000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000004060000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:23 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x2f, 0x27, 0x3, 0x7, 0x8, @local, @mcast1, 0x40, 0x8, 0x8, 0xc8}}) sendmmsg(r0, &(0x7f0000001ac0)=[{{&(0x7f0000000100)=@ll={0x11, 0x2, r1, 0x1, 0x3, 0x6, @random="6d06bc73b266"}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000180)="4c273d40a086f7b1", 0x8}, {&(0x7f00000001c0)="2e6d056d4c36a06c45b561c4489d5b9298bc09cc76295be2e081048d", 0x1c}, {&(0x7f0000000200)="b17b9536ffd4c1405613e09717e5463c21087ed2b7fd21c59a9d620d5e54d58c6e8357663c7b8b68f9148ce70a2fe7ebff5e146469f7d8963a0c207240c0893be2154c8c6e202046599631a8f90fcbf17f8de925bc3fa111261dd79a4bbeaba0acb3acaf529426b3b0301541209153efdee961cdebc6cbedd87909343164336ae0b056e172efdd31d18bd3a5ef25d4697c0a66e908ca69e0a77ff1eae769a82f174e51d7756b6b33d596d0e4c214232b73a1ec", 0xb3}, {&(0x7f00000002c0)="6b33fb3fbdea666bb5d71b7a0d145488e56992688e2e794468cacde6d81bc5cd76ac50540752d018891dae5752fac976ccdd0f1cc8842ed2023194440ace1579261edf18d1c4ebdfff7070c542cff85c7788b9d44646d9e8a002e799b7c12a841f077be85206bd0695d437805fa1c0a54aedff963b89856b897d5f2ebf4124572a4cf87061262836929768d0f3838f2e0c4f03c569658a79ecece1a73c1f94fbb10c169af3a892585198541159144f0442b15bbbca8929de8d1eae19b9", 0xbd}, {&(0x7f0000000380)="358a58a989a2d653cf3e43d901a7bb55c8a0427b26e6f72d528348c415663bae8cf20fa3ca1dc8e4c737d342363108", 0x2f}, {&(0x7f00000003c0)="1b22fe4714e13058fe3359bf917726fa9eda0676fa3711f6bced36a5adba", 0x1e}, {&(0x7f0000000400)="2ec5c174310b86efc60befa29355773188a16ad8759d78599e43651a7fec89f42f38a3956637739306bedf8901c69fd052f9f2a1676fdd60e9f4d0b5468f0c90949db9fc7c65e8b79cb40601be2e4fedc6edf05a3f6d90f6978e65769aa4038be8ef0e79706dbf2489da5aa90dcc882d9f1c323bb7bda6accd342c8d5af79792add2266fc591252f25d9bffab889ee3084c9f7b3542c9e6777de3bf3553c07", 0x9f}, {&(0x7f00000004c0)="0a8dd99472a1d3e4101170cadc4fbdc829ddfe6afca20580f6d8fd972f9ee49094d1bd3ecf9c573e6a9f94eb03ad63ee67a6", 0x32}, {&(0x7f0000000500)="98945184865bf4e689404cc42c94d547c5bc67f271aaf40d3cf2bd4905bf81dd0baae3ac54b82ad62bb31c26074e27f0e01ebb226c", 0x35}, {&(0x7f0000000540)="ada863f626a79cec3746a77ede7fc52702042d9090acde1a82bf874c2f83609309e519200d3e964fc1e4de344bf4349b36a136bc06c492e27e4cbd9c8e21798a4c4d7f0324b2548162c4b1098ee728c0b87b", 0x52}], 0xa}}, {{&(0x7f0000000680)=@can, 0x80, &(0x7f0000001840)=[{&(0x7f0000000700)="ec46f558923abf26038d1b167784a3d076eadca4f6244b053de851eab69b4aa6b479d7af6372bd056e3502ea72f5d21c7241", 0x32}, {&(0x7f0000000740)="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", 0x1000}, {&(0x7f0000001740)="a74a9bb05f45a46ebfb4c702f0dcce3210cea26921ae20d79d2bd9963a3d4e3fa77d46d381133b239b629a7e07c13e76c0b3be3de0dc3399cfe984fa721d5927942f3017ecba3d20aaf7c1d3e937b3f4d3140034d4f0df8a4fb960a486c03c510ea72409223efca274e40f682f5e0fad31d0ce3d5903dbf470c0252abe6b7cc64708c74ce651e28b22126362321d742c4108a73643a49328a4d12d30630cf45dd604e863ada4037923561d0ba06cbd304d037e8907f324aa783a86692edb503d7d8f8da74f2fb8576a6bdbad18b8bd9803fb5982fe1be383e8e7f5ee28c16fef3a052f6673a4d2a842", 0xe9}], 0x3}}, {{&(0x7f0000001880)=@pppoe={0x18, 0x0, {0x1, @random="af752e008c6e", 'rose0\x00'}}, 0x80, &(0x7f0000001a80)=[{&(0x7f0000001900)="e58739457e7b82282463a087f2ba5526b3a750d8168a321124c8a6bf093f4e56a7423497d1e733cecc0ad97312e61359f21773aaa2b8c0dbedb543e7564