8e8ab653c94dd8c4423be3e6e720c54e00"}], 0x30}}], 0x1, 0xc004) [ 775.776119][T29343] ext4 filesystem being mounted at /root/syzkaller-testdir361905062/syzkaller.3sALX4/1696/file0 supports timestamps until 2038 (0x7fffffff) [ 775.797473][T29379] xt_cgroup: path and classid specified [ 775.803993][T29376] loop0: detected capacity change from 1024 to 0 [ 775.817047][T29371] loop5: detected capacity change from 1024 to 0 07:02:56 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e22, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @empty}], 0x38) 07:02:56 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 775.878581][T29376] EXT4-fs error (device loop0): ext4_orphan_get:1411: comm syz-executor.0: bad orphan inode 17 [ 775.921035][T29371] EXT4-fs error (device loop5): ext4_orphan_get:1411: comm syz-executor.5: bad orphan inode 17 [ 775.921953][T29372] EXT4-fs error (device loop1): ext4_orphan_get:1411: comm syz-executor.1: bad orphan inode 17 [ 775.937231][T29371] ext4_test_bit(bit=16, block=4) = 0 [ 775.952873][T29371] EXT4-fs (loop5): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 775.975202][T29376] ext4_test_bit(bit=16, block=4) = 0 [ 775.997965][T29371] ext4 filesystem being mounted at /root/syzkaller-testdir546118600/syzkaller.crFpTh/1723/file0 supports timestamps until 2038 (0x7fffffff) [ 776.026551][T29376] EXT4-fs (loop0): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. 07:02:56 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e22, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @empty}], 0x38) 07:02:56 executing program 2: syz_usb_connect(0x0, 0x2d, &(0x7f0000000380)=ANY=[@ANYBLOB="12010000a504bd40eb030200c0ba0000000109021b0001000000000904000001b504b100090581d8bf17289c1f1bef5a9cf37906f1b221271bab2fef48604868c81bf389aa172b0a470f391f140592bbd4423ab8aec397eda6db964ec02515ba13319eac9f505c263890696f17c995f55ddb964af449c8335e4df2dd049289353a6349e2fcb280f225a0026ab50f", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="c209cc7f01c60a532720661a64ddeb05a97de4ce54f341fd9663cf9b0b9c5170d7ab30f9f99ff1d58d5abf8d02c1018a668c045575cb87e81aeb7cbf188f293942edc87d764fb76d17c592b9def1758db71f4e93fbc6abf50608b0d65988cc6171425e575e93af57f3620d33bc465dab5381f9182a5b5e0d38b20d9207771f05ed25e482538945fa5109a24c885ef0b75ebe3919447cb685de0dc668bfe4f0738d361ecf723912ded2414dc16747a19345820409e18621c4"], 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0xc7c8, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000540)) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000e40)=[0x3fb, 0x3]) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000080)) [ 776.052148][T29407] loop4: detected capacity change from 1024 to 0 [ 776.074853][T29372] ext4_test_bit(bit=16, block=4) = 0 [ 776.097131][T29376] ext4 filesystem being mounted at /root/syzkaller-testdir479981418/syzkaller.slpvwc/1763/file0 supports timestamps until 2038 (0x7fffffff) [ 776.114846][T29372] EXT4-fs (loop1): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. 07:02:56 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 07:02:56 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x38) 07:02:56 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000140)=ANY=[@ANYBLOB="1201000034fa1d0809122323e9e2010203010902120001000002000904"], 0x0) syz_usb_control_io$cdc_ncm(r0, &(0x7f0000000180)={0x14, 0x0, &(0x7f0000000000)={0x0, 0x3, 0x1a, {0x1a}}}, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000580)={0x2c, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000400)={0x2c, &(0x7f00000003c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00'], 0x0, 0x0, 0x0, 0x0}) [ 776.147196][T29372] ext4 filesystem being mounted at /root/syzkaller-testdir179269531/syzkaller.S04UpC/1780/file0 supports timestamps until 2038 (0x7fffffff) [ 776.166921][T29407] EXT4-fs error (device loop4): ext4_orphan_get:1411: comm syz-executor.4: bad orphan inode 17 [ 776.186861][T29407] ext4_test_bit(bit=16, block=4) = 0 07:02:56 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000180)=0x5) 07:02:57 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x38) 07:02:57 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 776.192334][T29407] EXT4-fs (loop4): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 776.212020][T29407] ext4 filesystem being mounted at /root/syzkaller-testdir361905062/syzkaller.3sALX4/1697/file0 supports timestamps until 2038 (0x7fffffff) 07:02:57 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x38) [ 776.346832][T29422] loop1: detected capacity change from 1024 to 0 [ 776.437859][ T9794] usb 3-1: new high-speed USB device number 6 using dummy_hcd [ 776.455297][T29441] loop0: detected capacity change from 1024 to 0 [ 776.471838][T29422] EXT4-fs error (device loop1): ext4_orphan_get:1411: comm syz-executor.1: bad orphan inode 17 07:02:57 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 776.482910][T29440] loop4: detected capacity change from 1024 to 0 [ 776.498386][T29422] ext4_test_bit(bit=16, block=4) = 0 [ 776.518660][T29441] EXT4-fs error (device loop0): ext4_orphan_get:1411: comm syz-executor.0: bad orphan inode 17 [ 776.531412][T29422] EXT4-fs (loop1): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 776.556075][ T7] usb 6-1: new high-speed USB device number 10 using dummy_hcd [ 776.572301][T29440] EXT4-fs error (device loop4): ext4_orphan_get:1411: comm syz-executor.4: bad orphan inode 17 [ 776.599400][T29441] ext4_test_bit(bit=16, block=4) = 0 [ 776.604736][T29441] EXT4-fs (loop0): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 776.616647][T29441] ext4 filesystem being mounted at /root/syzkaller-testdir479981418/syzkaller.slpvwc/1764/file0 supports timestamps until 2038 (0x7fffffff) [ 776.634954][T29422] ext4 filesystem being mounted at /root/syzkaller-testdir179269531/syzkaller.S04UpC/1781/file0 supports timestamps until 2038 (0x7fffffff) [ 776.638996][T29440] ext4_test_bit(bit=16, block=4) = 0 07:02:57 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 07:02:57 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 07:02:57 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000180)=0x5) [ 776.686092][T29440] EXT4-fs (loop4): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 776.698310][T29440] ext4 filesystem being mounted at /root/syzkaller-testdir361905062/syzkaller.3sALX4/1698/file0 supports timestamps until 2038 (0x7fffffff) [ 776.749225][T29463] loop3: detected capacity change from 1024 to 0 [ 776.825189][ T7] usb 6-1: Using ep0 maxpacket: 8 [ 776.845193][ T9794] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1983, setting to 64 [ 776.886486][T29473] loop1: detected capacity change from 1024 to 0 [ 776.887389][ T9794] usb 3-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 776.902498][ T9794] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 776.911408][ T9794] usb 3-1: config 0 descriptor?? [ 776.924417][T29463] EXT4-fs error (device loop3): ext4_orphan_get:1411: comm syz-executor.3: bad orphan inode 17 [ 776.936155][T29463] ext4_test_bit(bit=16, block=4) = 0 [ 776.941562][T29463] EXT4-fs (loop3): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 776.956623][T29480] loop0: detected capacity change from 1024 to 0 [ 776.968883][T29463] ext4 filesystem being mounted at /root/syzkaller-testdir862710153/syzkaller.8DTWy3/1813/file0 supports timestamps until 2038 (0x7fffffff) [ 777.003688][T29473] EXT4-fs error (device loop1): ext4_orphan_get:1411: comm syz-executor.1: bad orphan inode 17 [ 777.028223][T29480] EXT4-fs error (device loop0): ext4_orphan_get:1411: comm syz-executor.0: bad orphan inode 17 [ 777.045158][ T9794] rc_core: IR keymap rc-hauppauge not found [ 777.051114][ T9794] Registered IR keymap rc-empty [ 777.056364][ T9794] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0 [ 777.074679][ T9794] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0/input5 [ 777.086105][T29480] ext4_test_bit(bit=16, block=4) = 0 [ 777.091638][T29480] EXT4-fs (loop0): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 777.092883][T29473] ext4_test_bit(bit=16, block=4) = 0 [ 777.105883][T29480] ext4 filesystem being mounted at /root/syzkaller-testdir479981418/syzkaller.slpvwc/1765/file0 supports timestamps until 2038 (0x7fffffff) [ 777.118399][ T7] usb 6-1: New USB device found, idVendor=1209, idProduct=2323, bcdDevice=e2.e9 [ 777.145806][ T7] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 777.153941][ T7] usb 6-1: Product: syz [ 777.158449][ T7] usb 6-1: Manufacturer: syz [ 777.163114][ T7] usb 6-1: SerialNumber: syz [ 777.169512][ T7] usb 6-1: config 0 descriptor?? [ 777.189184][ T8823] usb 3-1: USB disconnect, device number 6 [ 777.235318][T29473] EXT4-fs (loop1): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 777.250983][T29473] ext4 filesystem being mounted at /root/syzkaller-testdir179269531/syzkaller.S04UpC/1782/file0 supports timestamps until 2038 (0x7fffffff) [ 777.645227][ T7] gs_usb 6-1:0.0: Configuring for 1 interfaces [ 777.995246][ T9794] usb 3-1: new high-speed USB device number 7 using dummy_hcd [ 778.067320][ T7] usb 6-1: USB disconnect, device number 10 [ 778.395764][ T9794] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1983, setting to 64 [ 778.406772][ T9794] usb 3-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 778.415810][ T9794] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 778.424442][ T9794] usb 3-1: config 0 descriptor?? [ 778.515180][ T9794] rc_core: IR keymap rc-hauppauge not found [ 778.521166][ T9794] Registered IR keymap rc-empty [ 778.526670][ T9794] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0 [ 778.540409][ T9794] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0/input6 07:02:59 executing program 2: syz_usb_connect(0x0, 0x2d, &(0x7f0000000380)=ANY=[@ANYBLOB="12010000a504bd40eb030200c0ba0000000109021b0001000000000904000001b504b100090581d8bf17289c1f1bef5a9cf37906f1b221271bab2fef48604868c81bf389aa172b0a470f391f140592bbd4423ab8aec397eda6db964ec02515ba13319eac9f505c263890696f17c995f55ddb964af449c8335e4df2dd049289353a6349e2fcb280f225a0026ab50f", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="c209cc7f01c60a532720661a64ddeb05a97de4ce54f341fd9663cf9b0b9c5170d7ab30f9f99ff1d58d5abf8d02c1018a668c045575cb87e81aeb7cbf188f293942edc87d764fb76d17c592b9def1758db71f4e93fbc6abf50608b0d65988cc6171425e575e93af57f3620d33bc465dab5381f9182a5b5e0d38b20d9207771f05ed25e482538945fa5109a24c885ef0b75ebe3919447cb685de0dc668bfe4f0738d361ecf723912ded2414dc16747a19345820409e18621c4"], 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0xc7c8, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000540)) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000e40)=[0x3fb, 0x3]) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000080)) 07:02:59 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 07:02:59 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 778.666486][T27347] usb 3-1: USB disconnect, device number 7 [ 778.719337][T29566] loop3: detected capacity change from 1024 to 0 [ 778.733889][T29565] loop4: detected capacity change from 1024 to 0 [ 778.767585][T29565] EXT4-fs error (device loop4): ext4_orphan_get:1411: comm syz-executor.4: bad orphan inode 17 [ 778.779021][T29565] ext4_test_bit(bit=16, block=4) = 0 [ 778.780205][T29566] EXT4-fs error (device loop3): ext4_orphan_get:1411: comm syz-executor.3: bad orphan inode 17 [ 778.784433][T29565] EXT4-fs (loop4): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 778.795941][T29566] ext4_test_bit(bit=16, block=4) = 0 [ 778.808726][T29565] ext4 filesystem being mounted at /root/syzkaller-testdir361905062/syzkaller.3sALX4/1699/file0 supports timestamps until 2038 (0x7fffffff) [ 778.812614][T29566] EXT4-fs (loop3): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 778.845179][ T9794] usb 6-1: new high-speed USB device number 11 using dummy_hcd [ 778.864944][T29566] ext4 filesystem being mounted at /root/syzkaller-testdir862710153/syzkaller.8DTWy3/1814/file0 supports timestamps until 2038 (0x7fffffff) [ 779.095204][ T9794] usb 6-1: Using ep0 maxpacket: 8 [ 779.105187][T27347] usb 3-1: new high-speed USB device number 8 using dummy_hcd 07:03:00 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000180)=0x5) 07:03:00 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000180)=0x5) 07:03:00 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 07:03:00 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 07:03:00 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 779.427510][T29595] loop5: detected capacity change from 1024 to 0 [ 779.438176][T29596] loop4: detected capacity change from 1024 to 0 [ 779.453973][T29600] loop0: detected capacity change from 1024 to 0 [ 779.464319][T29598] loop3: detected capacity change from 1024 to 0 [ 779.465988][T27347] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1983, setting to 64 [ 779.470844][ T9794] usb 6-1: New USB device found, idVendor=1209, idProduct=2323, bcdDevice=e2.e9 [ 779.490916][T27347] usb 3-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 779.498501][ T9794] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 779.505168][T29599] loop1: detected capacity change from 1024 to 0 [ 779.539645][T27347] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 779.543385][T29598] EXT4-fs error (device loop3): ext4_orphan_get:1411: comm syz-executor.3: bad orphan inode 17 [ 779.555839][T29600] EXT4-fs error (device loop0): ext4_orphan_get:1411: comm syz-executor.0: bad orphan inode 17 [ 779.561364][T29596] EXT4-fs error (device loop4): ext4_orphan_get:1411: comm syz-executor.4: bad orphan inode 17 [ 779.579272][T29595] EXT4-fs error (device loop5): ext4_orphan_get:1411: comm syz-executor.5: bad orphan inode 17 [ 779.579600][T27347] usb 3-1: config 0 descriptor?? [ 779.598763][T29600] ext4_test_bit(bit=16, block=4) = 0 [ 779.604533][T29600] EXT4-fs (loop0): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 779.609986][ T9794] usb 6-1: Product: syz [ 779.616770][T29600] ext4 filesystem being mounted at /root/syzkaller-testdir479981418/syzkaller.slpvwc/1766/file0 supports timestamps until 2038 (0x7fffffff) [ 779.640408][T29599] EXT4-fs error (device loop1): ext4_orphan_get:1411: comm syz-executor.1: bad orphan inode 17 [ 779.651750][T29599] ext4_test_bit(bit=16, block=4) = 0 [ 779.659386][T29599] EXT4-fs (loop1): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 779.666673][T29595] ext4_test_bit(bit=16, block=4) = 0 [ 779.671260][T29598] ext4_test_bit(bit=16, block=4) = 0 [ 779.681805][T29596] ext4_test_bit(bit=16, block=4) = 0 [ 779.688592][T29598] EXT4-fs (loop3): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 779.701385][T29598] ext4 filesystem being mounted at /root/syzkaller-testdir862710153/syzkaller.8DTWy3/1815/file0 supports timestamps until 2038 (0x7fffffff) [ 779.717355][T29595] EXT4-fs (loop5): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 779.717518][ T9794] usb 6-1: config 0 descriptor?? [ 779.729242][T29595] ext4 filesystem being mounted at /root/syzkaller-testdir546118600/syzkaller.crFpTh/1725/file0 supports timestamps until 2038 (0x7fffffff) [ 779.750058][T29596] EXT4-fs (loop4): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 779.762133][T29596] ext4 filesystem being mounted at /root/syzkaller-testdir361905062/syzkaller.3sALX4/1700/file0 supports timestamps until 2038 (0x7fffffff) [ 779.775486][T29599] ext4 filesystem being mounted at /root/syzkaller-testdir179269531/syzkaller.S04UpC/1783/file0 supports timestamps until 2038 (0x7fffffff) [ 779.795214][T27347] rc_core: IR keymap rc-hauppauge not found [ 779.801307][T27347] Registered IR keymap rc-empty [ 779.825367][T27347] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0 [ 779.835954][T27347] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0/input7 07:03:00 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000180)=0x5) 07:03:00 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 07:03:00 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000180)=0x5) [ 779.866280][T27347] usb 3-1: USB disconnect, device number 8 [ 779.905353][ T9794] usb 6-1: can't set config #0, error -71 07:03:00 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000180)=0x5) [ 779.919250][ T9794] usb 6-1: USB disconnect, device number 11 [ 780.026896][T29657] loop3: detected capacity change from 1024 to 0 [ 780.107986][T29665] loop4: detected capacity change from 1024 to 0 [ 780.142343][T29672] loop5: detected capacity change from 1024 to 0 [ 780.156060][T29657] EXT4-fs error (device loop3): ext4_orphan_get:1411: comm syz-executor.3: bad orphan inode 17 [ 780.174342][T29676] loop0: detected capacity change from 1024 to 0 [ 780.182008][T29657] ext4_test_bit(bit=16, block=4) = 0 [ 780.189107][T29665] EXT4-fs error (device loop4): ext4_orphan_get:1411: comm syz-executor.4: bad orphan inode 17 [ 780.196430][T29657] EXT4-fs (loop3): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 780.202951][T29672] EXT4-fs error (device loop5): ext4_orphan_get:1411: comm syz-executor.5: bad orphan inode 17 [ 780.215064][T29657] ext4 filesystem being mounted at /root/syzkaller-testdir862710153/syzkaller.8DTWy3/1816/file0 supports timestamps until 2038 (0x7fffffff) [ 780.239034][T29672] ext4_test_bit(bit=16, block=4) = 0 [ 780.244432][T29665] ext4_test_bit(bit=16, block=4) = 0 [ 780.256401][T29665] EXT4-fs (loop4): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 780.271359][T29676] EXT4-fs error (device loop0): ext4_orphan_get:1411: comm syz-executor.0: bad orphan inode 17 [ 780.281849][T29672] EXT4-fs (loop5): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 780.282009][T29672] ext4 filesystem being mounted at /root/syzkaller-testdir546118600/syzkaller.crFpTh/1726/file0 supports timestamps until 2038 (0x7fffffff) [ 780.310396][T29665] ext4 filesystem being mounted at /root/syzkaller-testdir361905062/syzkaller.3sALX4/1701/file0 supports timestamps until 2038 (0x7fffffff) [ 780.333722][T29676] ext4_test_bit(bit=16, block=4) = 0 [ 780.339255][T29676] EXT4-fs (loop0): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. 07:03:01 executing program 2: syz_usb_connect(0x0, 0x2d, &(0x7f0000000380)=ANY=[@ANYBLOB="12010000a504bd40eb030200c0ba0000000109021b0001000000000904000001b504b100090581d8bf17289c1f1bef5a9cf37906f1b221271bab2fef48604868c81bf389aa172b0a470f391f140592bbd4423ab8aec397eda6db964ec02515ba13319eac9f505c263890696f17c995f55ddb964af449c8335e4df2dd049289353a6349e2fcb280f225a0026ab50f", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="c209cc7f01c60a532720661a64ddeb05a97de4ce54f341fd9663cf9b0b9c5170d7ab30f9f99ff1d58d5abf8d02c1018a668c045575cb87e81aeb7cbf188f293942edc87d764fb76d17c592b9def1758db71f4e93fbc6abf50608b0d65988cc6171425e575e93af57f3620d33bc465dab5381f9182a5b5e0d38b20d9207771f05ed25e482538945fa5109a24c885ef0b75ebe3919447cb685de0dc668bfe4f0738d361ecf723912ded2414dc16747a19345820409e18621c4"], 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0xc7c8, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000540)) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000e40)=[0x3fb, 0x3]) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000080)) 07:03:01 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 07:03:01 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) 07:03:01 executing program 5 (fault-call:5 fault-nth:0): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:01 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 780.382804][T29676] ext4 filesystem being mounted at /root/syzkaller-testdir479981418/syzkaller.slpvwc/1767/file0 supports timestamps until 2038 (0x7fffffff) 07:03:01 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000180)=0x5) [ 780.483821][T29697] loop1: detected capacity change from 1024 to 0 [ 780.546732][T29709] FAULT_INJECTION: forcing a failure. [ 780.546732][T29709] name failslab, interval 1, probability 0, space 0, times 1 [ 780.559355][T29709] CPU: 1 PID: 29709 Comm: syz-executor.5 Not tainted 5.11.0-rc1-syzkaller #0 [ 780.568188][T29709] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 780.578255][T29709] Call Trace: [ 780.581511][T29709] dump_stack+0x116/0x15d [ 780.585854][T29709] should_fail+0x231/0x240 [ 780.590387][T29709] __should_failslab+0x81/0x90 [ 780.595136][T29709] ? sock_common_setsockopt+0x5d/0x70 [ 780.600547][T29709] should_failslab+0x5/0x20 [ 780.605107][T29709] __kmalloc_track_caller+0x57/0x360 [ 780.610377][T29709] ? get_pid_task+0x90/0xc0 [ 780.614906][T29709] sctp_setsockopt+0x7c/0x82f0 [ 780.619654][T29709] sock_common_setsockopt+0x5d/0x70 [ 780.624849][T29709] ? sock_common_recvmsg+0xe0/0xe0 [ 780.629941][T29709] __sys_setsockopt+0x2e8/0x460 [ 780.634790][T29709] __x64_sys_setsockopt+0x62/0x70 [ 780.639830][T29709] do_syscall_64+0x39/0x80 [ 780.644242][T29709] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 780.650137][T29709] RIP: 0033:0x45e219 [ 780.654007][T29709] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 780.673596][T29709] RSP: 002b:00007f8456250c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 780.681991][T29709] RAX: ffffffffffffffda RBX: 0000000000000007 RCX: 000000000045e219 07:03:01 executing program 5 (fault-call:5 fault-nth:1): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 780.689959][T29709] RDX: 0000000000000064 RSI: 0000000000000084 RDI: 0000000000000003 [ 780.697928][T29709] RBP: 00007f8456250ca0 R08: 0000000000000054 R09: 0000000000000000 [ 780.705881][T29709] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000000 [ 780.706520][T27347] usb 3-1: new high-speed USB device number 9 using dummy_hcd [ 780.713866][T29709] R13: 00007fff307fe16f R14: 00007f84562519c0 R15: 000000000119bf8c [ 780.760476][T29708] loop3: detected capacity change from 1024 to 0 [ 780.795622][T29697] EXT4-fs error (device loop1): ext4_orphan_get:1411: comm syz-executor.1: bad orphan inode 17 [ 780.810254][T29722] FAULT_INJECTION: forcing a failure. [ 780.810254][T29722] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 780.814399][T29697] ext4_test_bit(bit=16, block=4) = 0 [ 780.823848][T29722] CPU: 0 PID: 29722 Comm: syz-executor.5 Not tainted 5.11.0-rc1-syzkaller #0 [ 780.832560][T29697] EXT4-fs (loop1): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 780.837731][T29722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 780.837744][T29722] Call Trace: [ 780.837752][T29722] dump_stack+0x116/0x15d [ 780.837779][T29722] should_fail+0x231/0x240 [ 780.837798][T29722] should_fail_usercopy+0x16/0x20 [ 780.850930][T29697] ext4 filesystem being mounted at /root/syzkaller-testdir179269531/syzkaller.S04UpC/1784/file0 supports timestamps until 2038 (0x7fffffff) [ 780.859445][T29722] _copy_from_user+0x1c/0xd0 [ 780.859473][T29722] sctp_setsockopt+0xde/0x82f0 [ 780.859519][T29722] sock_common_setsockopt+0x5d/0x70 [ 780.867186][T29718] loop0: detected capacity change from 1024 to 0 [ 780.871459][T29722] ? sock_common_recvmsg+0xe0/0xe0 [ 780.871483][T29722] __sys_setsockopt+0x2e8/0x460 [ 780.921524][T29722] __x64_sys_setsockopt+0x62/0x70 [ 780.921614][T29724] loop4: detected capacity change from 1024 to 0 [ 780.926602][T29722] do_syscall_64+0x39/0x80 [ 780.926627][T29722] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 780.926648][T29722] RIP: 0033:0x45e219 [ 780.926662][T29722] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 780.926677][T29722] RSP: 002b:00007f8456250c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 780.926735][T29722] RAX: ffffffffffffffda RBX: 0000000000000007 RCX: 000000000045e219 [ 780.926747][T29722] RDX: 0000000000000064 RSI: 0000000000000084 RDI: 0000000000000003 [ 780.926758][T29722] RBP: 00007f8456250ca0 R08: 0000000000000054 R09: 0000000000000000 [ 780.926770][T29722] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000001 07:03:01 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) 07:03:01 executing program 5 (fault-call:5 fault-nth:2): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 780.926782][T29722] R13: 00007fff307fe16f R14: 00007f84562519c0 R15: 000000000119bf8c 07:03:01 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 781.047128][T29718] EXT4-fs error (device loop0): ext4_orphan_get:1411: comm syz-executor.0: bad orphan inode 17 [ 781.070914][T29738] FAULT_INJECTION: forcing a failure. [ 781.070914][T29738] name failslab, interval 1, probability 0, space 0, times 0 [ 781.083552][T29738] CPU: 0 PID: 29738 Comm: syz-executor.5 Not tainted 5.11.0-rc1-syzkaller #0 [ 781.087318][T29718] ext4_test_bit(bit=16, block=4) = 0 [ 781.092330][T29738] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 781.092343][T29738] Call Trace: [ 781.092351][T29738] dump_stack+0x116/0x15d [ 781.092387][T29738] should_fail+0x231/0x240 [ 781.097883][T29718] EXT4-fs (loop0): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 781.107740][T29738] ? sctp_get_port_local+0x428/0xa80 [ 781.107766][T29738] __should_failslab+0x81/0x90 [ 781.107786][T29738] should_failslab+0x5/0x20 [ 781.111318][T29718] ext4 filesystem being mounted at /root/syzkaller-testdir479981418/syzkaller.slpvwc/1768/file0 supports timestamps until 2038 (0x7fffffff) [ 781.115388][T29738] kmem_cache_alloc+0x36/0x2e0 [ 781.115413][T29738] ? inet_get_local_port_range+0x10b/0x120 [ 781.115436][T29738] sctp_get_port_local+0x428/0xa80 [ 781.175839][T29738] sctp_do_bind+0x38d/0x4a0 [ 781.180323][T29738] sctp_setsockopt_bindx+0x1ee/0x2c0 [ 781.185635][T29738] sctp_setsockopt+0x11f1/0x82f0 [ 781.190550][T29738] sock_common_setsockopt+0x5d/0x70 [ 781.195726][T29738] ? sock_common_recvmsg+0xe0/0xe0 [ 781.200849][T29738] __sys_setsockopt+0x2e8/0x460 [ 781.205758][T29738] __x64_sys_setsockopt+0x62/0x70 [ 781.210770][T29738] do_syscall_64+0x39/0x80 [ 781.215236][T29738] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 781.221161][T29738] RIP: 0033:0x45e219 [ 781.225086][T29738] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 07:03:02 executing program 5 (fault-call:5 fault-nth:3): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 781.244691][T29738] RSP: 002b:00007f8456250c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 781.253081][T29738] RAX: ffffffffffffffda RBX: 0000000000000007 RCX: 000000000045e219 [ 781.261038][T29738] RDX: 0000000000000064 RSI: 0000000000000084 RDI: 0000000000000003 [ 781.268997][T29738] RBP: 00007f8456250ca0 R08: 0000000000000054 R09: 0000000000000000 [ 781.276967][T29738] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000002 [ 781.284952][T29738] R13: 00007fff307fe16f R14: 00007f84562519c0 R15: 000000000119bf8c 07:03:02 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 781.347552][T29740] loop3: detected capacity change from 1024 to 0 [ 781.353752][T29748] FAULT_INJECTION: forcing a failure. [ 781.353752][T29748] name failslab, interval 1, probability 0, space 0, times 0 [ 781.366538][T29748] CPU: 1 PID: 29748 Comm: syz-executor.5 Not tainted 5.11.0-rc1-syzkaller #0 [ 781.375292][T29748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 781.385422][T29748] Call Trace: [ 781.385567][T27347] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1983, setting to 64 [ 781.388692][T29748] dump_stack+0x116/0x15d [ 781.403819][T29748] should_fail+0x231/0x240 [ 781.408231][T29748] __should_failslab+0x81/0x90 [ 781.412992][T29748] ? sctp_add_bind_addr+0x7b/0x1c0 [ 781.414503][T27347] usb 3-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 781.418108][T29748] should_failslab+0x5/0x20 [ 781.418127][T29748] kmem_cache_alloc_trace+0x39/0x320 [ 781.418146][T29748] ? _raw_spin_unlock_bh+0x33/0x40 [ 781.418165][T29748] sctp_add_bind_addr+0x7b/0x1c0 [ 781.418182][T29748] sctp_do_bind+0x418/0x4a0 [ 781.451389][T29748] sctp_setsockopt_bindx+0x1ee/0x2c0 [ 781.451754][T27347] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 781.456694][T29748] sctp_setsockopt+0x11f1/0x82f0 [ 781.456717][T29748] sock_common_setsockopt+0x5d/0x70 [ 781.456736][T29748] ? sock_common_recvmsg+0xe0/0xe0 [ 781.474750][T27347] usb 3-1: config 0 descriptor?? [ 781.474886][T29748] __sys_setsockopt+0x2e8/0x460 [ 781.489789][T29748] __x64_sys_setsockopt+0x62/0x70 [ 781.494839][T29748] do_syscall_64+0x39/0x80 [ 781.499235][T29748] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 781.505115][T29748] RIP: 0033:0x45e219 [ 781.509018][T29748] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 781.528641][T29748] RSP: 002b:00007f8456250c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 781.537046][T29748] RAX: ffffffffffffffda RBX: 0000000000000007 RCX: 000000000045e219 [ 781.544998][T29748] RDX: 0000000000000064 RSI: 0000000000000084 RDI: 0000000000000003 [ 781.552946][T29748] RBP: 00007f8456250ca0 R08: 0000000000000054 R09: 0000000000000000 [ 781.555174][T27347] rc_core: IR keymap rc-hauppauge not found [ 781.561007][T29748] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000003 [ 781.568434][T27347] Registered IR keymap rc-empty [ 781.574830][T29748] R13: 00007fff307fe16f R14: 00007f84562519c0 R15: 000000000119bf8c [ 781.593861][T27347] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0 [ 781.609535][T27347] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0/input8 [ 781.666434][T29757] loop1: detected capacity change from 1024 to 0 [ 781.673772][T29764] loop4: detected capacity change from 1024 to 0 [ 781.699801][T29757] EXT4-fs error (device loop1): ext4_orphan_get:1411: comm syz-executor.1: bad orphan inode 17 [ 781.711242][T29757] ext4_test_bit(bit=16, block=4) = 0 [ 781.720903][T29764] EXT4-fs error (device loop4): ext4_orphan_get:1411: comm syz-executor.4: bad orphan inode 17 [ 781.732965][T29757] EXT4-fs (loop1): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 781.745698][T29757] ext4 filesystem being mounted at /root/syzkaller-testdir179269531/syzkaller.S04UpC/1785/file0 supports timestamps until 2038 (0x7fffffff) [ 781.752764][ T9794] usb 3-1: USB disconnect, device number 9 [ 781.770538][T29764] ext4_test_bit(bit=16, block=4) = 0 [ 781.776307][T29764] EXT4-fs (loop4): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 781.816773][T29764] ext4 filesystem being mounted at /root/syzkaller-testdir361905062/syzkaller.3sALX4/1703/file0 supports timestamps until 2038 (0x7fffffff) 07:03:03 executing program 2: syz_usb_connect(0x0, 0x2d, &(0x7f0000000380)=ANY=[@ANYBLOB="12010000a504bd40eb030200c0ba0000000109021b0001000000000904000001b504b100090581d8bf17289c1f1bef5a9cf37906f1b221271bab2fef48604868c81bf389aa172b0a470f391f140592bbd4423ab8aec397eda6db964ec02515ba13319eac9f505c263890696f17c995f55ddb964af449c8335e4df2dd049289353a6349e2fcb280f225a0026ab50f", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="c209cc7f01c60a532720661a64ddeb05a97de4ce54f341fd9663cf9b0b9c5170d7ab30f9f99ff1d58d5abf8d02c1018a668c045575cb87e81aeb7cbf188f293942edc87d764fb76d17c592b9def1758db71f4e93fbc6abf50608b0d65988cc6171425e575e93af57f3620d33bc465dab5381f9182a5b5e0d38b20d9207771f05ed25e482538945fa5109a24c885ef0b75ebe3919447cb685de0dc668bfe4f0738d361ecf723912ded2414dc16747a19345820409e18621c4"], 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0xc7c8, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000540)) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000e40)=[0x3fb, 0x3]) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000080)) 07:03:03 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000180)=0x5) 07:03:03 executing program 5 (fault-call:5 fault-nth:4): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:03 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) 07:03:03 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 07:03:03 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 782.416145][T29801] loop4: detected capacity change from 1024 to 0 [ 782.417062][T29804] FAULT_INJECTION: forcing a failure. [ 782.417062][T29804] name failslab, interval 1, probability 0, space 0, times 0 [ 782.435373][T29804] CPU: 1 PID: 29804 Comm: syz-executor.5 Not tainted 5.11.0-rc1-syzkaller #0 [ 782.442903][T29802] loop1: detected capacity change from 1024 to 0 [ 782.444162][T29804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 782.460534][T29804] Call Trace: [ 782.463807][T29804] dump_stack+0x116/0x15d [ 782.468151][T29804] should_fail+0x231/0x240 [ 782.472600][T29804] __should_failslab+0x81/0x90 [ 782.477360][T29804] ? sctp_add_bind_addr+0x7b/0x1c0 [ 782.482464][T29804] should_failslab+0x5/0x20 [ 782.486957][T29804] kmem_cache_alloc_trace+0x39/0x320 [ 782.492239][T29804] ? _raw_spin_unlock_bh+0x33/0x40 [ 782.497361][T29804] sctp_add_bind_addr+0x7b/0x1c0 [ 782.502290][T29804] sctp_do_bind+0x418/0x4a0 [ 782.506848][T29804] sctp_setsockopt_bindx+0x1ee/0x2c0 [ 782.512129][T29804] sctp_setsockopt+0x11f1/0x82f0 [ 782.517112][T29804] sock_common_setsockopt+0x5d/0x70 [ 782.522303][T29804] ? sock_common_recvmsg+0xe0/0xe0 [ 782.527488][T29804] __sys_setsockopt+0x2e8/0x460 [ 782.532333][T29804] __x64_sys_setsockopt+0x62/0x70 [ 782.537408][T29804] do_syscall_64+0x39/0x80 [ 782.541854][T29804] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 782.547766][T29804] RIP: 0033:0x45e219 [ 782.551652][T29804] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 782.571271][T29804] RSP: 002b:00007f8456250c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 782.579683][T29804] RAX: ffffffffffffffda RBX: 0000000000000007 RCX: 000000000045e219 [ 782.587648][T29804] RDX: 0000000000000064 RSI: 0000000000000084 RDI: 0000000000000003 [ 782.595658][T29804] RBP: 00007f8456250ca0 R08: 0000000000000054 R09: 0000000000000000 [ 782.603619][T29804] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000004 07:03:03 executing program 5 (fault-call:5 fault-nth:5): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 782.611580][T29804] R13: 00007fff307fe16f R14: 00007f84562519c0 R15: 000000000119bf8c [ 782.628453][T29803] loop0: detected capacity change from 1024 to 0 [ 782.640560][T29805] loop3: detected capacity change from 1024 to 0 [ 782.709190][T29803] EXT4-fs error (device loop0): ext4_orphan_get:1411: comm syz-executor.0: bad orphan inode 17 [ 782.721086][T29801] EXT4-fs error (device loop4): ext4_orphan_get:1411: comm syz-executor.4: bad orphan inode 17 [ 782.739767][T29802] EXT4-fs error (device loop1): ext4_orphan_get:1411: comm syz-executor.1: bad orphan inode 17 [ 782.756206][T29801] ext4_test_bit(bit=16, block=4) = 0 [ 782.756304][T29803] ext4_test_bit(bit=16, block=4) = 0 [ 782.761624][T29802] ext4_test_bit(bit=16, block=4) = 0 [ 782.767118][T29803] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 782.776510][T27347] usb 3-1: new high-speed USB device number 10 using dummy_hcd [ 782.790852][T29803] ext4 filesystem being mounted at /root/syzkaller-testdir479981418/syzkaller.slpvwc/1769/file0 supports timestamps until 2038 (0x7fffffff) [ 782.792280][T29801] EXT4-fs (loop4): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 782.806082][T29802] EXT4-fs (loop1): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 782.821358][T29801] ext4 filesystem being mounted at /root/syzkaller-testdir361905062/syzkaller.3sALX4/1704/file0 supports timestamps until 2038 (0x7fffffff) [ 782.828785][T29802] ext4 filesystem being mounted at /root/syzkaller-testdir179269531/syzkaller.S04UpC/1786/file0 supports timestamps until 2038 (0x7fffffff) [ 782.849434][T29829] FAULT_INJECTION: forcing a failure. [ 782.849434][T29829] name failslab, interval 1, probability 0, space 0, times 0 [ 782.876533][T29829] CPU: 1 PID: 29829 Comm: syz-executor.5 Not tainted 5.11.0-rc1-syzkaller #0 [ 782.885365][T29829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 782.895407][T29829] Call Trace: [ 782.898681][T29829] dump_stack+0x116/0x15d [ 782.903079][T29829] should_fail+0x231/0x240 [ 782.907559][T29829] __should_failslab+0x81/0x90 [ 782.912320][T29829] ? sctp_add_bind_addr+0x7b/0x1c0 [ 782.917424][T29829] should_failslab+0x5/0x20 [ 782.921932][T29829] kmem_cache_alloc_trace+0x39/0x320 [ 782.927236][T29829] ? _raw_spin_unlock_bh+0x33/0x40 [ 782.932342][T29829] sctp_add_bind_addr+0x7b/0x1c0 [ 782.937278][T29829] sctp_do_bind+0x418/0x4a0 [ 782.941776][T29829] sctp_bindx_rem+0x28e/0x340 [ 782.946456][T29829] sctp_setsockopt_bindx+0x27d/0x2c0 [ 782.951740][T29829] sctp_setsockopt+0x11f1/0x82f0 [ 782.956728][T29829] sock_common_setsockopt+0x5d/0x70 [ 782.961933][T29829] ? sock_common_recvmsg+0xe0/0xe0 [ 782.967043][T29829] __sys_setsockopt+0x2e8/0x460 [ 782.971937][T29829] __x64_sys_setsockopt+0x62/0x70 [ 782.977009][T29829] do_syscall_64+0x39/0x80 [ 782.981451][T29829] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 782.987351][T29829] RIP: 0033:0x45e219 [ 782.991236][T29829] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 783.010891][T29829] RSP: 002b:00007f8456250c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 783.019298][T29829] RAX: ffffffffffffffda RBX: 0000000000000007 RCX: 000000000045e219 [ 783.027312][T29829] RDX: 0000000000000064 RSI: 0000000000000084 RDI: 0000000000000003 [ 783.035278][T29829] RBP: 00007f8456250ca0 R08: 0000000000000054 R09: 0000000000000000 [ 783.043245][T29829] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000005 [ 783.051211][T29829] R13: 00007fff307fe16f R14: 00007f84562519c0 R15: 000000000119bf8c 07:03:03 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 07:03:03 executing program 5 (fault-call:5 fault-nth:6): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:03 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 07:03:03 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000180)=0x5) 07:03:03 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000180)=0x5) [ 783.195102][T29839] FAULT_INJECTION: forcing a failure. [ 783.195102][T29839] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 783.208340][T29839] CPU: 0 PID: 29839 Comm: syz-executor.5 Not tainted 5.11.0-rc1-syzkaller #0 [ 783.217085][T29839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 783.227168][T29839] Call Trace: [ 783.230428][T29839] dump_stack+0x116/0x15d [ 783.234845][T29839] should_fail+0x231/0x240 [ 783.239239][T29839] should_fail_usercopy+0x16/0x20 [ 783.244240][T29839] _copy_to_user+0x1c/0x90 [ 783.248638][T29839] simple_read_from_buffer+0xab/0x120 [ 783.254032][T29839] proc_fail_nth_read+0xf6/0x140 [ 783.258949][T29839] ? rw_verify_area+0x136/0x250 [ 783.263801][T29839] ? proc_fault_inject_write+0x200/0x200 [ 783.269412][T29839] vfs_read+0x154/0x5c0 [ 783.273577][T29839] ? __fget_light+0x219/0x260 [ 783.278241][T29839] ksys_read+0xce/0x180 [ 783.282399][T29839] __x64_sys_read+0x3e/0x50 [ 783.286896][T29839] do_syscall_64+0x39/0x80 [ 783.291323][T29839] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 783.297223][T29839] RIP: 0033:0x417b11 [ 783.301339][T29839] Code: 75 14 b8 00 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 6a fc ff ff 48 89 04 24 b8 00 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 783.320922][T29839] RSP: 002b:00007f8456250c70 EFLAGS: 00000293 ORIG_RAX: 0000000000000000 [ 783.329324][T29839] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 0000000000417b11 [ 783.337286][T29839] RDX: 000000000000000f RSI: 00007f8456250cb0 RDI: 0000000000000007 [ 783.345245][T29839] RBP: 00007f8456250ca0 R08: 0000000000000054 R09: 0000000000000000 [ 783.353229][T29839] R10: 0000000020000000 R11: 0000000000000293 R12: 0000000000000006 [ 783.361177][T29839] R13: 00007fff307fe16f R14: 00007f84562519c0 R15: 000000000119bf8c [ 783.373948][T27347] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1983, setting to 64 [ 783.388707][T27347] usb 3-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 783.403610][T27347] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 783.413558][T27347] usb 3-1: config 0 descriptor?? [ 783.432122][T29845] loop0: detected capacity change from 1024 to 0 [ 783.447728][T29846] loop3: detected capacity change from 1024 to 0 [ 783.462413][T29838] loop4: detected capacity change from 1024 to 0 [ 783.479453][T29834] loop1: detected capacity change from 1024 to 0 [ 783.514208][T29846] EXT4-fs error (device loop3): ext4_orphan_get:1411: comm syz-executor.3: bad orphan inode 17 [ 783.525071][T29846] ext4_test_bit(bit=16, block=4) = 0 [ 783.531605][T29846] EXT4-fs (loop3): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 783.540856][T29845] EXT4-fs error (device loop0): ext4_orphan_get:1411: comm syz-executor.0: bad orphan inode 17 [ 783.545223][T27347] rc_core: IR keymap rc-hauppauge not found [ 783.556104][T29845] ext4_test_bit(bit=16, block=4) = 0 [ 783.560123][T29846] ext4 filesystem being mounted at /root/syzkaller-testdir862710153/syzkaller.8DTWy3/1820/file0 supports timestamps until 2038 (0x7fffffff) [ 783.575361][T29845] EXT4-fs (loop0): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 783.591967][T27347] Registered IR keymap rc-empty [ 783.596976][T27347] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0 [ 783.603561][T29845] ext4 filesystem being mounted at /root/syzkaller-testdir479981418/syzkaller.slpvwc/1770/file0 supports timestamps until 2038 (0x7fffffff) [ 783.607458][T27347] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0/input9 [ 783.700230][ T9794] usb 3-1: USB disconnect, device number 10 07:03:04 executing program 2: syz_usb_connect(0x0, 0x2d, &(0x7f0000000380)=ANY=[@ANYBLOB="12010000a504bd40eb030200c0ba0000000109021b0001000000000904000001b504b100090581d8bf17289c1f1bef5a9cf37906f1b221271bab2fef48604868c81bf389aa172b0a470f391f140592bbd4423ab8aec397eda6db964ec02515ba13319eac9f505c263890696f17c995f55ddb964af449c8335e4df2dd049289353a6349e2fcb280f225a0026ab50f", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="c209cc7f01c60a532720661a64ddeb05a97de4ce54f341fd9663cf9b0b9c5170d7ab30f9f99ff1d58d5abf8d02c1018a668c045575cb87e81aeb7cbf188f293942edc87d764fb76d17c592b9def1758db71f4e93fbc6abf50608b0d65988cc6171425e575e93af57f3620d33bc465dab5381f9182a5b5e0d38b20d9207771f05ed25e482538945fa5109a24c885ef0b75ebe3919447cb685de0dc668bfe4f0738d361ecf723912ded2414dc16747a19345820409e18621c4"], 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0xc7c8, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000540)) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000e40)=[0x3fb, 0x3]) 07:03:04 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 07:03:04 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 07:03:04 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:04 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 07:03:04 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000180)=0x5) [ 784.248901][T29895] loop4: detected capacity change from 1024 to 0 [ 784.266223][T29898] loop1: detected capacity change from 1024 to 0 [ 784.288203][T29902] loop3: detected capacity change from 1024 to 0 07:03:05 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x2, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 784.297952][T29895] EXT4-fs error (device loop4): ext4_orphan_get:1411: comm syz-executor.4: bad orphan inode 17 [ 784.309107][T29895] ext4_test_bit(bit=16, block=4) = 0 [ 784.310386][T29904] loop0: detected capacity change from 1024 to 0 [ 784.314478][T29895] EXT4-fs (loop4): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 784.332602][T29895] ext4 filesystem being mounted at /root/syzkaller-testdir361905062/syzkaller.3sALX4/1706/file0 supports timestamps until 2038 (0x7fffffff) 07:03:05 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 784.396457][T29898] EXT4-fs error (device loop1): ext4_orphan_get:1411: comm syz-executor.1: bad orphan inode 17 [ 784.422309][T29902] EXT4-fs error (device loop3): ext4_orphan_get:1411: comm syz-executor.3: bad orphan inode 17 [ 784.423092][T29904] EXT4-fs error (device loop0): ext4_orphan_get:1411: comm syz-executor.0: bad orphan inode 17 [ 784.449887][T29904] ext4_test_bit(bit=16, block=4) = 0 [ 784.456344][T29904] EXT4-fs (loop0): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 784.459011][T29898] ext4_test_bit(bit=16, block=4) = 0 [ 784.475210][T29898] EXT4-fs (loop1): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 784.476065][T29902] ext4_test_bit(bit=16, block=4) = 0 07:03:05 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x3, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 784.487147][T29898] ext4 filesystem being mounted at /root/syzkaller-testdir179269531/syzkaller.S04UpC/1788/file0 supports timestamps until 2038 (0x7fffffff) [ 784.502218][T29902] EXT4-fs (loop3): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 784.507864][T29904] ext4 filesystem being mounted at /root/syzkaller-testdir479981418/syzkaller.slpvwc/1771/file0 supports timestamps until 2038 (0x7fffffff) [ 784.532908][T29902] ext4 filesystem being mounted at /root/syzkaller-testdir862710153/syzkaller.8DTWy3/1821/file0 supports timestamps until 2038 (0x7fffffff) 07:03:05 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000180)=0x5) 07:03:05 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 07:03:05 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000180)=0x5) [ 784.585170][ T17] usb 3-1: new high-speed USB device number 11 using dummy_hcd 07:03:05 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x4, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 784.655017][T29941] loop0: detected capacity change from 1024 to 0 [ 784.688155][T29938] loop4: detected capacity change from 1024 to 0 [ 784.771866][T29941] EXT4-fs error (device loop0): ext4_orphan_get:1411: comm syz-executor.0: bad orphan inode 17 [ 784.785887][T29938] EXT4-fs error (device loop4): ext4_orphan_get:1411: comm syz-executor.4: bad orphan inode 17 [ 784.787152][T29941] ext4_test_bit(bit=16, block=4) = 0 [ 784.804202][T29941] EXT4-fs (loop0): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 784.812104][T29938] ext4_test_bit(bit=16, block=4) = 0 [ 784.816132][T29941] ext4 filesystem being mounted at /root/syzkaller-testdir479981418/syzkaller.slpvwc/1772/file0 supports timestamps until 2038 (0x7fffffff) [ 784.824999][T29962] loop3: detected capacity change from 1024 to 0 [ 784.852810][T29938] EXT4-fs (loop4): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 784.870695][T29938] ext4 filesystem being mounted at /root/syzkaller-testdir361905062/syzkaller.3sALX4/1707/file0 supports timestamps until 2038 (0x7fffffff) [ 784.872080][T29963] loop1: detected capacity change from 1024 to 0 [ 784.958013][T29962] EXT4-fs error (device loop3): ext4_orphan_get:1411: comm syz-executor.3: bad orphan inode 17 [ 784.960707][T29963] EXT4-fs error (device loop1): ext4_orphan_get:1411: comm syz-executor.1: bad orphan inode 17 [ 784.979555][T29962] ext4_test_bit(bit=16, block=4) = 0 [ 784.979836][T29963] ext4_test_bit(bit=16, block=4) = 0 [ 784.988538][T29962] EXT4-fs (loop3): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 784.991267][T29963] EXT4-fs (loop1): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 785.004130][ T17] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1983, setting to 64 [ 785.014754][T29963] ext4 filesystem being mounted at /root/syzkaller-testdir179269531/syzkaller.S04UpC/1789/file0 supports timestamps until 2038 (0x7fffffff) [ 785.036101][T29962] ext4 filesystem being mounted at /root/syzkaller-testdir862710153/syzkaller.8DTWy3/1822/file0 supports timestamps until 2038 (0x7fffffff) [ 785.053464][ T17] usb 3-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 785.062682][ T17] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 785.071512][ T17] usb 3-1: config 0 descriptor?? [ 785.206188][ T17] rc_core: IR keymap rc-hauppauge not found [ 785.212113][ T17] Registered IR keymap rc-empty [ 785.217474][ T17] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0 [ 785.232396][ T17] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0/input10 [ 785.340569][ T17] usb 3-1: USB disconnect, device number 11 07:03:06 executing program 2: syz_usb_connect(0x0, 0x2d, &(0x7f0000000380)=ANY=[@ANYBLOB="12010000a504bd40eb030200c0ba0000000109021b0001000000000904000001b504b100090581d8bf17289c1f1bef5a9cf37906f1b221271bab2fef48604868c81bf389aa172b0a470f391f140592bbd4423ab8aec397eda6db964ec02515ba13319eac9f505c263890696f17c995f55ddb964af449c8335e4df2dd049289353a6349e2fcb280f225a0026ab50f", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="c209cc7f01c60a532720661a64ddeb05a97de4ce54f341fd9663cf9b0b9c5170d7ab30f9f99ff1d58d5abf8d02c1018a668c045575cb87e81aeb7cbf188f293942edc87d764fb76d17c592b9def1758db71f4e93fbc6abf50608b0d65988cc6171425e575e93af57f3620d33bc465dab5381f9182a5b5e0d38b20d9207771f05ed25e482538945fa5109a24c885ef0b75ebe3919447cb685de0dc668bfe4f0738d361ecf723912ded2414dc16747a19345820409e18621c4"], 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0xc7c8, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000e40)=[0x3fb, 0x3]) 07:03:06 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x5, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:06 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000180)=0x5) 07:03:06 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 07:03:06 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 07:03:06 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb740309365f93375358c82a62ff9e735493928e99341915eeff6eeb516a74f915e3ef5f2a0c1bc7b9a6bdd1662a79287fb1746faf3ff9ba4245a3b7e1d8d89f97c91085461de0431c5b3bac20c55a8e6268e00344a701ffcd03c6d032f1cb5091edae929851b3017a47cdbac5bb4cde7ec4c9f1b9d99cfd0e39813023ea3e16c9"], 0x74, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x6400) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 07:03:06 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x6, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 785.895398][T30004] loop0: detected capacity change from 1024 to 0 [ 785.910051][T30006] loop3: detected capacity change from 1024 to 0 [ 785.928640][T30005] loop1: detected capacity change from 1024 to 0 [ 785.939644][T30008] loop4: detected capacity change from 1024 to 0 [ 785.977614][T30006] EXT4-fs error (device loop3): ext4_orphan_get:1411: comm syz-executor.3: bad orphan inode 17 [ 785.990897][T30004] EXT4-fs error (device loop0): ext4_orphan_get:1411: comm syz-executor.0: bad orphan inode 17 [ 785.997270][T30005] EXT4-fs error (device loop1): ext4_orphan_get:1411: comm syz-executor.1: bad orphan inode 17 [ 786.011975][T30006] ext4_test_bit(bit=16, block=4) = 0 [ 786.017470][T30006] EXT4-fs (loop3): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 786.030284][T30005] ext4_test_bit(bit=16, block=4) = 0 [ 786.036310][T30005] ext4 filesystem being mounted at /root/syzkaller-testdir179269531/syzkaller.S04UpC/1790/file0 supports timestamps until 2038 (0x7fffffff) [ 786.036940][T30008] EXT4-fs error (device loop4): ext4_orphan_get:1411: comm syz-executor.4: bad orphan inode 17 [ 786.051606][T30006] ext4 filesystem being mounted at /root/syzkaller-testdir862710153/syzkaller.8DTWy3/1823/file0 supports timestamps until 2038 (0x7fffffff) [ 786.077076][T30004] ext4_test_bit(bit=16, block=4) = 0 [ 786.079213][T30008] ext4_test_bit(bit=16, block=4) = 0 [ 786.088473][T30008] ext4 filesystem being mounted at /root/syzkaller-testdir361905062/syzkaller.3sALX4/1708/file0 supports timestamps until 2038 (0x7fffffff) [ 786.105964][T30004] ext4 filesystem being mounted at /root/syzkaller-testdir479981418/syzkaller.slpvwc/1773/file0 supports timestamps until 2038 (0x7fffffff) 07:03:06 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 07:03:06 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000180)=0x5) 07:03:06 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x7, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:06 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:06 executing program 3: syz_usb_connect(0x0, 0x2d, &(0x7f0000000380)=ANY=[@ANYBLOB="12010000a504bd40eb030200c0ba0000000109021b0001000000000904000001b504b100090581d8bf17289c1f1bef5a9cf37906f1b221271bab2fef48604868c81bf389aa172b0a470f391f140592bbd4423ab8aec397eda6db964ec02515ba13319eac9f505c263890696f17c995f55ddb964af449c8335e4df2dd049289353a6349e2fcb280f225a0026ab50f", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="c209cc7f01c60a532720661a64ddeb05a97de4ce54f341fd9663cf9b0b9c5170d7ab30f9f99ff1d58d5abf8d02c1018a668c045575cb87e81aeb7cbf188f293942edc87d764fb76d17c592b9def1758db71f4e93fbc6abf50608b0d65988cc6171425e575e93af57f3620d33bc465dab5381f9182a5b5e0d38b20d9207771f05ed25e482538945fa5109a24c885ef0b75ebe3919447cb685de0dc668bfe4f0738d361ecf723912ded2414dc16747a19345820409e18621c4"], 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0xc7c8, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000540)) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000e40)=[0x3fb, 0x3]) [ 786.185176][ T8823] usb 3-1: new high-speed USB device number 12 using dummy_hcd [ 786.414507][T30053] loop1: detected capacity change from 1024 to 0 [ 786.428262][T30057] loop4: detected capacity change from 1024 to 0 [ 786.442959][T30058] loop0: detected capacity change from 1024 to 0 [ 786.461007][T30057] EXT4-fs error (device loop4): ext4_orphan_get:1411: comm syz-executor.4: bad orphan inode 17 [ 786.473797][T30053] EXT4-fs error (device loop1): ext4_orphan_get:1411: comm syz-executor.1: bad orphan inode 17 [ 786.484857][T30053] ext4_test_bit(bit=16, block=4) = 0 [ 786.491221][T30058] EXT4-fs error (device loop0): ext4_orphan_get:1411: comm syz-executor.0: bad orphan inode 17 [ 786.491449][T30053] ext4 filesystem being mounted at /root/syzkaller-testdir179269531/syzkaller.S04UpC/1791/file0 supports timestamps until 2038 (0x7fffffff) [ 786.501711][T30057] ext4_test_bit(bit=16, block=4) = 0 [ 786.550215][T30058] ext4_test_bit(bit=16, block=4) = 0 [ 786.561153][T30057] ext4 filesystem being mounted at /root/syzkaller-testdir361905062/syzkaller.3sALX4/1709/file0 supports timestamps until 2038 (0x7fffffff) [ 786.575668][ T8823] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1983, setting to 64 [ 786.575704][ T8823] usb 3-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 786.575728][ T8823] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 786.588692][T30058] ext4 filesystem being mounted at /root/syzkaller-testdir479981418/syzkaller.slpvwc/1774/file0 supports timestamps until 2038 (0x7fffffff) [ 786.659781][ T8823] usb 3-1: config 0 descriptor?? [ 786.685193][ T17] usb 4-1: new high-speed USB device number 2 using dummy_hcd [ 786.745209][ T8823] rc_core: IR keymap rc-hauppauge not found [ 786.751100][ T8823] Registered IR keymap rc-empty [ 786.756478][ T8823] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0 [ 786.775809][ T8823] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0/input11 [ 786.909297][ T8823] usb 3-1: USB disconnect, device number 12 [ 787.075601][ T17] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1983, setting to 64 [ 787.086595][ T17] usb 4-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 787.096220][ T17] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 787.104890][ T17] usb 4-1: config 0 descriptor?? [ 787.195224][ T17] rc_core: IR keymap rc-hauppauge not found [ 787.201136][ T17] Registered IR keymap rc-empty [ 787.206553][ T17] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.3/usb4/4-1/4-1:0.0/rc/rc0 [ 787.221864][ T17] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.3/usb4/4-1/4-1:0.0/rc/rc0/input12 [ 787.363781][ T17] usb 4-1: USB disconnect, device number 2 07:03:08 executing program 2: syz_usb_connect(0x0, 0x2d, &(0x7f0000000380)=ANY=[@ANYBLOB="12010000a504bd40eb030200c0ba0000000109021b0001000000000904000001b504b100090581d8bf17289c1f1bef5a9cf37906f1b221271bab2fef48604868c81bf389aa172b0a470f391f140592bbd4423ab8aec397eda6db964ec02515ba13319eac9f505c263890696f17c995f55ddb964af449c8335e4df2dd049289353a6349e2fcb280f225a0026ab50f", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="c209cc7f01c60a532720661a64ddeb05a97de4ce54f341fd9663cf9b0b9c5170d7ab30f9f99ff1d58d5abf8d02c1018a668c045575cb87e81aeb7cbf188f293942edc87d764fb76d17c592b9def1758db71f4e93fbc6abf50608b0d65988cc6171425e575e93af57f3620d33bc465dab5381f9182a5b5e0d38b20d9207771f05ed25e482538945fa5109a24c885ef0b75ebe3919447cb685de0dc668bfe4f0738d361ecf723912ded2414dc16747a19345820409e18621c4"], 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0xc7c8, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000e40)=[0x3fb, 0x3]) 07:03:08 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x8, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:08 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:08 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000180)=0x5) 07:03:08 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 07:03:08 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x9, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 787.456120][T30127] loop1: detected capacity change from 1024 to 0 [ 787.472541][T30128] loop0: detected capacity change from 1024 to 0 [ 787.489473][T30131] loop4: detected capacity change from 1024 to 0 [ 787.516036][T30127] EXT4-fs error (device loop1): ext4_orphan_get:1411: comm syz-executor.1: bad orphan inode 17 [ 787.526938][T30127] ext4_test_bit(bit=16, block=4) = 0 [ 787.532531][T30127] ext4 filesystem being mounted at /root/syzkaller-testdir179269531/syzkaller.S04UpC/1792/file0 supports timestamps until 2038 (0x7fffffff) 07:03:08 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0xa, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 787.589299][T30131] EXT4-fs error (device loop4): ext4_orphan_get:1411: comm syz-executor.4: bad orphan inode 17 [ 787.615854][T30131] ext4_test_bit(bit=16, block=4) = 0 [ 787.621394][T30131] ext4 filesystem being mounted at /root/syzkaller-testdir361905062/syzkaller.3sALX4/1710/file0 supports timestamps until 2038 (0x7fffffff) 07:03:08 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 07:03:08 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0xb, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 787.637193][T30128] EXT4-fs error (device loop0): ext4_orphan_get:1411: comm syz-executor.0: bad orphan inode 17 [ 787.673056][T30128] ext4_test_bit(bit=16, block=4) = 0 07:03:08 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:08 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0xc, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 787.678834][T30128] ext4 filesystem being mounted at /root/syzkaller-testdir479981418/syzkaller.slpvwc/1775/file0 supports timestamps until 2038 (0x7fffffff) [ 787.735181][ T3674] usb 3-1: new high-speed USB device number 13 using dummy_hcd [ 787.820876][T30172] loop1: detected capacity change from 1024 to 0 [ 787.833646][T30173] loop4: detected capacity change from 1024 to 0 [ 787.860120][T30172] EXT4-fs error (device loop1): ext4_orphan_get:1411: comm syz-executor.1: bad orphan inode 17 07:03:08 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 787.871042][T30172] ext4_test_bit(bit=16, block=4) = 0 [ 787.876917][T30172] ext4 filesystem being mounted at /root/syzkaller-testdir179269531/syzkaller.S04UpC/1793/file0 supports timestamps until 2038 (0x7fffffff) [ 787.899775][T30173] EXT4-fs error (device loop4): ext4_orphan_get:1411: comm syz-executor.4: bad orphan inode 17 [ 787.917630][T30173] ext4_test_bit(bit=16, block=4) = 0 [ 787.941104][T30173] ext4 filesystem being mounted at /root/syzkaller-testdir361905062/syzkaller.3sALX4/1711/file0 supports timestamps until 2038 (0x7fffffff) [ 787.978241][T30190] loop3: detected capacity change from 1024 to 0 [ 788.105071][T30190] EXT4-fs error (device loop3): ext4_orphan_get:1411: comm syz-executor.3: bad orphan inode 17 [ 788.126233][T30190] ext4_test_bit(bit=16, block=4) = 0 [ 788.131834][T30190] ext4 filesystem being mounted at /root/syzkaller-testdir862710153/syzkaller.8DTWy3/1825/file0 supports timestamps until 2038 (0x7fffffff) [ 788.185208][ T3674] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1983, setting to 64 [ 788.196631][ T3674] usb 3-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 788.212090][ T3674] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 788.221962][ T3674] usb 3-1: config 0 descriptor?? [ 788.335224][ T3674] rc_core: IR keymap rc-hauppauge not found [ 788.341202][ T3674] Registered IR keymap rc-empty [ 788.346737][ T3674] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0 [ 788.360759][ T3674] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0/input13 [ 788.477940][T27347] usb 3-1: USB disconnect, device number 13 07:03:09 executing program 2: syz_usb_connect(0x0, 0x2d, &(0x7f0000000380)=ANY=[@ANYBLOB="12010000a504bd40eb030200c0ba0000000109021b0001000000000904000001b504b100090581d8bf17289c1f1bef5a9cf37906f1b221271bab2fef48604868c81bf389aa172b0a470f391f140592bbd4423ab8aec397eda6db964ec02515ba13319eac9f505c263890696f17c995f55ddb964af449c8335e4df2dd049289353a6349e2fcb280f225a0026ab50f", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="c209cc7f01c60a532720661a64ddeb05a97de4ce54f341fd9663cf9b0b9c5170d7ab30f9f99ff1d58d5abf8d02c1018a668c045575cb87e81aeb7cbf188f293942edc87d764fb76d17c592b9def1758db71f4e93fbc6abf50608b0d65988cc6171425e575e93af57f3620d33bc465dab5381f9182a5b5e0d38b20d9207771f05ed25e482538945fa5109a24c885ef0b75ebe3919447cb685de0dc668bfe4f0738d361ecf723912ded2414dc16747a19345820409e18621c4"], 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0xc7c8, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000e40)=[0x3fb, 0x3]) 07:03:09 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000180)=0x5) 07:03:09 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0xd, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:09 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 07:03:09 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:09 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 789.023875][T30228] loop3: detected capacity change from 1024 to 0 [ 789.039971][T30229] loop1: detected capacity change from 1024 to 0 [ 789.056555][T30232] loop4: detected capacity change from 1024 to 0 [ 789.070931][T30237] loop0: detected capacity change from 1024 to 0 [ 789.079457][T30228] EXT4-fs error (device loop3): ext4_orphan_get:1411: comm syz-executor.3: bad orphan inode 17 07:03:09 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x10, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 789.115285][T30228] ext4_test_bit(bit=16, block=4) = 0 [ 789.123834][T30228] ext4 filesystem being mounted at /root/syzkaller-testdir862710153/syzkaller.8DTWy3/1826/file0 supports timestamps until 2038 (0x7fffffff) [ 789.156068][T30232] EXT4-fs error (device loop4): ext4_orphan_get:1411: comm syz-executor.4: bad orphan inode 17 [ 789.156550][T30229] EXT4-fs error (device loop1): ext4_orphan_get:1411: comm syz-executor.1: bad orphan inode 17 [ 789.177480][T30232] ext4_test_bit(bit=16, block=4) = 0 [ 789.182995][T30229] ext4_test_bit(bit=16, block=4) = 0 [ 789.183676][T30232] ext4 filesystem being mounted at /root/syzkaller-testdir361905062/syzkaller.3sALX4/1712/file0 supports timestamps until 2038 (0x7fffffff) [ 789.194630][T30237] EXT4-fs error (device loop0): ext4_orphan_get:1411: comm syz-executor.0: bad orphan inode 17 [ 789.226387][T30229] ext4 filesystem being mounted at /root/syzkaller-testdir179269531/syzkaller.S04UpC/1794/file0 supports timestamps until 2038 (0x7fffffff) 07:03:10 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 07:03:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 789.255386][T30237] ext4_test_bit(bit=16, block=4) = 0 [ 789.260798][T30237] ext4 filesystem being mounted at /root/syzkaller-testdir479981418/syzkaller.slpvwc/1776/file0 supports timestamps until 2038 (0x7fffffff) 07:03:10 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000180)=0x5) 07:03:10 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x11, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:10 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 789.345251][ T8823] usb 3-1: new high-speed USB device number 14 using dummy_hcd [ 789.476793][T30271] loop3: detected capacity change from 1024 to 0 [ 789.488587][T30275] loop0: detected capacity change from 1024 to 0 [ 789.559950][T30275] EXT4-fs error (device loop0): ext4_orphan_get:1411: comm syz-executor.0: bad orphan inode 17 [ 789.593565][T30292] loop4: detected capacity change from 1024 to 0 [ 789.606962][T30275] ext4_test_bit(bit=16, block=4) = 0 [ 789.612568][T30293] loop1: detected capacity change from 1024 to 0 [ 789.624411][T30275] ext4 filesystem being mounted at /root/syzkaller-testdir479981418/syzkaller.slpvwc/1777/file0 supports timestamps until 2038 (0x7fffffff) [ 789.639961][T30292] EXT4-fs error (device loop4): ext4_orphan_get:1411: comm syz-executor.4: bad orphan inode 17 [ 789.659997][T30292] ext4_test_bit(bit=16, block=4) = 0 [ 789.666105][T30292] ext4 filesystem being mounted at /root/syzkaller-testdir361905062/syzkaller.3sALX4/1713/file0 supports timestamps until 2038 (0x7fffffff) [ 789.708971][T30293] EXT4-fs error (device loop1): ext4_orphan_get:1411: comm syz-executor.1: bad orphan inode 17 [ 789.719936][ T8823] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1983, setting to 64 [ 789.728103][T30293] ext4_test_bit(bit=16, block=4) = 0 [ 789.734093][ T8823] usb 3-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 789.736786][T30293] ext4 filesystem being mounted at /root/syzkaller-testdir179269531/syzkaller.S04UpC/1795/file0 supports timestamps until 2038 (0x7fffffff) [ 789.748574][ T8823] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 789.770393][ T8823] usb 3-1: config 0 descriptor?? [ 789.865178][ T8823] rc_core: IR keymap rc-hauppauge not found [ 789.871082][ T8823] Registered IR keymap rc-empty [ 789.887082][ T8823] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0 [ 789.897621][ T8823] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0/input14 [ 790.022961][ T8823] usb 3-1: USB disconnect, device number 14 07:03:11 executing program 2: syz_usb_connect(0x0, 0x2d, &(0x7f0000000380)=ANY=[@ANYBLOB="12010000a504bd40eb030200c0ba0000000109021b0001000000000904000001b504b100090581d8bf17289c1f1bef5a9cf37906f1b221271bab2fef48604868c81bf389aa172b0a470f391f140592bbd4423ab8aec397eda6db964ec02515ba13319eac9f505c263890696f17c995f55ddb964af449c8335e4df2dd049289353a6349e2fcb280f225a0026ab50f", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="c209cc7f01c60a532720661a64ddeb05a97de4ce54f341fd9663cf9b0b9c5170d7ab30f9f99ff1d58d5abf8d02c1018a668c045575cb87e81aeb7cbf188f293942edc87d764fb76d17c592b9def1758db71f4e93fbc6abf50608b0d65988cc6171425e575e93af57f3620d33bc465dab5381f9182a5b5e0d38b20d9207771f05ed25e482538945fa5109a24c885ef0b75ebe3919447cb685de0dc668bfe4f0738d361ecf723912ded2414dc16747a19345820409e18621c4"], 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0xc7c8, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000540)) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000e40)=[0x3fb, 0x3]) 07:03:11 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x12, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:11 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 07:03:11 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000180)=0x5) 07:03:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:11 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 790.590864][T30337] loop3: detected capacity change from 1024 to 0 [ 790.614588][T30341] loop1: detected capacity change from 1024 to 0 [ 790.631253][T30345] loop4: detected capacity change from 1024 to 0 07:03:11 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x13, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 790.641880][T30344] loop0: detected capacity change from 1024 to 0 [ 790.659743][T30337] EXT4-fs error (device loop3): ext4_orphan_get:1411: comm syz-executor.3: bad orphan inode 17 [ 790.690523][T30337] ext4_test_bit(bit=16, block=4) = 0 [ 790.700310][T30337] ext4 filesystem being mounted at /root/syzkaller-testdir862710153/syzkaller.8DTWy3/1828/file0 supports timestamps until 2038 (0x7fffffff) [ 790.723699][T30344] EXT4-fs error (device loop0): ext4_orphan_get:1411: comm syz-executor.0: bad orphan inode 17 [ 790.737854][T30341] EXT4-fs error (device loop1): ext4_orphan_get:1411: comm syz-executor.1: bad orphan inode 17 [ 790.776073][T30341] ext4_test_bit(bit=16, block=4) = 0 [ 790.782464][T30345] EXT4-fs error (device loop4): ext4_orphan_get:1411: comm syz-executor.4: bad orphan inode 17 07:03:11 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x14, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 790.796736][T30344] ext4_test_bit(bit=16, block=4) = 0 [ 790.823147][T30345] ext4_test_bit(bit=16, block=4) = 0 [ 790.823338][T30341] ext4 filesystem being mounted at /root/syzkaller-testdir179269531/syzkaller.S04UpC/1796/file0 supports timestamps until 2038 (0x7fffffff) [ 790.837589][T30344] ext4 filesystem being mounted at /root/syzkaller-testdir479981418/syzkaller.slpvwc/1778/file0 supports timestamps until 2038 (0x7fffffff) [ 790.860527][T30345] ext4 filesystem being mounted at /root/syzkaller-testdir361905062/syzkaller.3sALX4/1714/file0 supports timestamps until 2038 (0x7fffffff) 07:03:11 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x15, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:11 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:11 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000180)=0x5) [ 790.931695][ T8823] usb 3-1: new high-speed USB device number 15 using dummy_hcd [ 790.940774][T30381] loop3: detected capacity change from 1024 to 0 [ 791.016892][T30381] EXT4-fs error (device loop3): ext4_orphan_get:1411: comm syz-executor.3: bad orphan inode 17 [ 791.042309][T30381] ext4_test_bit(bit=16, block=4) = 0 [ 791.047817][T30381] ext4 filesystem being mounted at /root/syzkaller-testdir862710153/syzkaller.8DTWy3/1829/file0 supports timestamps until 2038 (0x7fffffff) [ 791.084672][T30396] loop1: detected capacity change from 1024 to 0 [ 791.101075][T30395] loop0: detected capacity change from 1024 to 0 [ 791.215943][T30395] EXT4-fs error (device loop0): ext4_orphan_get:1411: comm syz-executor.0: bad orphan inode 17 [ 791.227784][T30396] EXT4-fs error (device loop1): ext4_orphan_get:1411: comm syz-executor.1: bad orphan inode 17 [ 791.245810][T30396] ext4_test_bit(bit=16, block=4) = 0 [ 791.246725][T30395] ext4_test_bit(bit=16, block=4) = 0 [ 791.251334][T30396] ext4 filesystem being mounted at /root/syzkaller-testdir179269531/syzkaller.S04UpC/1797/file0 supports timestamps until 2038 (0x7fffffff) [ 791.267569][T30395] ext4 filesystem being mounted at /root/syzkaller-testdir479981418/syzkaller.slpvwc/1779/file0 supports timestamps until 2038 (0x7fffffff) [ 791.355216][ T8823] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1983, setting to 64 [ 791.366226][ T8823] usb 3-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 791.397291][ T8823] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 791.409178][ T8823] usb 3-1: config 0 descriptor?? [ 791.515167][ T8823] rc_core: IR keymap rc-hauppauge not found [ 791.521158][ T8823] Registered IR keymap rc-empty [ 791.530948][ T8823] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0 [ 791.545010][ T8823] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0/input15 [ 791.659238][ T3674] usb 3-1: USB disconnect, device number 15 07:03:12 executing program 2: syz_usb_connect(0x0, 0x2d, &(0x7f0000000380)=ANY=[@ANYBLOB="12010000a504bd40eb030200c0ba0000000109021b0001000000000904000001b504b100090581d8bf17289c1f1bef5a9cf37906f1b221271bab2fef48604868c81bf389aa172b0a470f391f140592bbd4423ab8aec397eda6db964ec02515ba13319eac9f505c263890696f17c995f55ddb964af449c8335e4df2dd049289353a6349e2fcb280f225a0026ab50f", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="c209cc7f01c60a532720661a64ddeb05a97de4ce54f341fd9663cf9b0b9c5170d7ab30f9f99ff1d58d5abf8d02c1018a668c045575cb87e81aeb7cbf188f293942edc87d764fb76d17c592b9def1758db71f4e93fbc6abf50608b0d65988cc6171425e575e93af57f3620d33bc465dab5381f9182a5b5e0d38b20d9207771f05ed25e482538945fa5109a24c885ef0b75ebe3919447cb685de0dc668bfe4f0738d361ecf723912ded2414dc16747a19345820409e18621c4"], 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0xc7c8, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000540)) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000e40)=[0x3fb, 0x3]) 07:03:12 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x16, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:12 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:12 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:12 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000180)=0x5) 07:03:12 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000180)=0x5) 07:03:12 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x17, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 792.199145][T30442] loop4: detected capacity change from 1024 to 0 [ 792.213502][T30441] loop3: detected capacity change from 1024 to 0 07:03:13 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 792.247079][T30444] loop0: detected capacity change from 1024 to 0 [ 792.277018][T30441] EXT4-fs error (device loop3): ext4_orphan_get:1411: comm syz-executor.3: bad orphan inode 17 [ 792.288028][T30441] ext4_test_bit(bit=16, block=4) = 0 07:03:13 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x18, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 792.288890][T30444] EXT4-fs error (device loop0): ext4_orphan_get:1411: comm syz-executor.0: bad orphan inode 17 [ 792.298260][T30441] ext4 filesystem being mounted at /root/syzkaller-testdir862710153/syzkaller.8DTWy3/1830/file0 supports timestamps until 2038 (0x7fffffff) [ 792.322784][T30444] ext4_test_bit(bit=16, block=4) = 0 [ 792.322891][T30450] loop1: detected capacity change from 1024 to 0 [ 792.330191][T30444] ext4 filesystem being mounted at /root/syzkaller-testdir479981418/syzkaller.slpvwc/1780/file0 supports timestamps until 2038 (0x7fffffff) 07:03:13 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000180)=0x5) [ 792.388443][T30450] EXT4-fs error (device loop1): ext4_orphan_get:1411: comm syz-executor.1: bad orphan inode 17 07:03:13 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x19, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:13 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000180)=0x5) [ 792.441070][T30450] ext4_test_bit(bit=16, block=4) = 0 [ 792.449526][T30450] ext4 filesystem being mounted at /root/syzkaller-testdir179269531/syzkaller.S04UpC/1798/file0 supports timestamps until 2038 (0x7fffffff) [ 792.476502][T30480] loop4: detected capacity change from 1024 to 0 [ 792.495199][ T3674] usb 3-1: new high-speed USB device number 16 using dummy_hcd [ 792.519127][T30483] loop3: detected capacity change from 1024 to 0 [ 792.615315][T30496] loop0: detected capacity change from 1024 to 0 [ 792.622931][T30483] EXT4-fs error (device loop3): ext4_orphan_get:1411: comm syz-executor.3: bad orphan inode 17 [ 792.653045][T30483] ext4_test_bit(bit=16, block=4) = 0 [ 792.660540][T30483] EXT4-fs mount: 29 callbacks suppressed [ 792.660574][T30483] EXT4-fs (loop3): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 792.663473][T30496] EXT4-fs error (device loop0): ext4_orphan_get:1411: comm syz-executor.0: bad orphan inode 17 [ 792.666568][T30483] ext4 filesystem being mounted at /root/syzkaller-testdir862710153/syzkaller.8DTWy3/1831/file0 supports timestamps until 2038 (0x7fffffff) [ 792.680096][T30496] ext4_test_bit(bit=16, block=4) = 0 [ 792.710563][T30496] EXT4-fs (loop0): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 792.722757][T30496] ext4 filesystem being mounted at /root/syzkaller-testdir479981418/syzkaller.slpvwc/1781/file0 supports timestamps until 2038 (0x7fffffff) [ 792.855211][ T3674] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1983, setting to 64 [ 792.880268][ T3674] usb 3-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 792.890482][ T3674] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 792.899765][ T3674] usb 3-1: config 0 descriptor?? [ 792.975172][ T3674] rc_core: IR keymap rc-hauppauge not found [ 792.981095][ T3674] Registered IR keymap rc-empty [ 792.995309][ T3674] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0 [ 793.022183][ T3674] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0/input16 [ 793.138737][ T3674] usb 3-1: USB disconnect, device number 16 07:03:14 executing program 2: syz_usb_connect(0x0, 0x2d, &(0x7f0000000380)=ANY=[@ANYBLOB="12010000a504bd40eb030200c0ba0000000109021b0001000000000904000001b504b100090581d8bf17289c1f1bef5a9cf37906f1b221271bab2fef48604868c81bf389aa172b0a470f391f140592bbd4423ab8aec397eda6db964ec02515ba13319eac9f505c263890696f17c995f55ddb964af449c8335e4df2dd049289353a6349e2fcb280f225a0026ab50f", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="c209cc7f01c60a532720661a64ddeb05a97de4ce54f341fd9663cf9b0b9c5170d7ab30f9f99ff1d58d5abf8d02c1018a668c045575cb87e81aeb7cbf188f293942edc87d764fb76d17c592b9def1758db71f4e93fbc6abf50608b0d65988cc6171425e575e93af57f3620d33bc465dab5381f9182a5b5e0d38b20d9207771f05ed25e482538945fa5109a24c885ef0b75ebe3919447cb685de0dc668bfe4f0738d361ecf723912ded2414dc16747a19345820409e18621c4"], 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0xc7c8, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000540)) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000e40)=[0x3fb, 0x3]) 07:03:14 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x1e, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:14 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:14 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:14 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000180)=0x5) 07:03:14 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000180)=0x5) 07:03:14 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x21, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 793.695947][T30537] loop4: detected capacity change from 1024 to 0 [ 793.707016][T30539] loop1: detected capacity change from 1024 to 0 [ 793.719622][T30542] loop0: detected capacity change from 1024 to 0 [ 793.738293][T30543] loop3: detected capacity change from 1024 to 0 [ 793.780842][T30539] EXT4-fs error (device loop1): ext4_orphan_get:1411: comm syz-executor.1: bad orphan inode 17 [ 793.791449][T30542] EXT4-fs error (device loop0): ext4_orphan_get:1411: comm syz-executor.0: bad orphan inode 17 [ 793.809486][T30543] EXT4-fs error (device loop3): ext4_orphan_get:1411: comm syz-executor.3: bad orphan inode 17 [ 793.820114][T30542] ext4_test_bit(bit=16, block=4) = 0 [ 793.820168][T30539] ext4_test_bit(bit=16, block=4) = 0 07:03:14 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x22, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 793.825552][T30542] EXT4-fs (loop0): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 793.836760][T30543] ext4_test_bit(bit=16, block=4) = 0 [ 793.842917][T30562] loop4: detected capacity change from 1024 to 0 [ 793.850883][T30539] EXT4-fs (loop1): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 793.868297][T30543] EXT4-fs (loop3): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. 07:03:14 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x23, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 793.886832][T30542] ext4 filesystem being mounted at /root/syzkaller-testdir479981418/syzkaller.slpvwc/1782/file0 supports timestamps until 2038 (0x7fffffff) [ 793.894037][T30539] ext4 filesystem being mounted at /root/syzkaller-testdir179269531/syzkaller.S04UpC/1799/file0 supports timestamps until 2038 (0x7fffffff) [ 793.922314][T30543] ext4 filesystem being mounted at /root/syzkaller-testdir862710153/syzkaller.8DTWy3/1832/file0 supports timestamps until 2038 (0x7fffffff) 07:03:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:14 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x24, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 794.025273][ T7] usb 3-1: new high-speed USB device number 17 using dummy_hcd [ 794.096856][T30586] loop4: detected capacity change from 1024 to 0 [ 794.415431][ T7] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1983, setting to 64 [ 794.442945][ T7] usb 3-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 794.456443][ T7] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 794.469215][ T7] usb 3-1: config 0 descriptor?? [ 794.575193][ T7] rc_core: IR keymap rc-hauppauge not found [ 794.581141][ T7] Registered IR keymap rc-empty [ 794.586776][ T7] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0 [ 794.601132][ T7] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0/input17 [ 794.739433][T27188] usb 3-1: USB disconnect, device number 17 07:03:16 executing program 2: syz_usb_connect(0x0, 0x2d, &(0x7f0000000380)=ANY=[@ANYBLOB="12010000a504bd40eb030200c0ba0000000109021b0001000000000904000001b504b100090581d8bf17289c1f1bef5a9cf37906f1b221271bab2fef48604868c81bf389aa172b0a470f391f140592bbd4423ab8aec397eda6db964ec02515ba13319eac9f505c263890696f17c995f55ddb964af449c8335e4df2dd049289353a6349e2fcb280f225a0026ab50f", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="c209cc7f01c60a532720661a64ddeb05a97de4ce54f341fd9663cf9b0b9c5170d7ab30f9f99ff1d58d5abf8d02c1018a668c045575cb87e81aeb7cbf188f293942edc87d764fb76d17c592b9def1758db71f4e93fbc6abf50608b0d65988cc6171425e575e93af57f3620d33bc465dab5381f9182a5b5e0d38b20d9207771f05ed25e482538945fa5109a24c885ef0b75ebe3919447cb685de0dc668bfe4f0738d361ecf723912ded2414dc16747a19345820409e18621c4"], 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000540)) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000e40)=[0x3fb, 0x3]) 07:03:16 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) 07:03:16 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:16 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 07:03:16 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x25, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:16 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x65, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 795.292659][T30630] loop3: detected capacity change from 1024 to 0 [ 795.310855][T30632] loop0: detected capacity change from 1024 to 0 [ 795.322123][T30633] loop4: detected capacity change from 1024 to 0 [ 795.335418][T30634] loop1: detected capacity change from 1024 to 0 [ 795.357776][T30630] EXT4-fs error (device loop3): ext4_orphan_get:1411: comm syz-executor.3: bad orphan inode 17 [ 795.397839][T30630] ext4_test_bit(bit=16, block=4) = 0 07:03:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 795.420191][T30630] EXT4-fs (loop3): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 795.423516][T30634] EXT4-fs error (device loop1): ext4_orphan_get:1411: comm syz-executor.1: bad orphan inode 17 [ 795.436059][T30632] EXT4-fs error (device loop0): ext4_orphan_get:1411: comm syz-executor.0: bad orphan inode 17 [ 795.456362][T30634] ext4_test_bit(bit=16, block=4) = 0 07:03:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 795.461785][T30634] EXT4-fs (loop1): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 795.473884][T30634] ext4 filesystem being mounted at /root/syzkaller-testdir179269531/syzkaller.S04UpC/1800/file0 supports timestamps until 2038 (0x7fffffff) [ 795.487486][T30632] ext4_test_bit(bit=16, block=4) = 0 [ 795.500789][T30630] ext4 filesystem being mounted at /root/syzkaller-testdir862710153/syzkaller.8DTWy3/1833/file0 supports timestamps until 2038 (0x7fffffff) 07:03:16 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 795.536111][T30632] EXT4-fs (loop0): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 795.541145][T30665] loop4: detected capacity change from 256 to 0 [ 795.548154][T30632] ext4 filesystem being mounted at /root/syzkaller-testdir479981418/syzkaller.slpvwc/1783/file0 supports timestamps until 2038 (0x7fffffff) 07:03:16 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) 07:03:16 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 795.585191][ T3674] usb 3-1: new high-speed USB device number 18 using dummy_hcd [ 795.617312][T30665] EXT4-fs (loop4): bad geometry: block count 512 exceeds size of device (128 blocks) [ 795.719220][T30677] loop1: detected capacity change from 1024 to 0 [ 795.851393][T30677] EXT4-fs error (device loop1): ext4_orphan_get:1411: comm syz-executor.1: bad orphan inode 17 [ 795.866386][T30689] loop3: detected capacity change from 1024 to 0 [ 795.867443][T30677] ext4_test_bit(bit=16, block=4) = 0 [ 795.882914][T30691] loop0: detected capacity change from 1024 to 0 [ 795.890545][T30677] EXT4-fs (loop1): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 795.904759][T30677] ext4 filesystem being mounted at /root/syzkaller-testdir179269531/syzkaller.S04UpC/1801/file0 supports timestamps until 2038 (0x7fffffff) [ 795.936988][T30691] EXT4-fs error (device loop0): ext4_orphan_get:1411: comm syz-executor.0: bad orphan inode 17 [ 795.948869][T30691] ext4_test_bit(bit=16, block=4) = 0 [ 795.958359][T30689] EXT4-fs error (device loop3): ext4_orphan_get:1411: comm syz-executor.3: bad orphan inode 17 [ 795.967093][T30691] EXT4-fs (loop0): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 795.983331][T30689] ext4_test_bit(bit=16, block=4) = 0 [ 795.986110][T30691] ext4 filesystem being mounted at /root/syzkaller-testdir479981418/syzkaller.slpvwc/1784/file0 supports timestamps until 2038 (0x7fffffff) [ 796.003219][ T3674] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1983, setting to 64 [ 796.016799][T30689] EXT4-fs (loop3): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 796.031734][ T3674] usb 3-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 796.043031][T30689] ext4 filesystem being mounted at /root/syzkaller-testdir862710153/syzkaller.8DTWy3/1834/file0 supports timestamps until 2038 (0x7fffffff) [ 796.074720][ T3674] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 796.095950][ T3674] usb 3-1: config 0 descriptor?? [ 796.185174][ T3674] rc_core: IR keymap rc-hauppauge not found [ 796.192915][ T3674] Registered IR keymap rc-empty [ 796.198807][ T3674] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0 [ 796.216623][ T3674] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0/input18 [ 796.337571][ T7] usb 3-1: USB disconnect, device number 18 07:03:17 executing program 2: syz_usb_connect(0x0, 0x2d, &(0x7f0000000380)=ANY=[@ANYBLOB="12010000a504bd40eb030200c0ba0000000109021b0001000000000904000001b504b100090581d8bf17289c1f1bef5a9cf37906f1b221271bab2fef48604868c81bf389aa172b0a470f391f140592bbd4423ab8aec397eda6db964ec02515ba13319eac9f505c263890696f17c995f55ddb964af449c8335e4df2dd049289353a6349e2fcb280f225a0026ab50f", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="c209cc7f01c60a532720661a64ddeb05a97de4ce54f341fd9663cf9b0b9c5170d7ab30f9f99ff1d58d5abf8d02c1018a668c045575cb87e81aeb7cbf188f293942edc87d764fb76d17c592b9def1758db71f4e93fbc6abf50608b0d65988cc6171425e575e93af57f3620d33bc465dab5381f9182a5b5e0d38b20d9207771f05ed25e482538945fa5109a24c885ef0b75ebe3919447cb685de0dc668bfe4f0738d361ecf723912ded2414dc16747a19345820409e18621c4"], 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000540)) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000e40)=[0x3fb, 0x3]) 07:03:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:17 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:17 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:17 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) 07:03:17 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) 07:03:17 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x71, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 796.877253][T30730] loop1: detected capacity change from 1024 to 0 [ 796.894228][T30734] loop4: detected capacity change from 256 to 0 07:03:17 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:17 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x72, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 796.937010][T30731] loop3: detected capacity change from 1024 to 0 [ 796.947949][T30735] loop0: detected capacity change from 1024 to 0 [ 796.956533][T30734] EXT4-fs (loop4): bad geometry: block count 512 exceeds size of device (128 blocks) [ 797.028867][T30731] EXT4-fs error (device loop3): ext4_orphan_get:1411: comm syz-executor.3: bad orphan inode 17 [ 797.041561][T30735] EXT4-fs error (device loop0): ext4_orphan_get:1411: comm syz-executor.0: bad orphan inode 17 [ 797.054766][T30735] ext4_test_bit(bit=16, block=4) = 0 [ 797.060227][T30735] EXT4-fs (loop0): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 797.072056][T30731] ext4_test_bit(bit=16, block=4) = 0 [ 797.095485][T30731] EXT4-fs (loop3): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. 07:03:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:17 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) [ 797.145337][T30735] ext4 filesystem being mounted at /root/syzkaller-testdir479981418/syzkaller.slpvwc/1785/file0 supports timestamps until 2038 (0x7fffffff) [ 797.162490][T30731] ext4 filesystem being mounted at /root/syzkaller-testdir862710153/syzkaller.8DTWy3/1835/file0 supports timestamps until 2038 (0x7fffffff) [ 797.177041][ T7] usb 3-1: new high-speed USB device number 19 using dummy_hcd 07:03:17 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x75, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 797.276747][T30772] loop4: detected capacity change from 256 to 0 [ 797.377577][T30772] EXT4-fs (loop4): bad geometry: block count 512 exceeds size of device (128 blocks) [ 797.387231][T30778] loop3: detected capacity change from 1024 to 0 [ 797.477018][T30778] EXT4-fs error (device loop3): ext4_orphan_get:1411: comm syz-executor.3: bad orphan inode 17 [ 797.488381][T30778] ext4_test_bit(bit=16, block=4) = 0 [ 797.493834][T30778] EXT4-fs (loop3): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 797.506073][T30778] ext4 filesystem being mounted at /root/syzkaller-testdir862710153/syzkaller.8DTWy3/1836/file0 supports timestamps until 2038 (0x7fffffff) [ 797.565572][ T7] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1983, setting to 64 [ 797.576588][ T7] usb 3-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 797.586088][ T7] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 797.595204][ T7] usb 3-1: config 0 descriptor?? [ 797.675181][ T7] rc_core: IR keymap rc-hauppauge not found [ 797.681100][ T7] Registered IR keymap rc-empty [ 797.686702][ T7] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0 [ 797.700891][ T7] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0/input19 [ 797.838757][T27188] usb 3-1: USB disconnect, device number 19 07:03:19 executing program 2: syz_usb_connect(0x0, 0x2d, &(0x7f0000000380)=ANY=[@ANYBLOB="12010000a504bd40eb030200c0ba0000000109021b0001000000000904000001b504b100090581d8bf17289c1f1bef5a9cf37906f1b221271bab2fef48604868c81bf389aa172b0a470f391f140592bbd4423ab8aec397eda6db964ec02515ba13319eac9f505c263890696f17c995f55ddb964af449c8335e4df2dd049289353a6349e2fcb280f225a0026ab50f", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="c209cc7f01c60a532720661a64ddeb05a97de4ce54f341fd9663cf9b0b9c5170d7ab30f9f99ff1d58d5abf8d02c1018a668c045575cb87e81aeb7cbf188f293942edc87d764fb76d17c592b9def1758db71f4e93fbc6abf50608b0d65988cc6171425e575e93af57f3620d33bc465dab5381f9182a5b5e0d38b20d9207771f05ed25e482538945fa5109a24c885ef0b75ebe3919447cb685de0dc668bfe4f0738d361ecf723912ded2414dc16747a19345820409e18621c4"], 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000540)) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000e40)=[0x3fb, 0x3]) 07:03:19 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) 07:03:19 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:19 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x76, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:19 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) 07:03:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:19 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x77, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 798.386806][T30817] loop1: detected capacity change from 1024 to 0 [ 798.412218][T30822] loop0: detected capacity change from 1024 to 0 [ 798.455835][T30823] loop3: detected capacity change from 1024 to 0 07:03:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 798.550127][T30822] EXT4-fs error (device loop0): ext4_orphan_get:1411: comm syz-executor.0: bad orphan inode 17 [ 798.561815][T30823] EXT4-fs error (device loop3): ext4_orphan_get:1411: comm syz-executor.3: bad orphan inode 17 [ 798.563232][T30822] ext4_test_bit(bit=16, block=4) = 0 [ 798.578270][T30822] EXT4-fs (loop0): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. 07:03:19 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x78, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 798.598874][T30822] ext4 filesystem being mounted at /root/syzkaller-testdir479981418/syzkaller.slpvwc/1786/file0 supports timestamps until 2038 (0x7fffffff) [ 798.606254][T30847] loop1: detected capacity change from 1024 to 0 [ 798.615528][T30823] ext4_test_bit(bit=16, block=4) = 0 [ 798.624802][T30823] EXT4-fs (loop3): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. 07:03:19 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) [ 798.637110][T30823] ext4 filesystem being mounted at /root/syzkaller-testdir862710153/syzkaller.8DTWy3/1837/file0 supports timestamps until 2038 (0x7fffffff) [ 798.665184][T27188] usb 3-1: new high-speed USB device number 20 using dummy_hcd [ 798.800507][T30865] loop0: detected capacity change from 1024 to 0 [ 798.827843][T30865] EXT4-fs error (device loop0): ext4_orphan_get:1411: comm syz-executor.0: bad orphan inode 17 [ 798.838590][T30865] ext4_test_bit(bit=16, block=4) = 0 [ 798.844078][T30865] EXT4-fs (loop0): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 798.872124][T30865] ext4 filesystem being mounted at /root/syzkaller-testdir479981418/syzkaller.slpvwc/1787/file0 supports timestamps until 2038 (0x7fffffff) [ 799.035213][T27188] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1983, setting to 64 [ 799.046413][T27188] usb 3-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 799.081144][T27188] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 799.115619][T27188] usb 3-1: config 0 descriptor?? [ 799.205182][T27188] rc_core: IR keymap rc-hauppauge not found [ 799.211144][T27188] Registered IR keymap rc-empty [ 799.217052][T27188] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0 [ 799.232320][T27188] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0/input20 [ 799.358744][T27188] usb 3-1: USB disconnect, device number 20 07:03:20 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0xc7c8, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000540)) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000e40)=[0x3fb, 0x3]) 07:03:20 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 07:03:20 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x79, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x5, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:20 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) 07:03:20 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x7b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:20 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0xc7c8, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000540)) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000e40)=[0x3fb, 0x3]) [ 799.902955][T30905] loop1: detected capacity change from 1024 to 0 07:03:20 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0xc7c8, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000540)) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000e40)=[0x3fb, 0x3]) [ 799.947568][T30907] loop0: detected capacity change from 1024 to 0 [ 799.961335][T30909] loop3: detected capacity change from 1024 to 0 [ 799.975390][T30911] loop4: detected capacity change from 1024 to 0 [ 799.984318][T30911] EXT4-fs warning (device loop4): read_mmp_block:107: Error -117 while reading MMP block 64 07:03:20 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 07:03:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:20 executing program 2: syz_usb_connect(0x0, 0x2d, 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0xc7c8, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000540)) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000e40)=[0x3fb, 0x3]) 07:03:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x5, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:20 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x7c, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 800.081049][T30907] EXT4-fs error (device loop0): ext4_orphan_get:1411: comm syz-executor.0: bad orphan inode 17 [ 800.094516][T30907] ext4_test_bit(bit=16, block=4) = 0 [ 800.100926][T30907] EXT4-fs (loop0): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. 07:03:20 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 07:03:20 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x7d, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:20 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) [ 800.167741][T30907] ext4 filesystem being mounted at /root/syzkaller-testdir479981418/syzkaller.slpvwc/1788/file0 supports timestamps until 2038 (0x7fffffff) [ 800.193231][T30947] loop4: detected capacity change from 1024 to 0 [ 800.241335][T30952] loop1: detected capacity change from 1024 to 0 [ 800.247790][T30947] EXT4-fs warning (device loop4): read_mmp_block:107: Error -117 while reading MMP block 64 07:03:21 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x82, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 800.319116][T30956] loop3: detected capacity change from 1024 to 0 07:03:21 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x83, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:21 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 07:03:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x5, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 800.453423][T30978] loop0: detected capacity change from 1024 to 0 [ 800.481659][T30985] loop1: detected capacity change from 256 to 0 [ 800.524972][T30985] EXT4-fs (loop1): bad geometry: block count 512 exceeds size of device (128 blocks) [ 800.536799][T30978] EXT4-fs error (device loop0): ext4_orphan_get:1411: comm syz-executor.0: bad orphan inode 17 [ 800.563294][T30978] ext4_test_bit(bit=16, block=4) = 0 [ 800.568787][T30978] EXT4-fs (loop0): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 800.581083][T30978] ext4 filesystem being mounted at /root/syzkaller-testdir479981418/syzkaller.slpvwc/1789/file0 supports timestamps until 2038 (0x7fffffff) 07:03:21 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x84, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 800.616982][T30996] loop3: detected capacity change from 1024 to 0 [ 800.631586][T31000] loop4: detected capacity change from 1024 to 0 07:03:21 executing program 2: syz_usb_connect(0x0, 0x2d, 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0xc7c8, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000540)) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000e40)=[0x3fb, 0x3]) 07:03:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:21 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) [ 800.661132][T31000] EXT4-fs warning (device loop4): read_mmp_block:107: Error -117 while reading MMP block 64 [ 800.692627][T30996] EXT4-fs error (device loop3): ext4_orphan_get:1411: comm syz-executor.3: bad orphan inode 17 [ 800.704706][T30996] ext4_test_bit(bit=16, block=4) = 0 07:03:21 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0x2, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 800.710663][T30996] EXT4-fs (loop3): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 800.723235][T30996] ext4 filesystem being mounted at /root/syzkaller-testdir862710153/syzkaller.8DTWy3/1841/file0 supports timestamps until 2038 (0x7fffffff) 07:03:21 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 07:03:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:21 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 800.767827][T31017] loop1: detected capacity change from 256 to 0 [ 800.778772][T31020] loop0: detected capacity change from 1024 to 0 [ 800.826599][T31017] EXT4-fs (loop1): bad geometry: block count 512 exceeds size of device (128 blocks) [ 800.874474][T31020] EXT4-fs error (device loop0): ext4_orphan_get:1411: comm syz-executor.0: bad orphan inode 17 07:03:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:21 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x2, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 800.916503][T31040] loop3: detected capacity change from 1024 to 0 [ 800.923104][T31020] ext4_test_bit(bit=16, block=4) = 0 [ 800.930763][T31020] EXT4-fs (loop0): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 800.963424][T31043] loop4: detected capacity change from 1024 to 0 [ 800.965189][T31020] ext4 filesystem being mounted at /root/syzkaller-testdir479981418/syzkaller.slpvwc/1790/file0 supports timestamps until 2038 (0x7fffffff) [ 800.979435][T31043] EXT4-fs warning (device loop4): read_mmp_block:107: Error -117 while reading MMP block 64 [ 801.008907][T31051] loop1: detected capacity change from 256 to 0 07:03:21 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) [ 801.020877][T31040] EXT4-fs error (device loop3): ext4_orphan_get:1411: comm syz-executor.3: bad orphan inode 17 [ 801.042326][T31040] ext4_test_bit(bit=16, block=4) = 0 [ 801.053054][T31040] EXT4-fs (loop3): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. 07:03:21 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x8, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 801.067391][T31040] ext4 filesystem being mounted at /root/syzkaller-testdir862710153/syzkaller.8DTWy3/1842/file0 supports timestamps until 2038 (0x7fffffff) 07:03:21 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 801.145459][T31051] EXT4-fs (loop1): bad geometry: block count 512 exceeds size of device (128 blocks) 07:03:22 executing program 2: syz_usb_connect(0x0, 0x2d, 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0xc7c8, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000540)) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000e40)=[0x3fb, 0x3]) 07:03:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:22 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x10, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 801.278765][T31069] loop0: detected capacity change from 1024 to 0 [ 801.291913][T31070] loop3: detected capacity change from 1024 to 0 07:03:22 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0xfc, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 801.323985][T31076] loop4: detected capacity change from 1024 to 0 [ 801.354770][T31076] EXT4-fs warning (device loop4): read_mmp_block:107: Error -117 while reading MMP block 64 [ 801.371724][T31069] EXT4-fs error (device loop0): ext4_orphan_get:1411: comm syz-executor.0: bad orphan inode 17 [ 801.388911][T31070] EXT4-fs error (device loop3): ext4_orphan_get:1411: comm syz-executor.3: bad orphan inode 17 [ 801.400198][T31069] ext4_test_bit(bit=16, block=4) = 0 [ 801.409188][T31069] EXT4-fs (loop0): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. 07:03:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:22 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0xfc00, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 801.409219][T31070] ext4_test_bit(bit=16, block=4) = 0 [ 801.421009][T31069] ext4 filesystem being mounted at /root/syzkaller-testdir479981418/syzkaller.slpvwc/1791/file0 supports timestamps until 2038 (0x7fffffff) [ 801.441091][T31070] EXT4-fs (loop3): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 801.452954][T31070] ext4 filesystem being mounted at /root/syzkaller-testdir862710153/syzkaller.8DTWy3/1843/file0 supports timestamps until 2038 (0x7fffffff) 07:03:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x5, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:22 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) 07:03:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:22 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 07:03:22 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0xff00, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 801.590329][T31109] loop1: detected capacity change from 1024 to 0 [ 801.605899][T31109] EXT4-fs warning (device loop1): read_mmp_block:107: Error -117 while reading MMP block 64 [ 801.699080][T31117] loop4: detected capacity change from 1024 to 0 07:03:22 executing program 2: syz_usb_connect(0x0, 0x2d, &(0x7f0000000380)=ANY=[@ANYBLOB="12010000a504bd40eb030200c0ba0000000109021b0001000000000904000001b504b100090581d8bf17289c1f1bef5a9cf37906f1b221271bab2fef48604868c81bf389aa172b0a470f391f140592bbd4423ab8aec397eda6db964ec02515ba13319eac9f505c263890696f17c995f55ddb964af449c8335e4df2dd049289353a6349e2fcb280f225a0026ab50f", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0xc7c8, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000540)) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000e40)=[0x3fb, 0x3]) 07:03:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x5, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 801.761668][T31117] EXT4-fs warning (device loop4): read_mmp_block:107: Error -117 while reading MMP block 64 [ 801.781998][T31118] loop0: detected capacity change from 1024 to 0 07:03:22 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:22 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) [ 801.850833][T31134] loop3: detected capacity change from 1024 to 0 07:03:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000), 0x0, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 801.906068][T31138] loop1: detected capacity change from 1024 to 0 [ 801.935446][T31134] EXT4-fs error (device loop3): ext4_orphan_get:1411: comm syz-executor.3: bad orphan inode 17 [ 801.955474][T31134] ext4_test_bit(bit=16, block=4) = 0 [ 801.961302][T31138] EXT4-fs warning (device loop1): read_mmp_block:107: Error -117 while reading MMP block 64 [ 801.985259][T31153] loop4: detected capacity change from 1024 to 0 07:03:22 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x2, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 801.996958][T31134] EXT4-fs (loop3): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 802.013118][T31134] ext4 filesystem being mounted at /root/syzkaller-testdir862710153/syzkaller.8DTWy3/1844/file0 supports timestamps until 2038 (0x7fffffff) 07:03:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x5, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:22 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x8, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:22 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, 0x0, 0x40) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 802.064253][T31157] loop0: detected capacity change from 1024 to 0 [ 802.085867][T31153] EXT4-fs warning (device loop4): read_mmp_block:107: Error -117 while reading MMP block 64 07:03:22 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) [ 802.125821][T27347] usb 3-1: new high-speed USB device number 21 using dummy_hcd 07:03:22 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x10, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000), 0x0, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 802.306252][T31168] loop1: detected capacity change from 1024 to 0 [ 802.372816][T31187] loop3: detected capacity change from 1024 to 0 [ 802.426417][T31186] loop0: detected capacity change from 1024 to 0 [ 802.434812][T31189] loop4: detected capacity change from 1024 to 0 [ 802.462662][T31187] EXT4-fs error (device loop3): ext4_orphan_get:1411: comm syz-executor.3: bad orphan inode 17 [ 802.474551][T31187] ext4_test_bit(bit=16, block=4) = 0 [ 802.482098][T31187] EXT4-fs (loop3): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 802.496299][T31189] EXT4-fs warning (device loop4): read_mmp_block:107: Error -117 while reading MMP block 64 [ 802.496546][T31187] ext4 filesystem being mounted at /root/syzkaller-testdir862710153/syzkaller.8DTWy3/1845/file0 supports timestamps until 2038 (0x7fffffff) [ 802.535498][T27347] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1983, setting to 64 [ 802.546432][T27347] usb 3-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 802.556093][T27347] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 802.565392][T27347] usb 3-1: config 0 descriptor?? [ 802.656491][T27347] rc_core: IR keymap rc-hauppauge not found [ 802.662391][T27347] Registered IR keymap rc-empty [ 802.669425][T27347] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0 [ 802.685369][T27347] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0/input21 [ 802.818631][T27347] usb 3-1: USB disconnect, device number 21 07:03:24 executing program 2: syz_usb_connect(0x0, 0x2d, &(0x7f0000000380)=ANY=[@ANYBLOB="12010000a504bd40eb030200c0ba0000000109021b0001000000000904000001b504b100090581d8bf17289c1f1bef5a9cf37906f1b221271bab2fef48604868c81bf389aa172b0a470f391f140592bbd4423ab8aec397eda6db964ec02515ba13319eac9f505c263890696f17c995f55ddb964af449c8335e4df2dd049289353a6349e2fcb280f225a0026ab50f", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0xc7c8, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000540)) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000e40)=[0x3fb, 0x3]) 07:03:24 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0xfc, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:24 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) 07:03:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000), 0x0, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:24 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, r0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 07:03:24 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0xfc00, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 803.428851][T31238] loop3: detected capacity change from 1024 to 0 [ 803.463003][T31240] loop1: detected capacity change from 1024 to 0 07:03:24 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) [ 803.476962][T31243] loop0: detected capacity change from 1024 to 0 [ 803.491374][T31244] loop4: detected capacity change from 1024 to 0 [ 803.508042][T31238] EXT4-fs error (device loop3): ext4_orphan_get:1411: comm syz-executor.3: bad orphan inode 17 [ 803.519088][T31238] ext4_test_bit(bit=16, block=4) = 0 [ 803.524439][T31238] EXT4-fs (loop3): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 803.537470][T31238] ext4 filesystem being mounted at /root/syzkaller-testdir862710153/syzkaller.8DTWy3/1846/file0 supports timestamps until 2038 (0x7fffffff) [ 803.555678][T31244] EXT4-fs warning (device loop4): read_mmp_block:107: Error -117 while reading MMP block 64 07:03:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)='PMM\x00', 0x4, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:24 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:24 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0xff00, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 803.579591][T31240] EXT4-fs warning (device loop1): read_mmp_block:107: Error -117 while reading MMP block 64 [ 803.646423][T31265] loop0: detected capacity change from 1024 to 0 07:03:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 803.698748][T31273] loop4: detected capacity change from 1024 to 0 [ 803.725200][T27188] usb 3-1: new high-speed USB device number 22 using dummy_hcd [ 803.791489][T31285] loop3: detected capacity change from 1024 to 0 [ 803.804633][T31287] loop1: detected capacity change from 1024 to 0 [ 803.818427][T31287] EXT4-fs warning (device loop1): read_mmp_block:107: Error -117 while reading MMP block 64 [ 803.832441][T31285] EXT4-fs error (device loop3): ext4_orphan_get:1411: comm syz-executor.3: bad orphan inode 17 [ 803.844356][T31285] ext4_test_bit(bit=16, block=4) = 0 [ 803.850449][T31285] EXT4-fs (loop3): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 803.863882][T31285] ext4 filesystem being mounted at /root/syzkaller-testdir862710153/syzkaller.8DTWy3/1847/file0 supports timestamps until 2038 (0x7fffffff) [ 804.085466][T27188] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1983, setting to 64 [ 804.102585][T27188] usb 3-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 804.121362][T27188] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 804.157766][T27188] usb 3-1: config 0 descriptor?? [ 804.256882][T27188] rc_core: IR keymap rc-hauppauge not found [ 804.262805][T27188] Registered IR keymap rc-empty [ 804.285406][T27188] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0 [ 804.301374][T27188] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0/input22 [ 804.399232][T27347] usb 3-1: USB disconnect, device number 22 [ 804.498260][T31273] EXT4-fs warning (device loop4): ext4_multi_mount_protect:324: MMP startup interrupted, failing mount [ 804.498260][T31273] 07:03:25 executing program 2: syz_usb_connect(0x0, 0x2d, &(0x7f0000000380)=ANY=[@ANYBLOB="12010000a504bd40eb030200c0ba0000000109021b0001000000000904000001b504b100090581d8bf17289c1f1bef5a9cf37906f1b221271bab2fef48604868c81bf389aa172b0a470f391f140592bbd4423ab8aec397eda6db964ec02515ba13319eac9f505c263890696f17c995f55ddb964af449c8335e4df2dd049289353a6349e2fcb280f225a0026ab50f", @ANYRES32=0x0, @ANYRES32=0x0], 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0xc7c8, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000540)) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000e40)=[0x3fb, 0x3]) 07:03:25 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x100000, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) 07:03:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:25 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x29, 0x9, 0x6, 0x0, 0x30, @rand_addr=' \x01\x00', @empty, 0x7800, 0x8, 0x7f, 0xfffff69c}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)='PMM\x00', 0x4, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:25 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x1000000, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 804.960776][T31330] loop1: detected capacity change from 1024 to 0 [ 804.975532][T31335] loop0: detected capacity change from 1024 to 0 [ 804.987599][T31334] loop3: detected capacity change from 1024 to 0 [ 805.001085][T31333] loop4: detected capacity change from 1024 to 0 07:03:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000), 0x0, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 805.024562][T31330] EXT4-fs warning (device loop1): read_mmp_block:107: Error -117 while reading MMP block 64 07:03:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) [ 805.098513][T31334] EXT4-fs error (device loop3): ext4_orphan_get:1411: comm syz-executor.3: bad orphan inode 17 [ 805.119132][T31334] ext4_test_bit(bit=16, block=4) = 0 [ 805.126810][T31334] EXT4-fs (loop3): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. 07:03:25 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x2000000, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000), 0x0, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 805.139168][T31334] ext4 filesystem being mounted at /root/syzkaller-testdir862710153/syzkaller.8DTWy3/1848/file0 supports timestamps until 2038 (0x7fffffff) 07:03:25 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x8000000, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 805.197228][T31359] loop0: detected capacity change from 256 to 0 [ 805.232861][T31370] loop1: detected capacity change from 1024 to 0 [ 805.239311][T27188] usb 3-1: new high-speed USB device number 23 using dummy_hcd [ 805.255647][T31370] EXT4-fs warning (device loop1): read_mmp_block:107: Error -117 while reading MMP block 64 [ 805.267257][T31359] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (128 blocks) [ 805.605205][T27188] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1983, setting to 64 [ 805.616171][T27188] usb 3-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 805.625244][T27188] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 805.636740][T27188] usb 3-1: config 0 descriptor?? [ 805.715210][T27188] rc_core: IR keymap rc-hauppauge not found [ 805.721132][T27188] Registered IR keymap rc-empty [ 805.726773][T27188] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0 [ 805.737504][T27188] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0/input23 [ 805.795162][T31333] EXT4-fs warning (device loop4): ext4_multi_mount_protect:324: MMP startup interrupted, failing mount [ 805.795162][T31333] [ 805.878102][ T8823] usb 3-1: USB disconnect, device number 23 07:03:27 executing program 2: syz_usb_connect(0x0, 0x2d, &(0x7f0000000380)=ANY=[@ANYBLOB="12010000a504bd40eb030200c0ba0000000109021b0001000000000904000001b504b100090581d8bf17289c1f1bef5a9cf37906f1b221271bab2fef48604868c81bf389aa172b0a470f391f140592bbd4423ab8aec397eda6db964ec02515ba13319eac9f505c263890696f17c995f55ddb964af449c8335e4df2dd049289353a6349e2fcb280f225a0026ab50f", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB], 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0xc7c8, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000540)) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000e40)=[0x3fb, 0x3]) 07:03:27 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:27 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) 07:03:27 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0xe0ffffff, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000), 0x0, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)='PMM\x00', 0x4, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 806.428609][T31415] loop1: detected capacity change from 1024 to 0 [ 806.441629][T31412] loop4: detected capacity change from 1024 to 0 [ 806.450252][T31415] EXT4-fs warning (device loop1): read_mmp_block:107: Error -117 while reading MMP block 64 [ 806.460419][T31416] loop0: detected capacity change from 256 to 0 07:03:27 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0xfc000000, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 806.475313][T31413] loop3: detected capacity change from 1024 to 0 07:03:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)='PMM\x00', 0x4, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 806.507717][T31416] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (128 blocks) 07:03:27 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0xfe80ffff, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 806.555403][T31413] EXT4-fs error (device loop3): ext4_orphan_get:1411: comm syz-executor.3: bad orphan inode 17 [ 806.581421][T31413] ext4_test_bit(bit=16, block=4) = 0 [ 806.587276][T31413] EXT4-fs (loop3): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. 07:03:27 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) 07:03:27 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0xfec0ffff, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 806.625709][T31413] ext4 filesystem being mounted at /root/syzkaller-testdir862710153/syzkaller.8DTWy3/1849/file0 supports timestamps until 2038 (0x7fffffff) [ 806.642854][T31445] loop1: detected capacity change from 1024 to 0 07:03:27 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 806.715227][ T7] usb 3-1: new high-speed USB device number 24 using dummy_hcd [ 806.748614][T31453] loop0: detected capacity change from 256 to 0 [ 806.773594][T31453] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (128 blocks) [ 806.787341][T31460] loop3: detected capacity change from 1024 to 0 [ 806.849111][T31460] EXT4-fs error (device loop3): ext4_orphan_get:1411: comm syz-executor.3: bad orphan inode 17 [ 806.860022][T31460] ext4_test_bit(bit=16, block=4) = 0 [ 806.875853][T31460] EXT4-fs (loop3): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 806.897585][T31460] ext4 filesystem being mounted at /root/syzkaller-testdir862710153/syzkaller.8DTWy3/1850/file0 supports timestamps until 2038 (0x7fffffff) [ 807.075476][ T7] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1983, setting to 64 [ 807.086523][ T7] usb 3-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 807.097246][ T7] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 807.107015][ T7] usb 3-1: config 0 descriptor?? [ 807.185171][ T7] rc_core: IR keymap rc-hauppauge not found [ 807.191128][ T7] Registered IR keymap rc-empty [ 807.197200][ T7] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0 [ 807.211804][ T7] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0/input24 [ 807.265232][T31412] EXT4-fs warning (device loop4): ext4_multi_mount_protect:324: MMP startup interrupted, failing mount [ 807.265232][T31412] [ 807.348108][ T3674] usb 3-1: USB disconnect, device number 24 [ 807.455238][T31445] EXT4-fs warning (device loop1): ext4_multi_mount_protect:324: MMP startup interrupted, failing mount [ 807.455238][T31445] 07:03:28 executing program 2: syz_usb_connect(0x0, 0x2d, &(0x7f0000000380)=ANY=[@ANYBLOB="12010000a504bd40eb030200c0ba0000000109021b0001000000000904000001b504b100090581d8bf17289c1f1bef5a9cf37906f1b221271bab2fef48604868c81bf389aa172b0a470f391f140592bbd4423ab8aec397eda6db964ec02515ba13319eac9f505c263890696f17c995f55ddb964af449c8335e4df2dd049289353a6349e2fcb280f225a0026ab50f", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB], 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0xc7c8, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000540)) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000e40)=[0x3fb, 0x3]) 07:03:28 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0xfeffffff, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) 07:03:28 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)='PMM\x00PM', 0x6, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)='PMM\x00', 0x4, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:28 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0xff000000, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) [ 807.904460][T31508] loop4: detected capacity change from 1024 to 0 [ 807.930559][T31511] loop3: detected capacity change from 1024 to 0 [ 807.947214][T31512] loop1: detected capacity change from 1024 to 0 07:03:28 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0xffff0000, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) [ 808.003020][T31511] EXT4-fs error (device loop3): ext4_orphan_get:1411: comm syz-executor.3: bad orphan inode 17 [ 808.028880][T31511] ext4_test_bit(bit=16, block=4) = 0 07:03:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 808.048654][T31511] EXT4-fs (loop3): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 808.060423][T31511] ext4 filesystem being mounted at /root/syzkaller-testdir862710153/syzkaller.8DTWy3/1851/file0 supports timestamps until 2038 (0x7fffffff) 07:03:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x5, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) [ 808.170685][T31545] loop3: detected capacity change from 1024 to 0 [ 808.177168][ T3674] usb 3-1: new high-speed USB device number 25 using dummy_hcd [ 808.193539][T31547] loop0: detected capacity change from 1024 to 0 [ 808.204683][T31547] EXT4-fs warning (device loop0): read_mmp_block:107: Error -117 while reading MMP block 64 [ 808.217890][T31545] EXT4-fs error (device loop3): ext4_orphan_get:1411: comm syz-executor.3: bad orphan inode 17 [ 808.229366][T31545] ext4_test_bit(bit=16, block=4) = 0 [ 808.234818][T31545] EXT4-fs (loop3): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 808.248075][T31545] ext4 filesystem being mounted at /root/syzkaller-testdir862710153/syzkaller.8DTWy3/1852/file0 supports timestamps until 2038 (0x7fffffff) [ 808.585202][ T3674] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1983, setting to 64 [ 808.596252][ T3674] usb 3-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 808.605417][ T3674] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 808.614060][ T3674] usb 3-1: config 0 descriptor?? [ 808.695179][ T3674] rc_core: IR keymap rc-hauppauge not found [ 808.701177][ T3674] Registered IR keymap rc-empty [ 808.707597][ T3674] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0 [ 808.719971][ T3674] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0/input25 [ 808.724799][T31508] EXT4-fs warning (device loop4): ext4_multi_mount_protect:324: MMP startup interrupted, failing mount [ 808.724799][T31508] [ 808.745949][T31512] EXT4-fs warning (device loop1): ext4_multi_mount_protect:324: MMP startup interrupted, failing mount [ 808.745949][T31512] [ 808.860244][ T3674] usb 3-1: USB disconnect, device number 25 07:03:30 executing program 2: syz_usb_connect(0x0, 0x2d, &(0x7f0000000380)=ANY=[@ANYBLOB="12010000a504bd40eb030200c0ba0000000109021b0001000000000904000001b504b100090581d8bf17289c1f1bef5a9cf37906f1b221271bab2fef48604868c81bf389aa172b0a470f391f140592bbd4423ab8aec397eda6db964ec02515ba13319eac9f505c263890696f17c995f55ddb964af449c8335e4df2dd049289353a6349e2fcb280f225a0026ab50f", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB], 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0xc7c8, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000540)) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000e40)=[0x3fb, 0x3]) 07:03:30 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0xffff80fe, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x5, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) 07:03:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)='PMM\x00', 0x4, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)='PMM\x00PM', 0x6, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:30 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0xffffc0fe, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 809.405081][T31590] loop1: detected capacity change from 1024 to 0 [ 809.416265][T31591] loop4: detected capacity change from 1024 to 0 [ 809.431302][T31597] loop0: detected capacity change from 1024 to 0 [ 809.448923][T31598] loop3: detected capacity change from 1024 to 0 [ 809.472647][T31597] EXT4-fs warning (device loop0): read_mmp_block:107: Error -117 while reading MMP block 64 07:03:30 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0xffffffe0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 809.516671][T31598] EXT4-fs error (device loop3): ext4_orphan_get:1411: comm syz-executor.3: bad orphan inode 17 [ 809.527402][T31598] ext4_test_bit(bit=16, block=4) = 0 [ 809.533555][T31598] EXT4-fs (loop3): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 809.546664][T31598] ext4 filesystem being mounted at /root/syzkaller-testdir862710153/syzkaller.8DTWy3/1853/file0 supports timestamps until 2038 (0x7fffffff) 07:03:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x5, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) 07:03:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:30 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0xfffffffe, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 809.676021][T31627] loop0: detected capacity change from 1024 to 0 [ 809.705173][T27188] usb 3-1: new high-speed USB device number 26 using dummy_hcd 07:03:30 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 809.721888][T31627] EXT4-fs warning (device loop0): read_mmp_block:107: Error -117 while reading MMP block 64 [ 809.789514][T31637] loop3: detected capacity change from 1024 to 0 [ 809.848387][T31637] EXT4-fs error (device loop3): ext4_orphan_get:1411: comm syz-executor.3: bad orphan inode 17 [ 809.861079][T31637] ext4_test_bit(bit=16, block=4) = 0 [ 809.880784][T31637] EXT4-fs (loop3): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 809.899052][T31637] ext4 filesystem being mounted at /root/syzkaller-testdir862710153/syzkaller.8DTWy3/1854/file0 supports timestamps until 2038 (0x7fffffff) [ 810.116269][T27188] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1983, setting to 64 [ 810.127310][T27188] usb 3-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 810.136380][T27188] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 810.146477][T27188] usb 3-1: config 0 descriptor?? [ 810.225204][T27188] rc_core: IR keymap rc-hauppauge not found [ 810.231234][T27188] Registered IR keymap rc-empty [ 810.234909][T31590] EXT4-fs warning (device loop1): ext4_multi_mount_protect:324: MMP startup interrupted, failing mount [ 810.234909][T31590] [ 810.236315][T27188] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0 [ 810.256359][T31591] EXT4-fs warning (device loop4): ext4_multi_mount_protect:324: MMP startup interrupted, failing mount [ 810.256359][T31591] [ 810.259978][T27188] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0/input26 [ 810.391240][ T7] usb 3-1: USB disconnect, device number 26 07:03:31 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[0x2], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) 07:03:31 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)='PMM\x00PM', 0x6, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)='PMM\x00PM', 0x6, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:31 executing program 2: syz_usb_connect(0x0, 0x2d, &(0x7f0000000380)=ANY=[@ANYBLOB="12010000a504bd40eb030200c0ba0000000109021b0001000000000904000001b504b100090581d8bf17289c1f1bef5a9cf37906f1b221271bab2fef48604868c81bf389aa172b0a470f391f140592bbd4423ab8aec397eda6db964ec02515ba13319eac9f505c263890696f17c995f55ddb964af449c8335e4df2dd049289353a6349e2fcb280f225a0026ab50f", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="c209cc7f01c60a532720661a64ddeb05a97de4ce54f341fd9663cf9b0b9c5170d7ab30f9f99ff1d58d5abf8d02c1018a668c045575cb87e81aeb7cbf188f293942edc87d764fb76d17c592b9def1758db71f4e93fbc6abf50608b0d6"], 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0xc7c8, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000540)) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000e40)=[0x3fb, 0x3]) 07:03:31 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[0x8], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 810.945698][T31688] loop4: detected capacity change from 1024 to 0 [ 810.957830][T31687] loop1: detected capacity change from 1024 to 0 [ 810.970053][T31691] loop0: detected capacity change from 1024 to 0 [ 810.982212][T31689] loop3: detected capacity change from 1024 to 0 [ 811.000887][T31691] EXT4-fs warning (device loop0): read_mmp_block:107: Error -117 while reading MMP block 64 07:03:31 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[0xfc], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) [ 811.089364][T31689] EXT4-fs error (device loop3): ext4_orphan_get:1411: comm syz-executor.3: bad orphan inode 17 [ 811.100541][T31689] ext4_test_bit(bit=16, block=4) = 0 [ 811.108920][T31689] EXT4-fs (loop3): mounted filesystem without journal. Opts: dioread_lock,,errors=continue. Quota mode: none. [ 811.120690][T31689] ext4 filesystem being mounted at /root/syzkaller-testdir862710153/syzkaller.8DTWy3/1855/file0 supports timestamps until 2038 (0x7fffffff) 07:03:31 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:31 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:32 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x2], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 811.217464][T31723] loop0: detected capacity change from 1024 to 0 [ 811.235166][T27347] usb 3-1: new high-speed USB device number 27 using dummy_hcd [ 811.240322][T31723] EXT4-fs warning (device loop0): read_mmp_block:107: Error -117 while reading MMP block 64 [ 811.257519][T31729] loop3: detected capacity change from 1024 to 0 07:03:32 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) 07:03:32 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x8], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 811.422904][T31742] loop3: detected capacity change from 1024 to 0 [ 811.477799][T31751] loop0: detected capacity change from 1024 to 0 [ 811.504055][T31751] EXT4-fs warning (device loop0): read_mmp_block:107: Error -117 while reading MMP block 64 [ 811.595202][T27347] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1983, setting to 64 [ 811.606178][T27347] usb 3-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 811.615714][T27347] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 811.624339][T27347] usb 3-1: config 0 descriptor?? [ 811.705207][T27347] rc_core: IR keymap rc-hauppauge not found [ 811.711124][T27347] Registered IR keymap rc-empty [ 811.720643][T27347] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0 [ 811.766553][T27347] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0/input27 [ 811.777296][T31687] EXT4-fs warning (device loop1): ext4_multi_mount_protect:324: MMP startup interrupted, failing mount [ 811.777296][T31687] [ 811.790539][T31688] EXT4-fs warning (device loop4): ext4_multi_mount_protect:324: MMP startup interrupted, failing mount [ 811.790539][T31688] 07:03:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)='PMM\x00PM', 0x6, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 811.869484][ T8823] usb 3-1: USB disconnect, device number 27 [ 812.032583][T31780] loop1: detected capacity change from 1024 to 0 07:03:33 executing program 2: syz_usb_connect(0x0, 0x2d, &(0x7f0000000380)=ANY=[@ANYBLOB="12010000a504bd40eb030200c0ba0000000109021b0001000000000904000001b504b100090581d8bf17289c1f1bef5a9cf37906f1b221271bab2fef48604868c81bf389aa172b0a470f391f140592bbd4423ab8aec397eda6db964ec02515ba13319eac9f505c263890696f17c995f55ddb964af449c8335e4df2dd049289353a6349e2fcb280f225a0026ab50f", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="c209cc7f01c60a532720661a64ddeb05a97de4ce54f341fd9663cf9b0b9c5170d7ab30f9f99ff1d58d5abf8d02c1018a668c045575cb87e81aeb7cbf188f293942edc87d764fb76d17c592b9def1758db71f4e93fbc6abf50608b0d6"], 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0xc7c8, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000540)) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000e40)=[0x3fb, 0x3]) 07:03:33 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xfc], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:33 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:33 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000), 0x0, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) 07:03:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)='PMM\x00PMM', 0x7, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:33 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 812.410486][T31791] loop0: detected capacity change from 1024 to 0 [ 812.422663][T31792] loop4: detected capacity change from 1024 to 0 [ 812.437663][T31791] EXT4-fs warning (device loop0): read_mmp_block:107: Error -117 while reading MMP block 64 [ 812.450612][T31795] loop3: detected capacity change from 1024 to 0 07:03:33 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x2], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:33 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:33 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000), 0x0, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) 07:03:33 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x8], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:33 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0xfc], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 812.645454][T31818] loop0: detected capacity change from 1024 to 0 [ 812.660690][T31823] loop3: detected capacity change from 1024 to 0 [ 812.670430][T31818] EXT4-fs warning (device loop0): read_mmp_block:107: Error -117 while reading MMP block 64 [ 812.705997][T27188] usb 3-1: new high-speed USB device number 28 using dummy_hcd [ 812.813073][T31780] EXT4-fs warning (device loop1): ext4_multi_mount_protect:324: MMP startup interrupted, failing mount [ 812.813073][T31780] 07:03:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)='PMM\x00PM', 0x6, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 812.948107][T31841] loop1: detected capacity change from 1024 to 0 [ 813.125558][T27188] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1983, setting to 64 [ 813.136547][T27188] usb 3-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 813.145928][T27188] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 813.154625][T27188] usb 3-1: config 0 descriptor?? [ 813.235193][T27188] rc_core: IR keymap rc-hauppauge not found [ 813.240507][T31792] EXT4-fs warning (device loop4): ext4_multi_mount_protect:324: MMP startup interrupted, failing mount [ 813.240507][T31792] [ 813.245275][T27188] Registered IR keymap rc-empty [ 813.275354][T27188] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0 [ 813.291580][T27188] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0/input28 [ 813.401590][T27188] usb 3-1: USB disconnect, device number 28 [ 813.780683][T31841] EXT4-fs warning (device loop1): ext4_multi_mount_protect:324: MMP startup interrupted, failing mount [ 813.780683][T31841] 07:03:34 executing program 2: syz_usb_connect(0x0, 0x2d, &(0x7f0000000380)=ANY=[@ANYBLOB="12010000a504bd40eb030200c0ba0000000109021b0001000000000904000001b504b100090581d8bf17289c1f1bef5a9cf37906f1b221271bab2fef48604868c81bf389aa172b0a470f391f140592bbd4423ab8aec397eda6db964ec02515ba13319eac9f505c263890696f17c995f55ddb964af449c8335e4df2dd049289353a6349e2fcb280f225a0026ab50f", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB], 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0xc7c8, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000540)) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000e40)=[0x3fb, 0x3]) 07:03:34 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000), 0x0, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) 07:03:34 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:34 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)='PMM\x00PMM', 0x7, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)='PMM\x00PMM', 0x7, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:34 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x2], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 813.956709][T31883] loop0: detected capacity change from 1024 to 0 [ 813.971108][T31882] loop3: detected capacity change from 1024 to 0 [ 813.983059][T31883] EXT4-fs warning (device loop0): read_mmp_block:107: Error -117 while reading MMP block 64 [ 813.993939][T31884] loop4: detected capacity change from 1024 to 0 07:03:34 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x8], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 814.051174][T31891] loop1: detected capacity change from 1024 to 0 07:03:34 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:34 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)='PMM\x00', 0x4, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) 07:03:34 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0xfc], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 814.156935][T31914] loop3: detected capacity change from 1024 to 0 [ 814.172211][T31917] loop0: detected capacity change from 1024 to 0 07:03:35 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 814.245158][ T17] usb 3-1: new high-speed USB device number 29 using dummy_hcd [ 814.257270][T31929] loop3: detected capacity change from 256 to 0 [ 814.266624][T31929] EXT4-fs (loop3): bad geometry: block count 512 exceeds size of device (128 blocks) [ 814.665195][ T17] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1983, setting to 64 [ 814.676171][ T17] usb 3-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 814.687200][ T17] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 814.696748][ T17] usb 3-1: config 0 descriptor?? [ 814.795172][T31884] EXT4-fs warning (device loop4): ext4_multi_mount_protect:324: MMP startup interrupted, failing mount [ 814.795172][T31884] [ 814.808469][T31891] EXT4-fs warning (device loop1): ext4_multi_mount_protect:324: MMP startup interrupted, failing mount [ 814.808469][T31891] [ 814.821944][ T17] rc_core: IR keymap rc-hauppauge not found [ 814.831480][ T17] Registered IR keymap rc-empty [ 814.837163][ T17] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0 [ 814.850364][ T17] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0/input29 [ 814.961154][ T17] usb 3-1: USB disconnect, device number 29 [ 815.015206][T31917] EXT4-fs warning (device loop0): ext4_multi_mount_protect:324: MMP startup interrupted, failing mount [ 815.015206][T31917] 07:03:36 executing program 2: syz_usb_connect(0x0, 0x2d, &(0x7f0000000380)=ANY=[@ANYBLOB="12010000a504bd40eb030200c0ba0000000109021b0001000000000904000001b504b100090581d8bf17289c1f1bef5a9cf37906f1b221271bab2fef48604868c81bf389aa172b0a470f391f140592bbd4423ab8aec397eda6db964ec02515ba13319eac9f505c263890696f17c995f55ddb964af449c8335e4df2dd049289353a6349e2fcb280f225a0026ab50f", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB], 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0xc7c8, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000540)) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000e40)=[0x3fb, 0x3]) 07:03:36 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:36 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)='PMM\x00PMM', 0x7, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)='PMM\x00PMM', 0x7, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)='PMM\x00', 0x4, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) 07:03:36 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x2], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 815.522431][T31973] loop4: detected capacity change from 1024 to 0 07:03:36 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x8], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 815.567497][T31983] loop1: detected capacity change from 1024 to 0 [ 815.580601][T31980] loop3: detected capacity change from 256 to 0 [ 815.591247][T31981] loop0: detected capacity change from 1024 to 0 [ 815.601149][T31980] EXT4-fs (loop3): bad geometry: block count 512 exceeds size of device (128 blocks) 07:03:36 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:36 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0xfc], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:36 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:36 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 815.777336][T32009] loop3: detected capacity change from 256 to 0 [ 815.788059][T32009] EXT4-fs (loop3): bad geometry: block count 512 exceeds size of device (128 blocks) [ 815.835195][ T8823] usb 3-1: new high-speed USB device number 30 using dummy_hcd [ 816.195217][ T8823] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1983, setting to 64 [ 816.206301][ T8823] usb 3-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 816.215376][ T8823] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 816.223996][ T8823] usb 3-1: config 0 descriptor?? [ 816.305202][ T8823] rc_core: IR keymap rc-hauppauge not found [ 816.311214][ T8823] Registered IR keymap rc-empty [ 816.317595][ T8823] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0 [ 816.333714][ T8823] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0/input30 [ 816.346835][T31973] EXT4-fs warning (device loop4): ext4_multi_mount_protect:324: MMP startup interrupted, failing mount [ 816.346835][T31973] [ 816.425585][T31981] EXT4-fs warning (device loop0): ext4_multi_mount_protect:324: MMP startup interrupted, failing mount [ 816.425585][T31981] [ 816.438915][T31983] EXT4-fs warning (device loop1): ext4_multi_mount_protect:324: MMP startup interrupted, failing mount [ 816.438915][T31983] [ 816.469628][T27347] usb 3-1: USB disconnect, device number 30 07:03:37 executing program 2: syz_usb_connect(0x0, 0x2d, &(0x7f0000000380)=ANY=[@ANYBLOB="12010000a504bd40eb030200c0ba0000000109021b0001000000000904000001b504b100090581d8bf17289c1f1bef5a9cf37906f1b221271bab2fef48604868c81bf389aa172b0a470f391f140592bbd4423ab8aec397eda6db964ec02515ba13319eac9f505c263890696f17c995f55ddb964af449c8335e4df2dd049289353a6349e2fcb280f225a0026ab50f", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB], 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0xc7c8, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000540)) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000e40)=[0x3fb, 0x3]) 07:03:37 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:37 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)='PMM\x00PMM', 0x7, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:37 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)='PMM\x00', 0x4, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) 07:03:37 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 817.016429][T32058] loop1: detected capacity change from 1024 to 0 [ 817.030310][T32066] loop4: detected capacity change from 1024 to 0 [ 817.041803][T32062] loop0: detected capacity change from 1024 to 0 [ 817.051801][T32066] EXT4-fs warning (device loop4): read_mmp_block:107: Error -117 while reading MMP block 64 07:03:37 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:37 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0xfc], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:37 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x5, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:37 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 817.180461][T32085] loop4: detected capacity change from 1024 to 0 [ 817.190302][T32085] EXT4-fs warning (device loop4): read_mmp_block:107: Error -117 while reading MMP block 64 [ 817.258601][T32095] loop3: detected capacity change from 1024 to 0 [ 817.271064][T32095] EXT4-fs warning (device loop3): read_mmp_block:107: Error -117 while reading MMP block 64 [ 817.335195][ T8823] usb 3-1: new high-speed USB device number 31 using dummy_hcd [ 817.695196][ T8823] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1983, setting to 64 [ 817.706187][ T8823] usb 3-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 817.717221][ T8823] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 817.727882][ T8823] usb 3-1: config 0 descriptor?? [ 817.805182][ T8823] rc_core: IR keymap rc-hauppauge not found [ 817.811158][ T8823] Registered IR keymap rc-empty [ 817.818262][ T8823] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0 [ 817.834035][ T8823] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0/input31 [ 817.855205][T32058] EXT4-fs warning (device loop1): ext4_multi_mount_protect:324: MMP startup interrupted, failing mount [ 817.855205][T32058] [ 817.855353][T32062] EXT4-fs warning (device loop0): ext4_multi_mount_protect:324: MMP startup interrupted, failing mount [ 817.855353][T32062] [ 817.971023][T27188] usb 3-1: USB disconnect, device number 31 07:03:39 executing program 2: syz_usb_connect(0x0, 0x2d, &(0x7f0000000380)=ANY=[@ANYBLOB="12010000a504bd40eb030200c0ba0000000109021b0001000000000904000001b504b100090581d8bf17289c1f1bef5a9cf37906f1b221271bab2fef48604868c81bf389aa172b0a470f391f140592bbd4423ab8aec397eda6db964ec02515ba13319eac9f505c263890696f17c995f55ddb964af449c8335e4df2dd049289353a6349e2fcb280f225a0026ab50f", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="c209cc7f01c60a532720661a64ddeb05a97de4ce54f341fd9663cf9b0b9c5170d7ab30f9f99ff1d58d5abf8d02c1"], 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0xc7c8, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000540)) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000e40)=[0x3fb, 0x3]) 07:03:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:39 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:39 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x5, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)='PMM\x00PM', 0x6, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) 07:03:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:39 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 818.512654][T32139] loop1: detected capacity change from 1024 to 0 [ 818.523182][T32139] EXT4-fs warning (device loop1): read_mmp_block:107: Error -117 while reading MMP block 64 [ 818.548242][T32147] loop3: detected capacity change from 1024 to 0 [ 818.563556][T32145] loop4: detected capacity change from 1024 to 0 [ 818.573605][T32146] loop0: detected capacity change from 1024 to 0 [ 818.582916][T32147] EXT4-fs warning (device loop3): read_mmp_block:107: Error -117 while reading MMP block 64 [ 818.600162][T32145] EXT4-fs warning (device loop4): read_mmp_block:107: Error -117 while reading MMP block 64 07:03:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:39 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x5, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x5, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:39 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 818.748000][T32167] loop3: detected capacity change from 1024 to 0 [ 818.766815][T32167] EXT4-fs warning (device loop3): read_mmp_block:107: Error -117 while reading MMP block 64 07:03:39 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 818.800902][T32175] loop4: detected capacity change from 1024 to 0 [ 818.814569][T32177] loop1: detected capacity change from 1024 to 0 [ 818.825257][T27347] usb 3-1: new high-speed USB device number 32 using dummy_hcd [ 818.848498][T32177] EXT4-fs warning (device loop1): read_mmp_block:107: Error -117 while reading MMP block 64 [ 818.869338][T32175] EXT4-fs error (device loop4): ext4_fill_super:4903: inode #2: comm syz-executor.4: iget: root inode unallocated [ 818.892271][T32175] EXT4-fs (loop4): get root inode failed [ 818.900622][T32175] EXT4-fs (loop4): mount failed [ 819.195199][T27347] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1983, setting to 64 [ 819.206249][T27347] usb 3-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 819.215434][T27347] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 819.224407][T27347] usb 3-1: config 0 descriptor?? [ 819.305178][T27347] rc_core: IR keymap rc-hauppauge not found [ 819.311133][T27347] Registered IR keymap rc-empty [ 819.317469][T27347] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0 [ 819.333642][T27347] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0/input32 [ 819.363613][T32146] EXT4-fs warning (device loop0): ext4_multi_mount_protect:324: MMP startup interrupted, failing mount [ 819.363613][T32146] [ 819.468268][T27347] usb 3-1: USB disconnect, device number 32 07:03:40 executing program 2: syz_usb_connect(0x0, 0x2d, &(0x7f0000000380)=ANY=[@ANYBLOB="12010000a504bd40eb030200c0ba0000000109021b0001000000000904000001b504b100090581d8bf17289c1f1bef5a9cf37906f1b221271bab2fef48604868c81bf389aa172b0a470f391f140592bbd4423ab8aec397eda6db964ec02515ba13319eac9f505c263890696f17c995f55ddb964af449c8335e4df2dd049289353a6349e2fcb280f225a0026ab50f", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="c209cc7f01c60a532720661a64ddeb05a97de4ce54f341fd9663cf9b0b9c5170d7ab30f9f99ff1d58d5abf8d02c1"], 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0xc7c8, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000540)) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000e40)=[0x3fb, 0x3]) 07:03:40 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:40 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x5, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:40 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)='PMM\x00PM', 0x6, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) 07:03:40 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 820.017823][T32228] loop0: detected capacity change from 1024 to 0 [ 820.028456][T32230] loop4: detected capacity change from 1024 to 0 [ 820.041835][T32227] loop3: detected capacity change from 1024 to 0 [ 820.054939][T32229] loop1: detected capacity change from 1024 to 0 [ 820.090263][T32227] EXT4-fs warning (device loop3): read_mmp_block:107: Error -117 while reading MMP block 64 [ 820.104803][T32229] EXT4-fs warning (device loop1): read_mmp_block:107: Error -117 while reading MMP block 64 [ 820.130896][T32230] EXT4-fs error (device loop4): ext4_fill_super:4903: inode #2: comm syz-executor.4: iget: root inode unallocated [ 820.154382][T32230] EXT4-fs (loop4): get root inode failed 07:03:40 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x5, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:40 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 820.182843][T32230] EXT4-fs (loop4): mount failed 07:03:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x5, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 820.315196][T27188] usb 3-1: new high-speed USB device number 33 using dummy_hcd 07:03:41 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 820.369009][T32265] loop1: detected capacity change from 1024 to 0 [ 820.387579][T32268] loop3: detected capacity change from 1024 to 0 [ 820.406706][T32270] loop4: detected capacity change from 1024 to 0 [ 820.414335][T32268] EXT4-fs warning (device loop3): read_mmp_block:107: Error -117 while reading MMP block 64 [ 820.441315][T32265] EXT4-fs error (device loop1): ext4_fill_super:4903: inode #2: comm syz-executor.1: iget: root inode unallocated [ 820.499839][T32270] EXT4-fs error (device loop4): ext4_fill_super:4903: inode #2: comm syz-executor.4: iget: root inode unallocated [ 820.512921][T32265] EXT4-fs (loop1): get root inode failed [ 820.513078][T32270] EXT4-fs (loop4): get root inode failed [ 820.524331][T32270] EXT4-fs (loop4): mount failed [ 820.525904][T32265] EXT4-fs (loop1): mount failed [ 820.706402][T27188] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1983, setting to 64 [ 820.722789][T27188] usb 3-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 820.733037][T27188] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 820.758655][T27188] usb 3-1: config 0 descriptor?? [ 820.845811][T32228] EXT4-fs warning (device loop0): ext4_multi_mount_protect:324: MMP startup interrupted, failing mount [ 820.845811][T32228] [ 820.865959][T27188] rc_core: IR keymap rc-hauppauge not found [ 820.871878][T27188] Registered IR keymap rc-empty [ 820.880988][T27188] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0 [ 820.896873][T27188] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0/input33 [ 821.019428][ T8823] usb 3-1: USB disconnect, device number 33 07:03:42 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:42 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:42 executing program 2: syz_usb_connect(0x0, 0x2d, &(0x7f0000000380)=ANY=[@ANYBLOB="12010000a504bd40eb030200c0ba0000000109021b0001000000000904000001b504b100090581d8bf17289c1f1bef5a9cf37906f1b221271bab2fef48604868c81bf389aa172b0a470f391f140592bbd4423ab8aec397eda6db964ec02515ba13319eac9f505c263890696f17c995f55ddb964af449c8335e4df2dd049289353a6349e2fcb280f225a0026ab50f", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="c209cc7f01c60a532720661a64ddeb05a97de4ce54f341fd9663cf9b0b9c5170d7ab30f9f99ff1d58d5abf8d02c1"], 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0xc7c8, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000540)) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000e40)=[0x3fb, 0x3]) 07:03:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x5, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)='PMM\x00PM', 0x6, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) 07:03:42 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 821.563099][T32322] loop4: detected capacity change from 1024 to 0 [ 821.582653][T32323] loop0: detected capacity change from 1024 to 0 [ 821.589574][T32322] EXT4-fs error (device loop4): ext4_fill_super:4903: inode #2: comm syz-executor.4: iget: root inode unallocated [ 821.597600][T32325] loop3: detected capacity change from 1024 to 0 [ 821.610692][T32327] loop1: detected capacity change from 1024 to 0 [ 821.611240][T32322] EXT4-fs (loop4): get root inode failed [ 821.625406][T32322] EXT4-fs (loop4): mount failed [ 821.638441][T32325] EXT4-fs warning (device loop3): read_mmp_block:107: Error -117 while reading MMP block 64 07:03:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 821.664119][T32327] EXT4-fs error (device loop1): ext4_fill_super:4903: inode #2: comm syz-executor.1: iget: root inode unallocated [ 821.677531][T32327] EXT4-fs (loop1): get root inode failed [ 821.683478][T32327] EXT4-fs (loop1): mount failed 07:03:42 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:42 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000), 0x0, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 821.717431][T32354] loop4: detected capacity change from 1024 to 0 07:03:42 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x5, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 821.788080][T32354] EXT4-fs error (device loop4): ext4_fill_super:4903: inode #2: comm syz-executor.4: iget: root inode unallocated 07:03:42 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 821.835155][ T17] usb 3-1: new high-speed USB device number 34 using dummy_hcd [ 821.842937][T32354] EXT4-fs (loop4): get root inode failed [ 821.851886][T32354] EXT4-fs (loop4): mount failed [ 821.875050][T32368] loop3: detected capacity change from 1024 to 0 07:03:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 821.926763][T32368] EXT4-fs warning (device loop3): read_mmp_block:107: Error -117 while reading MMP block 64 [ 821.939948][T32371] loop1: detected capacity change from 1024 to 0 07:03:42 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 821.966498][T32371] EXT4-fs error (device loop1): ext4_fill_super:4903: inode #2: comm syz-executor.1: iget: root inode unallocated [ 821.978747][T32371] EXT4-fs (loop1): get root inode failed [ 821.984504][T32371] EXT4-fs (loop1): mount failed [ 822.079297][T32394] loop4: detected capacity change from 1024 to 0 [ 822.112821][T32394] EXT4-fs error (device loop4): ext4_fill_super:4903: inode #2: comm syz-executor.4: iget: root inode unallocated [ 822.128115][T32394] EXT4-fs (loop4): get root inode failed [ 822.133911][T32394] EXT4-fs (loop4): mount failed [ 822.195476][ T17] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1983, setting to 64 [ 822.227045][ T17] usb 3-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 822.255223][ T17] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 822.256066][ T17] usb 3-1: config 0 descriptor?? [ 822.365187][ T17] rc_core: IR keymap rc-hauppauge not found [ 822.371118][ T17] Registered IR keymap rc-empty [ 822.377704][ T17] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0 [ 822.391185][T32323] EXT4-fs warning (device loop0): ext4_multi_mount_protect:324: MMP startup interrupted, failing mount [ 822.391185][T32323] [ 822.394342][ T17] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0/input34 [ 822.528612][ T8823] usb 3-1: USB disconnect, device number 34 07:03:43 executing program 2: syz_usb_connect(0x0, 0x2d, &(0x7f0000000380)=ANY=[@ANYBLOB="12010000a504bd40eb030200c0ba0000000109021b0001000000000904000001b504b100090581d8bf17289c1f1bef5a9cf37906f1b221271bab2fef48604868c81bf389aa172b0a470f391f140592bbd4423ab8aec397eda6db964ec02515ba13319eac9f505c263890696f17c995f55ddb964af449c8335e4df2dd049289353a6349e2fcb280f225a0026ab50f", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB], 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0xc7c8, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000540)) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000e40)=[0x3fb, 0x3]) 07:03:43 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000), 0x0, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:43 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00), 0x0, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)='PMM\x00PMM', 0x7, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) 07:03:43 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 823.056063][T32430] loop3: detected capacity change from 1024 to 0 [ 823.066771][T32430] EXT4-fs warning (device loop3): read_mmp_block:107: Error -117 while reading MMP block 64 07:03:43 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000), 0x0, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 823.126199][T32437] loop0: detected capacity change from 1024 to 0 [ 823.135000][T32440] loop1: detected capacity change from 1024 to 0 [ 823.143719][T32441] loop4: detected capacity change from 1024 to 0 [ 823.171886][T32440] EXT4-fs error (device loop1): ext4_fill_super:4903: inode #2: comm syz-executor.1: iget: root inode unallocated [ 823.184303][T32441] EXT4-fs error (device loop4): ext4_fill_super:4903: inode #2: comm syz-executor.4: iget: root inode unallocated [ 823.184477][T32440] EXT4-fs (loop1): get root inode failed [ 823.203364][T32440] EXT4-fs (loop1): mount failed [ 823.215308][T32441] EXT4-fs (loop4): get root inode failed [ 823.221112][T32441] EXT4-fs (loop4): mount failed 07:03:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:44 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}, 0x2}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 823.251470][T32463] loop3: detected capacity change from 1024 to 0 [ 823.289197][T32463] EXT4-fs warning (device loop3): read_mmp_block:107: Error -117 while reading MMP block 64 07:03:44 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}, 0x8}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00), 0x0, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 823.356783][ T9794] usb 3-1: new high-speed USB device number 35 using dummy_hcd [ 823.364582][T32473] loop1: detected capacity change from 1024 to 0 [ 823.418519][T32473] EXT4-fs error (device loop1): ext4_fill_super:4903: inode #2: comm syz-executor.1: iget: root inode unallocated [ 823.421973][T32485] loop4: detected capacity change from 1024 to 0 [ 823.439891][T32473] EXT4-fs (loop1): get root inode failed [ 823.446631][T32473] EXT4-fs (loop1): mount failed [ 823.460475][T32485] EXT4-fs error (device loop4): ext4_fill_super:4903: inode #2: comm syz-executor.4: iget: root inode unallocated [ 823.472931][T32485] EXT4-fs (loop4): get root inode failed [ 823.478731][T32485] EXT4-fs (loop4): mount failed [ 823.725211][ T9794] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1983, setting to 64 [ 823.736234][ T9794] usb 3-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 823.747154][ T9794] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 823.759263][ T9794] usb 3-1: config 0 descriptor?? [ 823.835186][ T9794] rc_core: IR keymap rc-hauppauge not found [ 823.841126][ T9794] Registered IR keymap rc-empty [ 823.847415][ T9794] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0 [ 823.861836][ T9794] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0/input35 [ 823.925162][T32437] EXT4-fs warning (device loop0): ext4_multi_mount_protect:324: MMP startup interrupted, failing mount [ 823.925162][T32437] [ 823.998279][T27347] usb 3-1: USB disconnect, device number 35 07:03:45 executing program 2: syz_usb_connect(0x0, 0x2d, &(0x7f0000000380)=ANY=[@ANYBLOB="12010000a504bd40eb030200c0ba0000000109021b0001000000000904000001b504b100090581d8bf17289c1f1bef5a9cf37906f1b221271bab2fef48604868c81bf389aa172b0a470f391f140592bbd4423ab8aec397eda6db964ec02515ba13319eac9f505c263890696f17c995f55ddb964af449c8335e4df2dd049289353a6349e2fcb280f225a0026ab50f", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB], 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0xc7c8, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000540)) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000e40)=[0x3fb, 0x3]) 07:03:45 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)='PMM\x00', 0x4, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:45 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}, 0x10}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00), 0x0, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)='PMM\x00PMM', 0x7, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) 07:03:45 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}, 0xfc}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 824.551171][T32530] loop0: detected capacity change from 1024 to 0 [ 824.561602][T32531] loop1: detected capacity change from 1024 to 0 [ 824.576949][T32532] loop4: detected capacity change from 1024 to 0 [ 824.586403][T32529] loop3: detected capacity change from 1024 to 0 [ 824.633594][T32531] EXT4-fs error (device loop1): ext4_fill_super:4903: inode #2: comm syz-executor.1: iget: root inode unallocated [ 824.648321][T32532] EXT4-fs error (device loop4): ext4_fill_super:4903: inode #2: comm syz-executor.4: iget: root inode unallocated [ 824.664054][T32532] EXT4-fs (loop4): get root inode failed 07:03:45 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}, 0xfc00}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f465", 0xf, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 824.682283][T32531] EXT4-fs (loop1): get root inode failed [ 824.682971][T32532] EXT4-fs (loop4): mount failed [ 824.693463][T32531] EXT4-fs (loop1): mount failed 07:03:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00), 0x0, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:45 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}, 0xff00}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 824.776556][T32567] loop4: detected capacity change from 1024 to 0 [ 824.802315][T32567] EXT4-fs error (device loop4): ext4_fill_super:4903: inode #2: comm syz-executor.4: iget: root inode unallocated [ 824.817894][T32567] EXT4-fs (loop4): get root inode failed 07:03:45 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}, 0x100000}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 824.846841][T27347] usb 3-1: new high-speed USB device number 36 using dummy_hcd [ 824.853897][T32567] EXT4-fs (loop4): mount failed [ 824.874727][T32576] loop1: detected capacity change from 1024 to 0 [ 824.945457][T32576] EXT4-fs error (device loop1): ext4_fill_super:4903: inode #2: comm syz-executor.1: iget: root inode unallocated [ 824.968818][T32576] EXT4-fs (loop1): get root inode failed [ 824.979720][T32576] EXT4-fs (loop1): mount failed [ 825.245190][T27347] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1983, setting to 64 [ 825.256264][T27347] usb 3-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 825.267672][T27347] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 825.278392][T27347] usb 3-1: config 0 descriptor?? [ 825.375185][T27347] rc_core: IR keymap rc-hauppauge not found [ 825.381115][T32529] EXT4-fs warning (device loop3): ext4_multi_mount_protect:324: MMP startup interrupted, failing mount [ 825.381115][T32529] [ 825.394425][T32530] EXT4-fs warning (device loop0): ext4_multi_mount_protect:324: MMP startup interrupted, failing mount [ 825.394425][T32530] [ 825.407751][T27347] Registered IR keymap rc-empty [ 825.412694][T27347] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0 [ 825.432573][T27347] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0/input36 [ 825.539729][T27347] usb 3-1: USB disconnect, device number 36 07:03:46 executing program 2: syz_usb_connect(0x0, 0x2d, &(0x7f0000000380)=ANY=[@ANYBLOB="12010000a504bd40eb030200c0ba0000000109021b0001000000000904000001b504b100090581d8bf17289c1f1bef5a9cf37906f1b221271bab2fef48604868c81bf389aa172b0a470f391f140592bbd4423ab8aec397eda6db964ec02515ba13319eac9f505c263890696f17c995f55ddb964af449c8335e4df2dd049289353a6349e2fcb280f225a0026ab50f", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB], 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0xc7c8, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000540)) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000e40)=[0x3fb, 0x3]) 07:03:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f465", 0xf, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:46 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}, 0x1000000}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00), 0x0, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:46 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)='PMM\x00', 0x4, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)='PMM\x00PMM', 0x7, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) 07:03:46 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}, 0x2000000}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 826.094508][T32626] loop1: detected capacity change from 1024 to 0 [ 826.108741][T32629] loop3: detected capacity change from 1024 to 0 [ 826.131701][T32631] loop0: detected capacity change from 1024 to 0 [ 826.142194][T32632] loop4: detected capacity change from 1024 to 0 [ 826.172781][T32626] EXT4-fs error (device loop1): ext4_fill_super:4903: inode #2: comm syz-executor.1: iget: root inode unallocated [ 826.194315][T32626] EXT4-fs (loop1): get root inode failed [ 826.197282][T32632] EXT4-fs error (device loop4): ext4_fill_super:4903: inode #2: comm syz-executor.4: iget: root inode unallocated [ 826.203068][T32626] EXT4-fs (loop1): mount failed 07:03:47 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}, 0x8000000}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:47 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}, 0xe0ffffff}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 826.243517][T32632] EXT4-fs (loop4): get root inode failed [ 826.257448][T32632] EXT4-fs (loop4): mount failed 07:03:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00), 0x0, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f465", 0xf, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:47 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}, 0xfc000000}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 826.369813][T32669] loop1: detected capacity change from 1024 to 0 [ 826.385173][ T9794] usb 3-1: new high-speed USB device number 37 using dummy_hcd [ 826.433845][T32669] EXT4-fs error (device loop1): ext4_fill_super:4903: inode #2: comm syz-executor.1: iget: root inode unallocated [ 826.469231][T32679] loop4: detected capacity change from 1024 to 0 [ 826.476791][T32669] EXT4-fs (loop1): get root inode failed [ 826.487596][T32669] EXT4-fs (loop1): mount failed [ 826.512326][T32679] EXT4-fs error (device loop4): ext4_fill_super:4903: inode #2: comm syz-executor.4: iget: root inode unallocated [ 826.524588][T32679] EXT4-fs (loop4): get root inode failed [ 826.536616][T32679] EXT4-fs (loop4): mount failed [ 826.815196][ T9794] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1983, setting to 64 [ 826.826192][ T9794] usb 3-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 826.836309][ T9794] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 826.846482][ T9794] usb 3-1: config 0 descriptor?? [ 826.929215][T32631] EXT4-fs warning (device loop0): ext4_multi_mount_protect:324: MMP startup interrupted, failing mount [ 826.929215][T32631] [ 826.942765][T32629] EXT4-fs warning (device loop3): ext4_multi_mount_protect:324: MMP startup interrupted, failing mount [ 826.942765][T32629] [ 826.956074][ T9794] rc_core: IR keymap rc-hauppauge not found [ 826.963770][ T9794] Registered IR keymap rc-empty [ 826.968931][ T9794] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0 [ 826.981231][ T9794] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0/input37 [ 827.104816][ T17] usb 3-1: USB disconnect, device number 37 07:03:48 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}, 0xfe80ffff}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f465", 0xf, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f0000", 0x16, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:48 executing program 2: syz_usb_connect(0x0, 0x2d, &(0x7f0000000380)=ANY=[@ANYBLOB="12010000a504bd40eb030200c0ba0000000109021b0001000000000904000001b504b100090581d8bf17289c1f1bef5a9cf37906f1b221271bab2fef48604868c81bf389aa172b0a470f391f140592bbd4423ab8aec397eda6db964ec02515ba13319eac9f505c263890696f17c995f55ddb964af449c8335e4df2dd049289353a6349e2fcb280f225a0026ab50f", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="c209cc7f01c60a532720661a64ddeb05a97de4ce54f341"], 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0xc7c8, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000540)) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000e40)=[0x3fb, 0x3]) 07:03:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) 07:03:48 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)='PMM\x00', 0x4, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:48 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}, 0xfec0ffff}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 827.651709][T32724] loop0: detected capacity change from 1024 to 0 [ 827.664378][T32724] EXT4-fs warning (device loop0): read_mmp_block:107: Error -117 while reading MMP block 64 [ 827.676911][T32731] loop3: detected capacity change from 1024 to 0 [ 827.697732][T32732] loop4: detected capacity change from 1024 to 0 [ 827.705047][T32730] loop1: detected capacity change from 1024 to 0 [ 827.736091][T32730] EXT4-fs error (device loop1): ext4_fill_super:4903: inode #2: comm syz-executor.1: iget: root inode unallocated [ 827.748452][T32730] EXT4-fs (loop1): get root inode failed 07:03:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) [ 827.772614][T32730] EXT4-fs (loop1): mount failed [ 827.784328][T32732] EXT4-fs error (device loop4): ext4_fill_super:4903: inode #2: comm syz-executor.4: iget: root inode unallocated [ 827.796697][T32732] EXT4-fs (loop4): get root inode failed [ 827.802499][T32732] EXT4-fs (loop4): mount failed 07:03:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f465", 0xf, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f0000", 0x16, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:48 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}, 0xfeffffff}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:48 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}, 0xff000000}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 827.907242][T32759] loop0: detected capacity change from 1024 to 0 [ 827.956543][ T7] usb 3-1: new high-speed USB device number 38 using dummy_hcd [ 827.969279][T32759] EXT4-fs warning (device loop0): read_mmp_block:107: Error -117 while reading MMP block 64 07:03:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) 07:03:48 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}, 0xffff0000}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 828.033213][ T306] loop4: detected capacity change from 1024 to 0 [ 828.048928][ T307] loop1: detected capacity change from 1024 to 0 [ 828.094399][ T316] loop0: detected capacity change from 1024 to 0 [ 828.102680][ T306] EXT4-fs error (device loop4): ext4_fill_super:4903: inode #2: comm syz-executor.4: iget: root inode unallocated [ 828.109510][ T316] EXT4-fs warning (device loop0): read_mmp_block:107: Error -117 while reading MMP block 64 [ 828.128251][ T306] EXT4-fs (loop4): get root inode failed [ 828.134823][ T306] EXT4-fs (loop4): mount failed 07:03:48 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}, 0xffff80fe}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x5, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) [ 828.140260][ T307] EXT4-fs error (device loop1): ext4_fill_super:4903: inode #2: comm syz-executor.1: iget: root inode unallocated [ 828.161047][ T307] EXT4-fs (loop1): get root inode failed [ 828.168080][ T307] EXT4-fs (loop1): mount failed [ 828.227547][ T331] loop0: detected capacity change from 1024 to 0 [ 828.295568][ T331] EXT4-fs error (device loop0): ext4_fill_super:4903: inode #2: comm syz-executor.0: iget: root inode unallocated [ 828.308023][ T331] EXT4-fs (loop0): get root inode failed [ 828.313718][ T331] EXT4-fs (loop0): mount failed [ 828.325185][ T7] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1983, setting to 64 [ 828.336150][ T7] usb 3-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 828.345732][ T7] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 828.354555][ T7] usb 3-1: config 0 descriptor?? [ 828.435155][ T7] rc_core: IR keymap rc-hauppauge not found [ 828.465194][ T7] Registered IR keymap rc-empty [ 828.471253][ T7] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0 [ 828.494414][ T7] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0/input38 [ 828.498505][T32731] EXT4-fs warning (device loop3): ext4_multi_mount_protect:324: MMP startup interrupted, failing mount [ 828.498505][T32731] [ 828.603222][ T7] usb 3-1: USB disconnect, device number 38 07:03:49 executing program 2: syz_usb_connect(0x0, 0x2d, &(0x7f0000000380)=ANY=[@ANYBLOB="12010000a504bd40eb030200c0ba0000000109021b0001000000000904000001b504b100090581d8bf17289c1f1bef5a9cf37906f1b221271bab2fef48604868c81bf389aa172b0a470f391f140592bbd4423ab8aec397eda6db964ec02515ba13319eac9f505c263890696f17c995f55ddb964af449c8335e4df2dd049289353a6349e2fcb280f225a0026ab50f", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="c209cc7f01c60a532720661a64ddeb05a97de4ce54f341"], 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0xc7c8, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000540)) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000e40)=[0x3fb, 0x3]) 07:03:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f0000", 0x16, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f465", 0xf, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:49 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}, 0xffffc0fe}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x5, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) 07:03:49 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)='PMM\x00PM', 0x6, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:49 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}, 0xffffffe0}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 829.146995][ T367] loop3: detected capacity change from 1024 to 0 [ 829.167257][ T371] loop1: detected capacity change from 1024 to 0 [ 829.178890][ T376] loop4: detected capacity change from 1024 to 0 [ 829.192463][ T378] loop0: detected capacity change from 1024 to 0 [ 829.243251][ T371] EXT4-fs error (device loop1): ext4_fill_super:4903: inode #2: comm syz-executor.1: iget: root inode unallocated [ 829.256828][ T376] EXT4-fs error (device loop4): ext4_fill_super:4903: inode #2: comm syz-executor.4: iget: root inode unallocated 07:03:50 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}, 0xfffffffe}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 829.283804][ T378] EXT4-fs error (device loop0): ext4_fill_super:4903: inode #2: comm syz-executor.0: iget: root inode unallocated [ 829.298784][ T371] EXT4-fs (loop1): get root inode failed [ 829.311700][ T376] EXT4-fs (loop4): get root inode failed [ 829.314168][ T378] EXT4-fs (loop0): get root inode failed [ 829.323160][ T378] EXT4-fs (loop0): mount failed [ 829.328352][ T371] EXT4-fs (loop1): mount failed [ 829.334418][ T376] EXT4-fs (loop4): mount failed 07:03:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f0000", 0x16, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x5, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) 07:03:50 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0x2, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000", 0x1a, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 829.465164][ T17] usb 3-1: new high-speed USB device number 39 using dummy_hcd [ 829.487355][ T410] loop1: detected capacity change from 1024 to 0 [ 829.510331][ T419] loop0: detected capacity change from 1024 to 0 [ 829.534143][ T419] EXT4-fs error (device loop0): ext4_fill_super:4903: inode #2: comm syz-executor.0: iget: root inode unallocated [ 829.546414][ T410] EXT4-fs error (device loop1): ext4_fill_super:4903: inode #2: comm syz-executor.1: iget: root inode unallocated [ 829.617738][ T419] EXT4-fs (loop0): get root inode failed [ 829.623624][ T410] EXT4-fs (loop1): get root inode failed [ 829.640373][ T419] EXT4-fs (loop0): mount failed [ 829.645994][ T410] EXT4-fs (loop1): mount failed [ 829.646409][ T433] loop4: detected capacity change from 1024 to 0 [ 829.722960][ T433] EXT4-fs error (device loop4): ext4_fill_super:4903: inode #2: comm syz-executor.4: iget: root inode unallocated [ 829.736369][ T433] EXT4-fs (loop4): get root inode failed [ 829.742034][ T433] EXT4-fs (loop4): mount failed [ 829.865184][ T17] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1983, setting to 64 [ 829.899324][ T17] usb 3-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 829.915314][ T17] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 829.924017][ T17] usb 3-1: config 0 descriptor?? [ 829.970690][ T367] EXT4-fs warning (device loop3): ext4_multi_mount_protect:324: MMP startup interrupted, failing mount [ 829.970690][ T367] [ 830.025206][ T17] rc_core: IR keymap rc-hauppauge not found [ 830.031134][ T17] Registered IR keymap rc-empty [ 830.038340][ T17] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0 [ 830.054845][ T17] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0/input39 [ 830.189184][ T7] usb 3-1: USB disconnect, device number 39 07:03:51 executing program 2: syz_usb_connect(0x0, 0x2d, &(0x7f0000000380)=ANY=[@ANYBLOB="12010000a504bd40eb030200c0ba0000000109021b0001000000000904000001b504b100090581d8bf17289c1f1bef5a9cf37906f1b221271bab2fef48604868c81bf389aa172b0a470f391f140592bbd4423ab8aec397eda6db964ec02515ba13319eac9f505c263890696f17c995f55ddb964af449c8335e4df2dd049289353a6349e2fcb280f225a0026ab50f", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="c209cc7f01c60a532720661a64ddeb05a97de4ce54f341"], 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0xc7c8, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000540)) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000e40)=[0x3fb, 0x3]) 07:03:51 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) 07:03:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000", 0x1a, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f0000", 0x16, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:51 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)='PMM\x00PM', 0x6, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 830.729143][ T471] loop0: detected capacity change from 1024 to 0 [ 830.738776][ T472] loop1: detected capacity change from 1024 to 0 [ 830.760697][ T471] EXT4-fs error (device loop0): ext4_fill_super:4903: inode #2: comm syz-executor.0: iget: root inode unallocated 07:03:51 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x2, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 830.774565][ T477] loop3: detected capacity change from 1024 to 0 [ 830.781499][ T472] EXT4-fs error (device loop1): ext4_fill_super:4903: inode #2: comm syz-executor.1: iget: root inode unallocated [ 830.790573][ T471] EXT4-fs (loop0): get root inode failed [ 830.800158][ T471] EXT4-fs (loop0): mount failed [ 830.816663][ T486] loop4: detected capacity change from 1024 to 0 [ 830.818831][ T472] EXT4-fs (loop1): get root inode failed [ 830.835976][ T472] EXT4-fs (loop1): mount failed 07:03:51 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x8, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f0000", 0x16, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) 07:03:51 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x10, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 830.923656][ T486] EXT4-fs error (device loop4): ext4_fill_super:4903: inode #2: comm syz-executor.4: iget: root inode unallocated [ 830.947517][ T486] EXT4-fs (loop4): get root inode failed [ 830.961902][ T486] EXT4-fs (loop4): mount failed 07:03:51 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0xfc, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 830.987838][ T513] loop0: detected capacity change from 1024 to 0 [ 831.035182][ T7] usb 3-1: new high-speed USB device number 40 using dummy_hcd [ 831.043915][ T517] loop1: detected capacity change from 1024 to 0 [ 831.105867][ T517] EXT4-fs error (device loop1): ext4_fill_super:4903: inode #2: comm syz-executor.1: iget: root inode unallocated [ 831.118300][ T513] EXT4-fs error (device loop0): ext4_fill_super:4903: inode #2: comm syz-executor.0: iget: root inode unallocated [ 831.140336][ T513] EXT4-fs (loop0): get root inode failed [ 831.147884][ T517] EXT4-fs (loop1): get root inode failed [ 831.156929][ T513] EXT4-fs (loop0): mount failed [ 831.161867][ T517] EXT4-fs (loop1): mount failed [ 831.395194][ T7] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1983, setting to 64 [ 831.406213][ T7] usb 3-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 831.415535][ T7] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 831.426680][ T7] usb 3-1: config 0 descriptor?? [ 831.505210][ T7] rc_core: IR keymap rc-hauppauge not found [ 831.511457][ T7] Registered IR keymap rc-empty [ 831.516611][ T7] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0 [ 831.528616][ T7] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0/input40 [ 831.585160][ T477] EXT4-fs warning (device loop3): ext4_multi_mount_protect:324: MMP startup interrupted, failing mount [ 831.585160][ T477] [ 831.667801][ T7] usb 3-1: USB disconnect, device number 40 07:03:52 executing program 2: syz_usb_connect(0x0, 0x2d, &(0x7f0000000380)=ANY=[@ANYBLOB="12010000a504bd40eb030200c0ba0000000109021b0001000000000904000001b504b100090581d8bf17289c1f1bef5a9cf37906f1b221271bab2fef48604868c81bf389aa172b0a470f391f140592bbd4423ab8aec397eda6db964ec02515ba13319eac9f505c263890696f17c995f55ddb964af449c8335e4df2dd049289353a6349e2fcb280f225a0026ab50f", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="c209cc7f01c60a532720661a64ddeb05a97de4ce54f341fd9663cf9b0b9c5170d7ab30"], 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0xc7c8, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000540)) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000e40)=[0x3fb, 0x3]) 07:03:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000", 0x1a, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:52 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0xfc00, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) 07:03:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000", 0x1a, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:52 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)='PMM\x00PM', 0x6, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:53 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0xff00, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 832.220258][ T566] loop3: detected capacity change from 1024 to 0 [ 832.234021][ T567] loop4: detected capacity change from 1024 to 0 [ 832.245924][ T572] loop0: detected capacity change from 1024 to 0 [ 832.257820][ T571] loop1: detected capacity change from 1024 to 0 [ 832.299487][ T567] EXT4-fs error (device loop4): ext4_fill_super:4903: inode #2: comm syz-executor.4: iget: root inode unallocated [ 832.334777][ T572] EXT4-fs error (device loop0): ext4_fill_super:4903: inode #2: comm syz-executor.0: iget: root inode unallocated [ 832.350945][ T571] EXT4-fs error (device loop1): ext4_fill_super:4903: inode #2: comm syz-executor.1: iget: root inode unallocated [ 832.368950][ T567] EXT4-fs (loop4): get root inode failed [ 832.378428][ T571] EXT4-fs (loop1): get root inode failed [ 832.380492][ T572] EXT4-fs (loop0): get root inode failed [ 832.384263][ T567] EXT4-fs (loop4): mount failed [ 832.394813][ T571] EXT4-fs (loop1): mount failed 07:03:53 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 832.400542][ T572] EXT4-fs (loop0): mount failed 07:03:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f0000000000000400", 0x1c, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:53 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x2, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000", 0x1a, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00), 0x0, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) [ 832.497008][ T17] usb 3-1: new high-speed USB device number 41 using dummy_hcd [ 832.556384][ T612] loop4: detected capacity change from 1024 to 0 [ 832.569896][ T613] loop1: detected capacity change from 1024 to 0 [ 832.588287][ T613] EXT4-fs error (device loop1): ext4_fill_super:4903: inode #2: comm syz-executor.1: iget: root inode unallocated [ 832.600399][ T620] loop0: detected capacity change from 1024 to 0 [ 832.609779][ T612] EXT4-fs (loop4): corrupt root inode, run e2fsck [ 832.613178][ T613] EXT4-fs (loop1): get root inode failed [ 832.618395][ T612] EXT4-fs (loop4): mount failed [ 832.639386][ T613] EXT4-fs (loop1): mount failed [ 832.647189][ T620] EXT4-fs error (device loop0): ext4_fill_super:4903: inode #2: comm syz-executor.0: iget: root inode unallocated [ 832.666811][ T620] EXT4-fs (loop0): get root inode failed [ 832.672511][ T620] EXT4-fs (loop0): mount failed [ 832.905248][ T17] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1983, setting to 64 [ 832.916209][ T17] usb 3-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 832.925480][ T17] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 832.934212][ T17] usb 3-1: config 0 descriptor?? [ 833.015206][ T17] rc_core: IR keymap rc-hauppauge not found [ 833.021137][ T17] Registered IR keymap rc-empty [ 833.026178][ T17] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0 [ 833.038162][ T17] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0/input41 [ 833.055208][ T566] EXT4-fs warning (device loop3): ext4_multi_mount_protect:324: MMP startup interrupted, failing mount [ 833.055208][ T566] [ 833.180645][ T9794] usb 3-1: USB disconnect, device number 41 07:03:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f0000000000000400", 0x1c, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:54 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x8, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00), 0x0, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) 07:03:54 executing program 2: syz_usb_connect(0x0, 0x2d, &(0x7f0000000380)=ANY=[@ANYBLOB="12010000a504bd40eb030200c0ba0000000109021b0001000000000904000001b504b100090581d8bf17289c1f1bef5a9cf37906f1b221271bab2fef48604868c81bf389aa172b0a470f391f140592bbd4423ab8aec397eda6db964ec02515ba13319eac9f505c263890696f17c995f55ddb964af449c8335e4df2dd049289353a6349e2fcb280f225a0026ab50f", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="c209cc7f01c60a532720661a64ddeb05a97de4ce54f341fd9663cf9b0b9c5170d7ab30"], 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0xc7c8, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000540)) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000e40)=[0x3fb, 0x3]) 07:03:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000", 0x1a, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:54 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)='PMM\x00PMM', 0x7, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:54 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x10, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 833.731076][ T670] loop1: detected capacity change from 1024 to 0 [ 833.751644][ T668] loop0: detected capacity change from 1024 to 0 [ 833.762040][ T667] loop3: detected capacity change from 1024 to 0 [ 833.772019][ T673] loop4: detected capacity change from 1024 to 0 [ 833.806616][ T670] EXT4-fs error (device loop1): ext4_fill_super:4903: inode #2: comm syz-executor.1: iget: root inode unallocated [ 833.818746][ T668] EXT4-fs error (device loop0): ext4_fill_super:4903: inode #2: comm syz-executor.0: iget: root inode unallocated [ 833.844262][ T670] EXT4-fs (loop1): get root inode failed [ 833.850160][ T670] EXT4-fs (loop1): mount failed 07:03:54 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0xfc, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f0000000000000400", 0x1c, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 833.860512][ T668] EXT4-fs (loop0): get root inode failed [ 833.866276][ T668] EXT4-fs (loop0): mount failed [ 833.876884][ T673] EXT4-fs (loop4): corrupt root inode, run e2fsck [ 833.884494][ T673] EXT4-fs (loop4): mount failed 07:03:54 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0xfc00, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00), 0x0, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) [ 834.005199][T27188] usb 3-1: new high-speed USB device number 42 using dummy_hcd [ 834.026391][ T705] loop1: detected capacity change from 1024 to 0 07:03:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f0000000000000400", 0x1c, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:54 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0xff00, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 834.103561][ T705] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 834.111206][ T705] EXT4-fs (loop1): mount failed 07:03:54 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x100000, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f0000000000000400", 0x1c, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 834.176263][ T725] loop4: detected capacity change from 1024 to 0 [ 834.194879][ T726] loop0: detected capacity change from 1024 to 0 [ 834.245471][ T725] EXT4-fs (loop4): corrupt root inode, run e2fsck [ 834.252363][ T725] EXT4-fs (loop4): mount failed [ 834.273189][ T726] EXT4-fs error (device loop0): ext4_fill_super:4903: inode #2: comm syz-executor.0: iget: root inode unallocated [ 834.288050][ T726] EXT4-fs (loop0): get root inode failed [ 834.293778][ T726] EXT4-fs (loop0): mount failed [ 834.327893][ T745] loop1: detected capacity change from 1024 to 0 [ 834.405560][T27188] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1983, setting to 64 [ 834.421159][ T745] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 834.427740][ T745] EXT4-fs (loop1): mount failed [ 834.433981][T27188] usb 3-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 834.448495][T27188] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 834.458371][T27188] usb 3-1: config 0 descriptor?? [ 834.545162][T27188] rc_core: IR keymap rc-hauppauge not found [ 834.551129][T27188] Registered IR keymap rc-empty [ 834.556952][ T667] EXT4-fs warning (device loop3): ext4_multi_mount_protect:324: MMP startup interrupted, failing mount [ 834.556952][ T667] [ 834.565291][T27188] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0 [ 834.587736][T27188] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0/input42 [ 834.710780][T27188] usb 3-1: USB disconnect, device number 42 07:03:55 executing program 2: syz_usb_connect(0x0, 0x2d, &(0x7f0000000380)=ANY=[@ANYBLOB="12010000a504bd40eb030200c0ba0000000109021b0001000000000904000001b504b100090581d8bf17289c1f1bef5a9cf37906f1b221271bab2fef48604868c81bf389aa172b0a470f391f140592bbd4423ab8aec397eda6db964ec02515ba13319eac9f505c263890696f17c995f55ddb964af449c8335e4df2dd049289353a6349e2fcb280f225a0026ab50f", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="c209cc7f01c60a532720661a64ddeb05a97de4ce54f341fd9663cf9b0b9c5170d7ab30"], 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0xc7c8, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000540)) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000e40)=[0x3fb, 0x3]) 07:03:55 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x1000000, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f465", 0xf, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) 07:03:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f0000000000000400", 0x1c, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:55 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)='PMM\x00PMM', 0x7, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:56 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x2000000, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 835.261800][ T784] loop1: detected capacity change from 1024 to 0 [ 835.274132][ T783] loop3: detected capacity change from 1024 to 0 [ 835.292783][ T785] loop4: detected capacity change from 1024 to 0 [ 835.306059][ T789] loop0: detected capacity change from 1024 to 0 [ 835.330818][ T785] EXT4-fs error (device loop4): ext4_fill_super:4903: inode #2: comm syz-executor.4: iget: root inode unallocated [ 835.344763][ T784] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 835.359313][ T789] EXT4-fs error (device loop0): ext4_fill_super:4903: inode #2: comm syz-executor.0: iget: root inode unallocated [ 835.363428][ T784] EXT4-fs (loop1): mount failed [ 835.376454][ T785] EXT4-fs (loop4): get root inode failed [ 835.382548][ T785] EXT4-fs (loop4): mount failed 07:03:56 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x8000000, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 835.414368][ T789] EXT4-fs (loop0): get root inode failed [ 835.432285][ T789] EXT4-fs (loop0): mount failed 07:03:56 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0xe0ffffff, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f465", 0xf, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) [ 835.565207][ T17] usb 3-1: new high-speed USB device number 43 using dummy_hcd [ 835.611379][ T830] loop4: detected capacity change from 1024 to 0 [ 835.630677][ T831] loop1: detected capacity change from 1024 to 0 [ 835.662108][ T830] EXT4-fs error (device loop4): ext4_fill_super:4903: inode #2: comm syz-executor.4: iget: root inode unallocated [ 835.665451][ T831] EXT4-fs error (device loop1): ext4_fill_super:4903: inode #2: comm syz-executor.1: iget: root inode unallocated [ 835.679777][ T830] EXT4-fs (loop4): get root inode failed [ 835.692033][ T842] loop0: detected capacity change from 1024 to 0 [ 835.692072][ T831] EXT4-fs (loop1): get root inode failed [ 835.708356][ T831] EXT4-fs (loop1): mount failed [ 835.713571][ T830] EXT4-fs (loop4): mount failed [ 835.735499][ T842] EXT4-fs error (device loop0): ext4_fill_super:4903: inode #2: comm syz-executor.0: iget: root inode unallocated [ 835.748518][ T842] EXT4-fs (loop0): get root inode failed [ 835.754313][ T842] EXT4-fs (loop0): mount failed [ 835.925210][ T17] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1983, setting to 64 [ 835.936167][ T17] usb 3-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 835.948015][ T17] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 835.957996][ T17] usb 3-1: config 0 descriptor?? [ 836.035226][ T17] rc_core: IR keymap rc-hauppauge not found [ 836.042531][ T17] Registered IR keymap rc-empty [ 836.051375][ T17] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0 [ 836.079425][ T17] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0/input43 [ 836.091582][ T783] EXT4-fs warning (device loop3): ext4_multi_mount_protect:324: MMP startup interrupted, failing mount [ 836.091582][ T783] [ 836.198865][T27188] usb 3-1: USB disconnect, device number 43 07:03:57 executing program 2: syz_usb_connect(0x0, 0x2d, &(0x7f0000000380)=ANY=[@ANYBLOB="12010000a504bd40eb030200c0ba0000000109021b0001000000000904000001b504b100090581d8bf17289c1f1bef5a9cf37906f1b221271bab2fef48604868c81bf389aa172b0a470f391f140592bbd4423ab8aec397eda6db964ec02515ba13319eac9f505c263890696f17c995f55ddb964af449c8335e4df2dd049289353a6349e2fcb280f225a0026ab50f", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="c209cc7f01c60a532720661a64ddeb05a97de4ce54f341fd9663cf9b0b9c5170d7ab30f9f99ff1d58d"], 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0xc7c8, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000540)) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000e40)=[0x3fb, 0x3]) 07:03:57 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0xfc000000, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f465", 0xf, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) 07:03:57 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)='PMM\x00PMM', 0x7, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:57 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0xfe80ffff, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 836.751859][ T881] loop3: detected capacity change from 1024 to 0 [ 836.772077][ T882] loop1: detected capacity change from 1024 to 0 [ 836.785070][ T887] loop4: detected capacity change from 1024 to 0 [ 836.798794][ T886] loop0: detected capacity change from 1024 to 0 [ 836.841148][ T886] EXT4-fs error (device loop0): ext4_fill_super:4903: inode #2: comm syz-executor.0: iget: root inode unallocated [ 836.863055][ T887] EXT4-fs error (device loop4): ext4_fill_super:4903: inode #2: comm syz-executor.4: iget: root inode unallocated [ 836.878086][ T882] EXT4-fs error (device loop1): ext4_fill_super:4903: inode #2: comm syz-executor.1: iget: root inode unallocated 07:03:57 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0xfec0ffff, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 836.900494][ T886] EXT4-fs (loop0): get root inode failed [ 836.914222][ T882] EXT4-fs (loop1): get root inode failed [ 836.921724][ T887] EXT4-fs (loop4): get root inode failed [ 836.928228][ T886] EXT4-fs (loop0): mount failed [ 836.932656][ T887] EXT4-fs (loop4): mount failed [ 836.944407][ T882] EXT4-fs (loop1): mount failed 07:03:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f0000", 0x16, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) [ 837.045179][ T7] usb 3-1: new high-speed USB device number 44 using dummy_hcd 07:03:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x5, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 837.112288][ T925] loop0: detected capacity change from 1024 to 0 [ 837.149989][ T925] EXT4-fs error (device loop0): ext4_fill_super:4903: inode #2: comm syz-executor.0: iget: root inode unallocated 07:03:57 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0xfeffffff, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 837.170801][ T925] EXT4-fs (loop0): get root inode failed [ 837.179558][ T925] EXT4-fs (loop0): mount failed [ 837.239150][ T935] loop1: detected capacity change from 1024 to 0 [ 837.253911][ T936] loop4: detected capacity change from 1024 to 0 [ 837.276127][ T935] EXT4-fs error (device loop1): ext4_fill_super:4903: inode #2: comm syz-executor.1: iget: root inode unallocated [ 837.289194][ T935] EXT4-fs (loop1): get root inode failed [ 837.294935][ T935] EXT4-fs (loop1): mount failed [ 837.303656][ T936] EXT4-fs error (device loop4): ext4_fill_super:4903: inode #2: comm syz-executor.4: iget: root inode unallocated [ 837.316726][ T936] EXT4-fs (loop4): get root inode failed [ 837.322769][ T936] EXT4-fs (loop4): mount failed [ 837.415223][ T7] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1983, setting to 64 [ 837.429863][ T7] usb 3-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 837.445389][ T7] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 837.454939][ T7] usb 3-1: config 0 descriptor?? [ 837.545189][ T7] rc_core: IR keymap rc-hauppauge not found [ 837.551118][ T7] Registered IR keymap rc-empty [ 837.572037][ T7] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0 [ 837.575663][ T881] EXT4-fs warning (device loop3): ext4_multi_mount_protect:324: MMP startup interrupted, failing mount [ 837.575663][ T881] [ 837.616335][ T7] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0/input44 [ 837.698448][ T17] usb 3-1: USB disconnect, device number 44 07:03:58 executing program 2: syz_usb_connect(0x0, 0x2d, &(0x7f0000000380)=ANY=[@ANYBLOB="12010000a504bd40eb030200c0ba0000000109021b0001000000000904000001b504b100090581d8bf17289c1f1bef5a9cf37906f1b221271bab2fef48604868c81bf389aa172b0a470f391f140592bbd4423ab8aec397eda6db964ec02515ba13319eac9f505c263890696f17c995f55ddb964af449c8335e4df2dd049289353a6349e2fcb280f225a0026ab50f", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="c209cc7f01c60a532720661a64ddeb05a97de4ce54f341fd9663cf9b0b9c5170d7ab30f9f99ff1d58d"], 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0xc7c8, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000540)) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000e40)=[0x3fb, 0x3]) 07:03:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f0000", 0x16, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) 07:03:58 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0xff000000, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x5, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x5, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:58 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:59 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0xffff0000, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 838.244703][ T985] loop1: detected capacity change from 1024 to 0 [ 838.259667][ T984] loop3: detected capacity change from 1024 to 0 [ 838.272967][ T993] loop0: detected capacity change from 1024 to 0 [ 838.287574][ T992] loop4: detected capacity change from 1024 to 0 [ 838.297527][ T984] EXT4-fs warning (device loop3): read_mmp_block:107: Error -117 while reading MMP block 64 [ 838.298414][ T985] EXT4-fs error (device loop1): ext4_fill_super:4903: inode #2: comm syz-executor.1: iget: root inode unallocated [ 838.319927][ T985] EXT4-fs (loop1): get root inode failed [ 838.325649][ T985] EXT4-fs (loop1): mount failed 07:03:59 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 838.385237][ T993] EXT4-fs error (device loop0): ext4_fill_super:4903: inode #2: comm syz-executor.0: iget: root inode unallocated [ 838.415199][ T992] EXT4-fs error (device loop4): ext4_fill_super:4903: inode #2: comm syz-executor.4: iget: root inode unallocated [ 838.427393][ T992] EXT4-fs (loop4): get root inode failed 07:03:59 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0xffff80fe, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:03:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x5, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:03:59 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0xffffc0fe, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 838.434019][ T992] EXT4-fs (loop4): mount failed [ 838.439235][ T993] EXT4-fs (loop0): get root inode failed [ 838.445053][ T993] EXT4-fs (loop0): mount failed 07:03:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x5, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 838.525240][ T17] usb 3-1: new high-speed USB device number 45 using dummy_hcd [ 838.625250][ T1022] loop3: detected capacity change from 1024 to 0 [ 838.657664][ T1030] loop1: detected capacity change from 1024 to 0 [ 838.686419][ T1038] loop4: detected capacity change from 1024 to 0 [ 838.713491][ T1030] EXT4-fs error (device loop1): ext4_fill_super:4903: inode #2: comm syz-executor.1: iget: root inode unallocated [ 838.725684][ T1030] EXT4-fs (loop1): get root inode failed [ 838.731320][ T1030] EXT4-fs (loop1): mount failed [ 838.766815][ T1038] EXT4-fs error (device loop4): ext4_fill_super:4903: inode #2: comm syz-executor.4: iget: root inode unallocated [ 838.779147][ T1038] EXT4-fs (loop4): get root inode failed [ 838.786018][ T1038] EXT4-fs (loop4): mount failed [ 838.907156][ T17] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1983, setting to 64 [ 838.928945][ T17] usb 3-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 838.941174][ T17] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 838.953408][ T17] usb 3-1: config 0 descriptor?? [ 839.055179][ T17] rc_core: IR keymap rc-hauppauge not found [ 839.062496][ T17] Registered IR keymap rc-empty [ 839.081103][ T17] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0 [ 839.100770][ T17] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0/input45 [ 839.215251][ T17] usb 3-1: USB disconnect, device number 45 07:04:00 executing program 2: syz_usb_connect(0x0, 0x2d, &(0x7f0000000380)=ANY=[@ANYBLOB="12010000a504bd40eb030200c0ba0000000109021b0001000000000904000001b504b100090581d8bf17289c1f1bef5a9cf37906f1b221271bab2fef48604868c81bf389aa172b0a470f391f140592bbd4423ab8aec397eda6db964ec02515ba13319eac9f505c263890696f17c995f55ddb964af449c8335e4df2dd049289353a6349e2fcb280f225a0026ab50f", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="c209cc7f01c60a532720661a64ddeb05a97de4ce54f341fd9663cf9b0b9c5170d7ab30f9f99ff1d58d"], 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0xc7c8, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000540)) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000e40)=[0x3fb, 0x3]) 07:04:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f0000", 0x16, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) 07:04:00 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0xffffffe0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:04:00 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:04:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x5, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:04:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 839.762504][ T1079] loop1: detected capacity change from 1024 to 0 [ 839.772553][ T1081] loop3: detected capacity change from 1024 to 0 [ 839.786081][ T1081] EXT4-fs warning (device loop3): read_mmp_block:107: Error -117 while reading MMP block 64 [ 839.798327][ T1079] EXT4-fs error (device loop1): ext4_fill_super:4903: inode #2: comm syz-executor.1: iget: root inode unallocated 07:04:00 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0xfffffffe, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:04:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:04:00 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x5, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 839.810626][ T1079] EXT4-fs (loop1): get root inode failed [ 839.817829][ T1079] EXT4-fs (loop1): mount failed [ 839.832134][ T1091] loop4: detected capacity change from 1024 to 0 [ 839.841126][ T1092] loop0: detected capacity change from 1024 to 0 [ 839.897382][ T1091] EXT4-fs error (device loop4): ext4_fill_super:4903: inode #2: comm syz-executor.4: iget: root inode unallocated [ 839.917694][ T1091] EXT4-fs (loop4): get root inode failed [ 839.935217][ T1091] EXT4-fs (loop4): mount failed 07:04:00 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 839.948907][ T1108] loop1: detected capacity change from 1024 to 0 [ 839.957174][ T1092] EXT4-fs error (device loop0): ext4_fill_super:4903: inode #2: comm syz-executor.0: iget: root inode unallocated [ 839.976477][ T1119] loop3: detected capacity change from 1024 to 0 [ 839.983588][ T1092] EXT4-fs (loop0): get root inode failed [ 839.991246][ T1092] EXT4-fs (loop0): mount failed 07:04:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 840.018623][ T1119] EXT4-fs error (device loop3): ext4_fill_super:4903: inode #2: comm syz-executor.3: iget: root inode unallocated [ 840.036330][ T1108] EXT4-fs error (device loop1): ext4_fill_super:4903: inode #2: comm syz-executor.1: iget: root inode unallocated [ 840.051103][ T1108] EXT4-fs (loop1): get root inode failed [ 840.061401][ T1108] EXT4-fs (loop1): mount failed 07:04:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000", 0x1a, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) [ 840.076569][ T1119] EXT4-fs (loop3): get root inode failed [ 840.091029][ T1119] EXT4-fs (loop3): mount failed [ 840.095164][ T8823] usb 3-1: new high-speed USB device number 46 using dummy_hcd [ 840.186173][ T1137] loop4: detected capacity change from 1024 to 0 [ 840.201932][ T1139] loop0: detected capacity change from 1024 to 0 [ 840.227434][ T1137] EXT4-fs error (device loop4): ext4_fill_super:4903: inode #2: comm syz-executor.4: iget: root inode unallocated [ 840.240072][ T1139] EXT4-fs error (device loop0): ext4_fill_super:4903: inode #2: comm syz-executor.0: iget: root inode unallocated [ 840.255027][ T1137] EXT4-fs (loop4): get root inode failed [ 840.264988][ T1139] EXT4-fs (loop0): get root inode failed [ 840.273527][ T1137] EXT4-fs (loop4): mount failed [ 840.280168][ T1139] EXT4-fs (loop0): mount failed [ 840.455563][ T8823] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1983, setting to 64 [ 840.477846][ T8823] usb 3-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 840.501329][ T8823] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 840.512212][ T8823] usb 3-1: config 0 descriptor?? [ 840.605180][ T8823] rc_core: IR keymap rc-hauppauge not found [ 840.611202][ T8823] Registered IR keymap rc-empty [ 840.616337][ T8823] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0 [ 840.627076][ T8823] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0/input46 [ 840.769689][T27188] usb 3-1: USB disconnect, device number 46 07:04:02 executing program 2: syz_usb_connect(0x0, 0x2d, &(0x7f0000000380)=ANY=[@ANYBLOB="12010000a504bd40eb030200c0ba0000000109021b0001000000000904000001b504b100090581d8bf17289c1f1bef5a9cf37906f1b221271bab2fef48604868c81bf389aa172b0a470f391f140592bbd4423ab8aec397eda6db964ec02515ba13319eac9f505c263890696f17c995f55ddb964af449c8335e4df2dd049289353a6349e2fcb280f225a0026ab50f", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="c209cc7f01c60a532720661a64ddeb05a97de4ce54f341fd9663cf9b0b9c5170d7ab30f9f99ff1d58d5abf8d"], 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0xc7c8, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000540)) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000e40)=[0x3fb, 0x3]) 07:04:02 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[0x2], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:04:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:04:02 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x5, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:04:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:04:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000", 0x1a, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) [ 841.315327][ T1182] loop3: detected capacity change from 1024 to 0 [ 841.329176][ T1183] loop1: detected capacity change from 1024 to 0 [ 841.339856][ T1185] loop4: detected capacity change from 1024 to 0 [ 841.353136][ T1186] loop0: detected capacity change from 1024 to 0 07:04:02 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[0x8], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 841.361496][ T1182] EXT4-fs error (device loop3): ext4_fill_super:4903: inode #2: comm syz-executor.3: iget: root inode unallocated [ 841.402529][ T1186] EXT4-fs error (device loop0): ext4_fill_super:4903: inode #2: comm syz-executor.0: iget: root inode unallocated [ 841.402711][ T1182] EXT4-fs (loop3): get root inode failed [ 841.416298][ T1183] EXT4-fs error (device loop1): ext4_fill_super:4903: inode #2: comm syz-executor.1: iget: root inode unallocated [ 841.420885][ T1182] EXT4-fs (loop3): mount failed [ 841.439521][ T1185] EXT4-fs error (device loop4): ext4_fill_super:4903: inode #2: comm syz-executor.4: iget: root inode unallocated [ 841.452250][ T1186] EXT4-fs (loop0): get root inode failed [ 841.458111][ T1183] EXT4-fs (loop1): get root inode failed 07:04:02 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[0xfc], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 841.464163][ T1183] EXT4-fs (loop1): mount failed [ 841.470205][ T1185] EXT4-fs (loop4): get root inode failed [ 841.472332][ T1186] EXT4-fs (loop0): mount failed [ 841.481276][ T1185] EXT4-fs (loop4): mount failed 07:04:02 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x5, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:04:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000", 0x1a, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) 07:04:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:04:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240), 0x0, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 841.610240][ T1223] loop3: detected capacity change from 1024 to 0 [ 841.626290][T27188] usb 3-1: new high-speed USB device number 47 using dummy_hcd [ 841.683536][ T1223] EXT4-fs error (device loop3): ext4_fill_super:4903: inode #2: comm syz-executor.3: iget: root inode unallocated [ 841.702410][ T1223] EXT4-fs (loop3): get root inode failed [ 841.714667][ T1223] EXT4-fs (loop3): mount failed [ 841.766256][ T1237] loop0: detected capacity change from 1024 to 0 [ 841.778492][ T1238] loop4: detected capacity change from 1024 to 0 [ 841.796303][ T1239] loop1: detected capacity change from 1024 to 0 [ 841.810091][ T1237] EXT4-fs error (device loop0): ext4_fill_super:4903: inode #2: comm syz-executor.0: iget: root inode unallocated [ 841.822850][ T1238] EXT4-fs error (device loop4): ext4_fill_super:4903: inode #2: comm syz-executor.4: iget: root inode unallocated [ 841.835367][ T1238] EXT4-fs (loop4): get root inode failed [ 841.841370][ T1238] EXT4-fs (loop4): mount failed [ 841.851849][ T1237] EXT4-fs (loop0): get root inode failed [ 841.852559][ T1239] EXT4-fs error (device loop1): ext4_fill_super:4903: inode #2: comm syz-executor.1: iget: root inode unallocated [ 841.869812][ T1237] EXT4-fs (loop0): mount failed [ 841.870355][ T1239] EXT4-fs (loop1): get root inode failed [ 841.880310][ T1239] EXT4-fs (loop1): mount failed [ 842.045201][T27188] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1983, setting to 64 [ 842.077052][T27188] usb 3-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 842.089292][T27188] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 842.099579][T27188] usb 3-1: config 0 descriptor?? [ 842.205174][T27188] rc_core: IR keymap rc-hauppauge not found [ 842.215489][T27188] Registered IR keymap rc-empty [ 842.220494][T27188] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0 [ 842.237635][T27188] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0/input47 [ 842.338360][T27188] usb 3-1: USB disconnect, device number 47 07:04:03 executing program 2: syz_usb_connect(0x0, 0x2d, &(0x7f0000000380)=ANY=[@ANYBLOB="12010000a504bd40eb030200c0ba0000000109021b0001000000000904000001b504b100090581d8bf17289c1f1bef5a9cf37906f1b221271bab2fef48604868c81bf389aa172b0a470f391f140592bbd4423ab8aec397eda6db964ec02515ba13319eac9f505c263890696f17c995f55ddb964af449c8335e4df2dd049289353a6349e2fcb280f225a0026ab50f", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="c209cc7f01c60a532720661a64ddeb05a97de4ce54f341fd9663cf9b0b9c5170d7ab30f9f99ff1d58d5abf8d"], 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0xc7c8, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000540)) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000e40)=[0x3fb, 0x3]) 07:04:03 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:04:03 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:04:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240), 0x0, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:04:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240), 0x0, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:04:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f0000000000000400", 0x1c, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) 07:04:03 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x2], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 842.876718][ T1286] loop3: detected capacity change from 1024 to 0 [ 842.898699][ T1289] loop1: detected capacity change from 1024 to 0 [ 842.908456][ T1294] loop0: detected capacity change from 1024 to 0 [ 842.920151][ T1295] loop4: detected capacity change from 1024 to 0 [ 842.931157][ T1286] EXT4-fs error (device loop3): ext4_fill_super:4903: inode #2: comm syz-executor.3: iget: root inode unallocated [ 842.958983][ T1286] EXT4-fs (loop3): get root inode failed [ 842.984951][ T1286] EXT4-fs (loop3): mount failed [ 842.998272][ T1289] EXT4-fs error (device loop1): ext4_fill_super:4903: inode #2: comm syz-executor.1: iget: root inode unallocated [ 843.010397][ T1294] EXT4-fs (loop0): corrupt root inode, run e2fsck [ 843.017160][ T1294] EXT4-fs (loop0): mount failed [ 843.022265][ T1295] EXT4-fs error (device loop4): ext4_fill_super:4903: inode #2: comm syz-executor.4: iget: root inode unallocated 07:04:03 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:04:03 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x8], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:04:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f0000000000000400", 0x1c, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) [ 843.051645][ T1289] EXT4-fs (loop1): get root inode failed [ 843.060040][ T1295] EXT4-fs (loop4): get root inode failed [ 843.083002][ T1289] EXT4-fs (loop1): mount failed [ 843.091904][ T1295] EXT4-fs (loop4): mount failed [ 843.165193][T27347] usb 3-1: new high-speed USB device number 48 using dummy_hcd 07:04:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240), 0x0, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:04:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240), 0x0, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 843.252702][ T1336] loop3: detected capacity change from 1024 to 0 [ 843.278483][ T1335] loop0: detected capacity change from 1024 to 0 [ 843.310596][ T1345] loop4: detected capacity change from 1024 to 0 [ 843.315750][ T1336] EXT4-fs error (device loop3): ext4_fill_super:4903: inode #2: comm syz-executor.3: iget: root inode unallocated [ 843.333222][ T1335] EXT4-fs (loop0): corrupt root inode, run e2fsck [ 843.353022][ T1335] EXT4-fs (loop0): mount failed [ 843.364118][ T1345] EXT4-fs error (device loop4): ext4_fill_super:4903: inode #2: comm syz-executor.4: iget: root inode unallocated [ 843.369787][ T1336] EXT4-fs (loop3): get root inode failed [ 843.385329][ T1350] loop1: detected capacity change from 1024 to 0 [ 843.392565][ T1345] EXT4-fs (loop4): get root inode failed [ 843.401438][ T1345] EXT4-fs (loop4): mount failed [ 843.408832][ T1336] EXT4-fs (loop3): mount failed [ 843.447595][ T1350] EXT4-fs error (device loop1): ext4_fill_super:4903: inode #2: comm syz-executor.1: iget: root inode unallocated [ 843.459806][ T1350] EXT4-fs (loop1): get root inode failed [ 843.468229][ T1350] EXT4-fs (loop1): mount failed [ 843.525180][T27347] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1983, setting to 64 [ 843.536112][T27347] usb 3-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 843.545168][T27347] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 843.554418][T27347] usb 3-1: config 0 descriptor?? [ 843.655170][T27347] rc_core: IR keymap rc-hauppauge not found [ 843.661132][T27347] Registered IR keymap rc-empty [ 843.670297][T27347] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0 [ 843.688929][T27347] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0/input48 [ 843.811776][ T7] usb 3-1: USB disconnect, device number 48 07:04:05 executing program 2: syz_usb_connect(0x0, 0x2d, &(0x7f0000000380)=ANY=[@ANYBLOB="12010000a504bd40eb030200c0ba0000000109021b0001000000000904000001b504b100090581d8bf17289c1f1bef5a9cf37906f1b221271bab2fef48604868c81bf389aa172b0a470f391f140592bbd4423ab8aec397eda6db964ec02515ba13319eac9f505c263890696f17c995f55ddb964af449c8335e4df2dd049289353a6349e2fcb280f225a0026ab50f", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="c209cc7f01c60a532720661a64ddeb05a97de4ce54f341fd9663cf9b0b9c5170d7ab30f9f99ff1d58d5abf8d"], 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0xc7c8, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000540)) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000e40)=[0x3fb, 0x3]) 07:04:05 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0xfc], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:04:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f0000000000000400", 0x1c, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) 07:04:05 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:04:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="0300000004", 0x5, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:04:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240), 0x0, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:04:05 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 844.366180][ T1396] loop3: detected capacity change from 1024 to 0 [ 844.377115][ T1397] loop0: detected capacity change from 1024 to 0 [ 844.396686][ T1395] loop1: detected capacity change from 1024 to 0 [ 844.409085][ T1398] loop4: detected capacity change from 1024 to 0 [ 844.457770][ T1396] EXT4-fs error (device loop3): ext4_fill_super:4903: inode #2: comm syz-executor.3: iget: root inode unallocated [ 844.476320][ T1397] EXT4-fs (loop0): corrupt root inode, run e2fsck [ 844.482966][ T1395] EXT4-fs error (device loop1): ext4_fill_super:4903: inode #2: comm syz-executor.1: iget: root inode unallocated [ 844.511757][ T1396] EXT4-fs (loop3): get root inode failed [ 844.513272][ T1397] EXT4-fs (loop0): mount failed [ 844.517712][ T1396] EXT4-fs (loop3): mount failed [ 844.527673][ T1398] EXT4-fs error (device loop4): ext4_fill_super:4903: inode #2: comm syz-executor.4: iget: root inode unallocated [ 844.540607][ T1395] EXT4-fs (loop1): get root inode failed [ 844.546642][ T1398] EXT4-fs (loop4): get root inode failed [ 844.552491][ T1395] EXT4-fs (loop1): mount failed 07:04:05 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x2], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:04:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) [ 844.564152][ T1398] EXT4-fs (loop4): mount failed 07:04:05 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00), 0x0, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:04:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="0300000004", 0x5, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:04:05 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x8], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 844.645196][ T7] usb 3-1: new high-speed USB device number 49 using dummy_hcd [ 844.698248][ T1443] loop0: detected capacity change from 1024 to 0 [ 844.724684][ T1444] loop1: detected capacity change from 1024 to 0 [ 844.746396][ T1443] EXT4-fs error (device loop0): ext4_fill_super:4903: inode #2: comm syz-executor.0: iget: root inode unallocated [ 844.763186][ T1443] EXT4-fs (loop0): get root inode failed [ 844.768939][ T1448] loop3: detected capacity change from 1024 to 0 [ 844.779514][ T1443] EXT4-fs (loop0): mount failed [ 844.793378][ T1444] EXT4-fs error (device loop1): ext4_fill_super:4903: inode #2: comm syz-executor.1: iget: root inode unallocated [ 844.808418][ T1444] EXT4-fs (loop1): get root inode failed [ 844.813886][ T1448] EXT4-fs error (device loop3): ext4_fill_super:4903: inode #2: comm syz-executor.3: iget: root inode unallocated [ 844.814095][ T1444] EXT4-fs (loop1): mount failed [ 844.839090][ T1448] EXT4-fs (loop3): get root inode failed [ 844.848619][ T1448] EXT4-fs (loop3): mount failed [ 845.015257][ T7] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1983, setting to 64 [ 845.026187][ T7] usb 3-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 845.039186][ T7] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 845.049248][ T7] usb 3-1: config 0 descriptor?? [ 845.135175][ T7] rc_core: IR keymap rc-hauppauge not found [ 845.141103][ T7] Registered IR keymap rc-empty [ 845.159292][ T7] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0 [ 845.175730][ T7] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0/input49 [ 845.289112][ T7] usb 3-1: USB disconnect, device number 49 07:04:06 executing program 2: syz_usb_connect(0x0, 0x2d, &(0x7f0000000380)=ANY=[@ANYBLOB="12010000a504bd40eb030200c0ba0000000109021b0001000000000904000001b504b100090581d8bf17289c1f1bef5a9cf37906f1b221271bab2fef48604868c81bf389aa172b0a470f391f140592bbd4423ab8aec397eda6db964ec02515ba13319eac9f505c263890696f17c995f55ddb964af449c8335e4df2dd049289353a6349e2fcb280f225a0026ab50f", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="c209cc7f01c60a532720661a64ddeb05a97de4ce54f341fd9663cf9b0b9c5170d7ab30f9f99ff1d58d5abf8d02"], 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0xc7c8, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000540)) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000e40)=[0x3fb, 0x3]) 07:04:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="0300000004", 0x5, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:04:06 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0xfc], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:04:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) 07:04:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="0300000004", 0x5, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:04:06 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00), 0x0, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:04:06 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 845.840436][ T1499] loop3: detected capacity change from 1024 to 0 [ 845.850044][ T1497] loop1: detected capacity change from 1024 to 0 [ 845.862835][ T1500] loop4: detected capacity change from 1024 to 0 [ 845.878755][ T1498] loop0: detected capacity change from 1024 to 0 [ 845.944399][ T1499] EXT4-fs error (device loop3): ext4_fill_super:4903: inode #2: comm syz-executor.3: iget: root inode unallocated [ 845.960012][ T1497] EXT4-fs error (device loop1): ext4_fill_super:4903: inode #2: comm syz-executor.1: iget: root inode unallocated [ 845.972883][ T1500] EXT4-fs error (device loop4): ext4_fill_super:4903: inode #2: comm syz-executor.4: iget: root inode unallocated 07:04:06 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x2], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 845.986443][ T1498] EXT4-fs error (device loop0): ext4_fill_super:4903: inode #2: comm syz-executor.0: iget: root inode unallocated [ 846.003038][ T1498] EXT4-fs (loop0): get root inode failed [ 846.011393][ T1497] EXT4-fs (loop1): get root inode failed [ 846.018930][ T1498] EXT4-fs (loop0): mount failed [ 846.024581][ T1497] EXT4-fs (loop1): mount failed [ 846.026128][ T1500] EXT4-fs (loop4): get root inode failed [ 846.029876][ T1499] EXT4-fs (loop3): get root inode failed 07:04:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) [ 846.039556][ T1500] EXT4-fs (loop4): mount failed [ 846.041149][ T1499] EXT4-fs (loop3): mount failed 07:04:06 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x8], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:04:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="0300000004", 0x5, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 846.125180][ T8823] usb 3-1: new high-speed USB device number 50 using dummy_hcd 07:04:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="0300000004", 0x5, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 846.290363][ T1549] loop0: detected capacity change from 1024 to 0 [ 846.299282][ T1554] loop4: detected capacity change from 1024 to 0 [ 846.308672][ T1551] loop1: detected capacity change from 1024 to 0 [ 846.339883][ T1551] EXT4-fs error (device loop1): ext4_fill_super:4903: inode #2: comm syz-executor.1: iget: root inode unallocated [ 846.340070][ T1549] EXT4-fs error (device loop0): ext4_fill_super:4903: inode #2: comm syz-executor.0: iget: root inode unallocated [ 846.352355][ T1551] EXT4-fs (loop1): get root inode failed [ 846.370081][ T1551] EXT4-fs (loop1): mount failed [ 846.370077][ T1554] EXT4-fs error (device loop4): ext4_fill_super:4903: inode #2: comm syz-executor.4: iget: root inode unallocated [ 846.370565][ T1554] EXT4-fs (loop4): get root inode failed [ 846.393335][ T1554] EXT4-fs (loop4): mount failed [ 846.398636][ T1549] EXT4-fs (loop0): get root inode failed [ 846.409263][ T1549] EXT4-fs (loop0): mount failed [ 846.485261][ T8823] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1983, setting to 64 [ 846.509321][ T8823] usb 3-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 846.521884][ T8823] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 846.532177][ T8823] usb 3-1: config 0 descriptor?? [ 846.615182][ T8823] rc_core: IR keymap rc-hauppauge not found [ 846.621249][ T8823] Registered IR keymap rc-empty [ 846.628809][ T8823] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0 [ 846.639578][ T8823] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0/input50 [ 846.785219][T27188] usb 3-1: USB disconnect, device number 50 07:04:08 executing program 2: syz_usb_connect(0x0, 0x2d, &(0x7f0000000380)=ANY=[@ANYBLOB="12010000a504bd40eb030200c0ba0000000109021b0001000000000904000001b504b100090581d8bf17289c1f1bef5a9cf37906f1b221271bab2fef48604868c81bf389aa172b0a470f391f140592bbd4423ab8aec397eda6db964ec02515ba13319eac9f505c263890696f17c995f55ddb964af449c8335e4df2dd049289353a6349e2fcb280f225a0026ab50f", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="c209cc7f01c60a532720661a64ddeb05a97de4ce54f341fd9663cf9b0b9c5170d7ab30f9f99ff1d58d5abf8d02"], 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0xc7c8, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000540)) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000e40)=[0x3fb, 0x3]) 07:04:08 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00), 0x0, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:04:08 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0xfc], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:04:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="03000000040000", 0x7, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:04:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="03000000040000", 0x7, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:04:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x5, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) [ 847.328792][ T1599] loop4: detected capacity change from 1024 to 0 [ 847.349161][ T1604] loop0: detected capacity change from 1024 to 0 07:04:08 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 847.368121][ T1599] EXT4-fs error (device loop4): ext4_fill_super:4903: inode #2: comm syz-executor.4: iget: root inode unallocated [ 847.381863][ T1605] loop1: detected capacity change from 1024 to 0 [ 847.386894][ T1599] EXT4-fs (loop4): get root inode failed [ 847.393819][ T1599] EXT4-fs (loop4): mount failed [ 847.401823][ T1609] loop3: detected capacity change from 1024 to 0 [ 847.434020][ T1605] EXT4-fs error (device loop1): ext4_fill_super:4903: inode #2: comm syz-executor.1: iget: root inode unallocated [ 847.446089][ T1604] EXT4-fs error (device loop0): ext4_fill_super:4903: inode #2: comm syz-executor.0: iget: root inode unallocated 07:04:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="03000000040000", 0x7, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 847.479093][ T1605] EXT4-fs (loop1): get root inode failed [ 847.484787][ T1605] EXT4-fs (loop1): mount failed 07:04:08 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x2], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:04:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="03000000040000", 0x7, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 847.523322][ T1604] EXT4-fs (loop0): get root inode failed [ 847.545709][ T1609] EXT4-fs error (device loop3): ext4_fill_super:4903: inode #2: comm syz-executor.3: iget: root inode unallocated [ 847.552508][ T1604] EXT4-fs (loop0): mount failed 07:04:08 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x8], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 847.576223][ T1609] EXT4-fs (loop3): get root inode failed [ 847.591800][ T1609] EXT4-fs (loop3): mount failed [ 847.665195][ T3674] usb 3-1: new high-speed USB device number 51 using dummy_hcd 07:04:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x5, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) [ 847.724270][ T1640] loop4: detected capacity change from 1024 to 0 [ 847.752870][ T1648] loop1: detected capacity change from 1024 to 0 [ 847.818035][ T1648] EXT4-fs error (device loop1): ext4_fill_super:4903: inode #2: comm syz-executor.1: iget: root inode unallocated [ 847.830157][ T1665] loop0: detected capacity change from 1024 to 0 [ 847.866007][ T1648] EXT4-fs (loop1): get root inode failed [ 847.871835][ T1648] EXT4-fs (loop1): mount failed [ 847.880628][ T1665] EXT4-fs error (device loop0): ext4_fill_super:4903: inode #2: comm syz-executor.0: iget: root inode unallocated [ 847.896921][ T1665] EXT4-fs (loop0): get root inode failed [ 847.903580][ T1665] EXT4-fs (loop0): mount failed [ 848.065252][ T3674] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1983, setting to 64 [ 848.084211][ T3674] usb 3-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 848.099282][ T3674] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 848.110436][ T3674] usb 3-1: config 0 descriptor?? [ 848.215161][ T3674] rc_core: IR keymap rc-hauppauge not found [ 848.228937][ T3674] Registered IR keymap rc-empty [ 848.244581][ T3674] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0 [ 848.274343][ T3674] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0/input51 [ 848.379836][ T8823] usb 3-1: USB disconnect, device number 51 07:04:09 executing program 2: syz_usb_connect(0x0, 0x2d, &(0x7f0000000380)=ANY=[@ANYBLOB="12010000a504bd40eb030200c0ba0000000109021b0001000000000904000001b504b100090581d8bf17289c1f1bef5a9cf37906f1b221271bab2fef48604868c81bf389aa172b0a470f391f140592bbd4423ab8aec397eda6db964ec02515ba13319eac9f505c263890696f17c995f55ddb964af449c8335e4df2dd049289353a6349e2fcb280f225a0026ab50f", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="c209cc7f01c60a532720661a64ddeb05a97de4ce54f341fd9663cf9b0b9c5170d7ab30f9f99ff1d58d5abf8d02"], 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0xc7c8, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000540)) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000e40)=[0x3fb, 0x3]) 07:04:09 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f465", 0xf, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:04:09 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0xfc], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:04:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="03000000040000", 0x7, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:04:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="03000000040000", 0x7, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:04:09 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x5, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) 07:04:09 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 848.939399][ T1717] loop3: detected capacity change from 1024 to 0 [ 848.952924][ T1714] loop4: detected capacity change from 1024 to 0 [ 848.966357][ T1718] loop1: detected capacity change from 1024 to 0 [ 848.978331][ T1719] loop0: detected capacity change from 1024 to 0 [ 849.012998][ T1717] EXT4-fs error (device loop3): ext4_fill_super:4903: inode #2: comm syz-executor.3: iget: root inode unallocated [ 849.022088][ T1718] EXT4-fs error (device loop1): ext4_fill_super:4903: inode #2: comm syz-executor.1: iget: root inode unallocated [ 849.026185][ T1717] EXT4-fs (loop3): get root inode failed [ 849.049713][ T1714] EXT4-fs error (device loop4): ext4_fill_super:4903: inode #2: comm syz-executor.4: iget: root inode unallocated [ 849.064909][ T1717] EXT4-fs (loop3): mount failed [ 849.066302][ T1719] EXT4-fs error (device loop0): ext4_fill_super:4903: inode #2: comm syz-executor.0: iget: root inode unallocated [ 849.082338][ T1718] EXT4-fs (loop1): get root inode failed [ 849.091500][ T1718] EXT4-fs (loop1): mount failed [ 849.098486][ T1714] EXT4-fs (loop4): get root inode failed [ 849.104390][ T1719] EXT4-fs (loop0): get root inode failed 07:04:09 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f465", 0xf, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:04:09 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 849.111660][ T1714] EXT4-fs (loop4): mount failed [ 849.124646][ T1719] EXT4-fs (loop0): mount failed 07:04:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="0300000004000000", 0x8, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:04:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="0300000004000000", 0x8, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:04:10 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) [ 849.215198][ T7] usb 3-1: new high-speed USB device number 52 using dummy_hcd [ 849.262545][ T1754] loop3: detected capacity change from 1024 to 0 [ 849.288359][ T1754] EXT4-fs error (device loop3): ext4_fill_super:4903: inode #2: comm syz-executor.3: iget: root inode unallocated [ 849.315998][ T1766] loop4: detected capacity change from 1024 to 0 [ 849.316096][ T1754] EXT4-fs (loop3): get root inode failed [ 849.334120][ T1765] loop1: detected capacity change from 1024 to 0 [ 849.334239][ T1754] EXT4-fs (loop3): mount failed [ 849.348534][ T1763] loop0: detected capacity change from 1024 to 0 [ 849.367173][ T1766] EXT4-fs error (device loop4): ext4_fill_super:4903: inode #2: comm syz-executor.4: iget: root inode unallocated [ 849.379532][ T1766] EXT4-fs (loop4): get root inode failed [ 849.388789][ T1766] EXT4-fs (loop4): mount failed [ 849.425974][ T1765] EXT4-fs error (device loop1): ext4_fill_super:4903: inode #2: comm syz-executor.1: iget: root inode unallocated [ 849.438487][ T1765] EXT4-fs (loop1): get root inode failed [ 849.439509][ T1763] EXT4-fs error (device loop0): ext4_fill_super:4903: inode #2: comm syz-executor.0: iget: root inode unallocated [ 849.454960][ T1765] EXT4-fs (loop1): mount failed [ 849.459869][ T1763] EXT4-fs (loop0): get root inode failed [ 849.466792][ T1763] EXT4-fs (loop0): mount failed [ 849.586797][ T7] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1983, setting to 64 [ 849.597774][ T7] usb 3-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 849.611329][ T7] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 849.642056][ T7] usb 3-1: config 0 descriptor?? [ 849.725147][ T7] rc_core: IR keymap rc-hauppauge not found [ 849.731057][ T7] Registered IR keymap rc-empty [ 849.739561][ T7] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0 [ 849.759226][ T7] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0/input52 [ 849.888066][ T7] usb 3-1: USB disconnect, device number 52 07:04:11 executing program 2: syz_usb_connect(0x0, 0x2d, &(0x7f0000000380)=ANY=[@ANYBLOB="12010000a504bd40eb030200c0ba0000000109021b0001000000000904000001b504b100090581d8bf17289c1f1bef5a9cf37906f1b221271bab2fef48604868c81bf389aa172b0a470f391f140592bbd4423ab8aec397eda6db964ec02515ba13319eac9f505c263890696f17c995f55ddb964af449c8335e4df2dd049289353a6349e2fcb280f225a0026ab50f", @ANYRES32=0x0, @ANYBLOB="c209cc7f01c60a532720661a64ddeb05a97de4ce54f341fd9663cf9b0b9c5170d7ab30f9f99ff1d58d5abf8d02c1"], 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0xc7c8, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000540)) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000e40)=[0x3fb, 0x3]) 07:04:11 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:04:11 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f465", 0xf, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:04:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="0300000004000000", 0x8, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:04:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="0300000004000000", 0x8, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:04:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) 07:04:11 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0xfc], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 850.437961][ T1820] loop1: detected capacity change from 1024 to 0 [ 850.451409][ T1821] loop4: detected capacity change from 1024 to 0 [ 850.464651][ T1823] loop0: detected capacity change from 1024 to 0 [ 850.479604][ T1828] loop3: detected capacity change from 1024 to 0 [ 850.526493][ T1821] EXT4-fs error (device loop4): ext4_fill_super:4903: inode #2: comm syz-executor.4: iget: root inode unallocated [ 850.533894][ T1820] EXT4-fs error (device loop1): ext4_fill_super:4903: inode #2: comm syz-executor.1: iget: root inode unallocated [ 850.552612][ T1823] EXT4-fs error (device loop0): ext4_fill_super:4903: inode #2: comm syz-executor.0: iget: root inode unallocated [ 850.553791][ T1821] EXT4-fs (loop4): get root inode failed [ 850.570924][ T1821] EXT4-fs (loop4): mount failed 07:04:11 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 850.577817][ T1820] EXT4-fs (loop1): get root inode failed [ 850.580231][ T1828] EXT4-fs error (device loop3): ext4_fill_super:4903: inode #2: comm syz-executor.3: iget: root inode unallocated [ 850.583490][ T1820] EXT4-fs (loop1): mount failed [ 850.601745][ T1823] EXT4-fs (loop0): get root inode failed [ 850.607620][ T1823] EXT4-fs (loop0): mount failed [ 850.621918][ T1828] EXT4-fs (loop3): get root inode failed [ 850.630865][ T1828] EXT4-fs (loop3): mount failed [ 850.715208][ T7] usb 3-1: new high-speed USB device number 53 using dummy_hcd 07:04:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="0300000004000000", 0x8, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:04:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {0x0, 0x0, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) 07:04:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="0300000004000000", 0x8, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:04:11 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 850.893070][ T1872] loop1: detected capacity change from 1024 to 0 [ 850.908527][ T1874] loop4: detected capacity change from 1024 to 0 [ 850.918223][ T1876] loop0: detected capacity change from 1024 to 0 [ 850.938423][ T1874] EXT4-fs error (device loop4): ext4_fill_super:4903: inode #2: comm syz-executor.4: iget: root inode unallocated [ 850.950537][ T1872] EXT4-fs error (device loop1): ext4_fill_super:4903: inode #2: comm syz-executor.1: iget: root inode unallocated [ 850.963017][ T1876] EXT4-fs error (device loop0): ext4_fill_super:4903: inode #2: comm syz-executor.0: iget: root inode unallocated [ 850.963072][ T1874] EXT4-fs (loop4): get root inode failed [ 850.988119][ T1872] EXT4-fs (loop1): get root inode failed [ 850.988056][ T1874] EXT4-fs (loop4): mount failed [ 850.998787][ T1876] EXT4-fs (loop0): get root inode failed [ 851.004549][ T1876] EXT4-fs (loop0): mount failed [ 851.011897][ T1872] EXT4-fs (loop1): mount failed [ 851.105178][ T7] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1983, setting to 64 [ 851.133363][ T7] usb 3-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 851.145891][ T7] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 851.154772][ T7] usb 3-1: config 0 descriptor?? [ 851.245192][ T7] rc_core: IR keymap rc-hauppauge not found [ 851.251864][ T7] Registered IR keymap rc-empty [ 851.259656][ T7] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0 [ 851.272024][ T7] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0/input53 [ 851.409818][T27347] usb 3-1: USB disconnect, device number 53 07:04:12 executing program 2: syz_usb_connect(0x0, 0x2d, &(0x7f0000000380)=ANY=[@ANYBLOB="12010000a504bd40eb030200c0ba0000000109021b0001000000000904000001b504b100090581d8bf17289c1f1bef5a9cf37906f1b221271bab2fef48604868c81bf389aa172b0a470f391f140592bbd4423ab8aec397eda6db964ec02515ba13319eac9f505c263890696f17c995f55ddb964af449c8335e4df2dd049289353a6349e2fcb280f225a0026ab50f", @ANYRES32=0x0, @ANYBLOB="c209cc7f01c60a532720661a64ddeb05a97de4ce54f341fd9663cf9b0b9c5170d7ab30f9f99ff1d58d5abf8d02c1"], 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0xc7c8, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000540)) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000e40)=[0x3fb, 0x3]) 07:04:12 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f0000", 0x16, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:04:12 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:04:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:04:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:04:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240), 0x0, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) 07:04:12 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 851.962952][ T1929] loop1: detected capacity change from 1024 to 0 [ 851.974344][ T1930] loop4: detected capacity change from 1024 to 0 [ 851.990897][ T1931] loop3: detected capacity change from 1024 to 0 [ 852.002498][ T1927] loop0: detected capacity change from 1024 to 0 [ 852.084519][ T1931] EXT4-fs error (device loop3): ext4_fill_super:4903: inode #2: comm syz-executor.3: iget: root inode unallocated [ 852.099257][ T1929] EXT4-fs error (device loop1): ext4_fill_super:4903: inode #2: comm syz-executor.1: iget: root inode unallocated [ 852.111347][ T1930] EXT4-fs error (device loop4): ext4_fill_super:4903: inode #2: comm syz-executor.4: iget: root inode unallocated [ 852.111947][ T1931] EXT4-fs (loop3): get root inode failed 07:04:12 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 852.123393][ T1927] EXT4-fs error (device loop0): ext4_fill_super:4903: inode #2: comm syz-executor.0: iget: root inode unallocated [ 852.129601][ T1931] EXT4-fs (loop3): mount failed [ 852.159283][ T1929] EXT4-fs (loop1): get root inode failed [ 852.165350][ T1929] EXT4-fs (loop1): mount failed [ 852.170685][ T1930] EXT4-fs (loop4): get root inode failed [ 852.176467][ T1930] EXT4-fs (loop4): mount failed 07:04:12 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:04:12 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f0000", 0x16, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 852.178126][ T1927] EXT4-fs (loop0): get root inode failed [ 852.186971][ T1927] EXT4-fs (loop0): mount failed [ 852.295166][T27347] usb 3-1: new high-speed USB device number 54 using dummy_hcd 07:04:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:04:13 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240), 0x0, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) [ 852.429758][ T1978] loop1: detected capacity change from 1024 to 0 [ 852.455384][ T1984] loop0: detected capacity change from 1024 to 0 [ 852.464718][ T1980] loop3: detected capacity change from 1024 to 0 [ 852.474567][ T1978] EXT4-fs error (device loop1): ext4_fill_super:4903: inode #2: comm syz-executor.1: iget: root inode unallocated [ 852.487142][ T1978] EXT4-fs (loop1): get root inode failed [ 852.492909][ T1978] EXT4-fs (loop1): mount failed [ 852.504952][ T1984] EXT4-fs error (device loop0): ext4_fill_super:4903: inode #2: comm syz-executor.0: iget: root inode unallocated [ 852.520119][ T1984] EXT4-fs (loop0): get root inode failed [ 852.526436][ T1984] EXT4-fs (loop0): mount failed [ 852.533418][ T1980] EXT4-fs error (device loop3): ext4_fill_super:4903: inode #2: comm syz-executor.3: iget: root inode unallocated [ 852.547312][ T1980] EXT4-fs (loop3): get root inode failed [ 852.553008][ T1980] EXT4-fs (loop3): mount failed [ 852.665464][T27347] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1983, setting to 64 [ 852.678121][T27347] usb 3-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 852.690799][T27347] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 852.703002][T27347] usb 3-1: config 0 descriptor?? [ 852.816525][T27347] rc_core: IR keymap rc-hauppauge not found [ 852.822437][T27347] Registered IR keymap rc-empty [ 852.836708][T27347] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0 [ 852.854102][T27347] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/rc/rc0/input54 [ 852.947854][T27188] usb 3-1: USB disconnect, device number 54 07:04:14 executing program 2: syz_usb_connect(0x0, 0x2d, &(0x7f0000000380)=ANY=[@ANYBLOB="12010000a504bd40eb030200c0ba0000000109021b0001000000000904000001b504b100090581d8bf17289c1f1bef5a9cf37906f1b221271bab2fef48604868c81bf389aa172b0a470f391f140592bbd4423ab8aec397eda6db964ec02515ba13319eac9f505c263890696f17c995f55ddb964af449c8335e4df2dd049289353a6349e2fcb280f225a0026ab50f", @ANYRES32=0x0, @ANYBLOB="c209cc7f01c60a532720661a64ddeb05a97de4ce54f341fd9663cf9b0b9c5170d7ab30f9f99ff1d58d5abf8d02c1"], 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0xc7c8, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000540)) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000e40)=[0x3fb, 0x3]) 07:04:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:04:14 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) 07:04:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x201}, 0x14}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:04:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240), 0x0, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) 07:04:14 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f0000", 0x16, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 853.488516][ T2029] loop0: detected capacity change from 1024 to 0 [ 853.507480][ T2037] loop4: detected capacity change from 1024 to 0 [ 853.519139][ T2030] loop1: detected capacity change from 1024 to 0 07:04:14 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc], [], @broadcast}}, @in6={0xa, 0x0, 0x0, @empty}], 0x54) [ 853.530124][ T2029] EXT4-fs error (device loop0): ext4_fill_super:4903: inode #2: comm syz-executor.0: iget: root inode unallocated [ 853.542993][ T2035] loop3: detected capacity change from 1024 to 0 [ 853.553701][ T2029] EXT4-fs (loop0): get root inode failed [ 853.563076][ T2029] EXT4-fs (loop0): mount failed 07:04:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000c, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000040)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="0000e3310000000011000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000240)="0300000004", 0x5, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000200)={[{@dioread_lock='dioread_lock'}]}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20}, 0x14}, 0x1, 0x0, 0x0, 0xc0}, 0x20004000) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000540)=""/92, 0x5c, 0x10002, &(0x7f0000000980)={0x11, 0xf8, 0x0, 0x1, 0xee, 0x6, @random="c87efd40e095"}, 0x14) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x2, 0x304, 0x0, 0x0, {0x4, 0x0, 0x8}, [@CTA_EXPECT_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004840}, 0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x5) [ 853.596409][ T2037] EXT4-fs error (device loop4): ext4_fill_super:4903: inode #2: comm syz-executor.4: iget: root inode unallocated [ 853.609204][ T2035] EXT4-fs error (device loop3): ext4_fill_super:4903: inode #2: comm syz-executor.3: iget: root inode unallocated [ 853.623237][ T2037] EXT4-fs (loop4): get root inode failed [ 853.630603][ T2030] EXT4-fs error (device loop1): ext4_fill_super:4903: inode #2: comm syz-executor.1: iget: root inode unallocated [ 853.649923][ T2035] EXT4-fs (loop3): get root inode failed [ 853.655664][ T2035] EXT4-fs (loop3): mount failed [ 853.660603][ T2030] EXT4-fs (loop1): get root inode failed [ 853.660804][ T2037] EXT4-fs (loop4): mount failed [ 853.666440][ T2030] EXT4-fs (loop1): mount failed [ 853.689927][ T2069] ================================================================== [ 853.698009][ T2069] BUG: KCSAN: data-race in mm_update_next_owner / rescuer_thread [ 853.705721][ T2069] [ 853.708026][ T2069] read-write to 0xffff88803728702c of 4 bytes by task 2063 on cpu 1: [ 853.716074][ T2069] rescuer_thread+0xb97/0xbe0 [ 853.720741][ T2069] kthread+0x1fd/0x220 [ 853.724806][ T2069] ret_from_fork+0x1f/0x30 [ 853.729225][ T2069] [ 853.731536][ T2069] read to 0xffff88803728702c of 4 bytes by task 2069 on cpu 0: [ 853.739063][ T2069] mm_update_next_owner+0x1d9/0x4e0 [ 853.744256][ T2069] exit_mm+0x327/0x420 [ 853.748329][ T2069] do_exit+0x41f/0x1690 [ 853.752474][ T2069] do_group_exit+0x16f/0x170 [ 853.757053][ T2069] __do_sys_exit_group+0xb/0x10 [ 853.761911][ T2069] __se_sys_exit_group+0x5/0x10 [ 853.766751][ T2069] __x64_sys_exit_group+0x16/0x20 [ 853.771766][ T2069] do_syscall_64+0x39/0x80 [ 853.776173][ T2069] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 853.782068][ T2069] [ 853.784396][ T2069] Reported by Kernel Concurrency Sanitizer on: [ 853.790523][ T2069] CPU: 0 PID: 2069 Comm: syz-executor.5 Not tainted 5.11.0-rc1-syzkaller #0 [ 853.799195][ T2069] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 853.809235][ T2069] ================================================================== [ 853.817277][ T2069] Kernel panic - not syncing: panic_on_warn set ... [ 853.823861][ T2069] CPU: 0 PID: 2069 Comm: syz-executor.5 Not tainted 5.11.0-rc1-syzkaller #0 [ 853.832532][ T2069] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 853.842593][ T2069] Call Trace: [ 853.845869][ T2069] dump_stack+0x116/0x15d [ 853.850200][ T2069] panic+0x1e7/0x5fa [ 853.854087][ T2069] ? vprintk_emit+0x2e2/0x360 [ 853.858760][ T2069] kcsan_report+0x67b/0x680 [ 853.863256][ T2069] ? kcsan_setup_watchpoint+0x47b/0x4e0 [ 853.868798][ T2069] ? mm_update_next_owner+0x1d9/0x4e0 [ 853.874166][ T2069] ? exit_mm+0x327/0x420 [ 853.878402][ T2069] ? do_exit+0x41f/0x1690 [ 853.882721][ T2069] ? do_group_exit+0x16f/0x170 [ 853.887479][ T2069] ? __do_sys_exit_group+0xb/0x10 [ 853.892526][ T2069] ? __se_sys_exit_group+0x5/0x10 [ 853.897544][ T2069] ? __x64_sys_exit_group+0x16/0x20 [ 853.902737][ T2069] ? do_syscall_64+0x39/0x80 [ 853.907322][ T2069] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 853.913390][ T2069] ? fsnotify_destroy_marks+0x150/0x330 [ 853.918928][ T2069] kcsan_setup_watchpoint+0x47b/0x4e0 [ 853.924296][ T2069] mm_update_next_owner+0x1d9/0x4e0 [ 853.929488][ T2069] exit_mm+0x327/0x420 [ 853.933549][ T2069] ? taskstats_exit+0x334/0x730 [ 853.938392][ T2069] ? acct_collect+0x367/0x3c0 [ 853.943065][ T2069] do_exit+0x41f/0x1690 [ 853.947227][ T2069] ? zap_other_threads+0x1b2/0x1d0 [ 853.952343][ T2069] do_group_exit+0x16f/0x170 [ 853.956928][ T2069] __do_sys_exit_group+0xb/0x10 [ 853.961789][ T2069] __se_sys_exit_group+0x5/0x10 [ 853.966655][ T2069] __x64_sys_exit_group+0x16/0x20 [ 853.971676][ T2069] do_syscall_64+0x39/0x80 [ 853.976095][ T2069] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 853.981983][ T2069] RIP: 0033:0x45e219 [ 853.985882][ T2069] Code: Unable to access opcode bytes at RIP 0x45e1ef. [ 853.992712][ T2069] RSP: 002b:00007fff307fe378 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 854.001121][ T2069] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 000000000045e219 [ 854.009094][ T2069] RDX: 0000000000417b71 RSI: fffffffffffffff7 RDI: 0000000000000000 [ 854.017057][ T2069] RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000001 [ 854.025034][ T2069] R10: 00000000011a0c18 R11: 0000000000000246 R12: 0000000000000000 [ 854.033013][ T2069] R13: 0000000000000001 R14: 0000000000000005 R15: 0000000000000000 [ 855.084718][ T2069] Shutting down cpus with NMI [ 855.089848][ T2069] Kernel Offset: disabled [ 855.094172][ T2069] Rebooting in 86400 seconds..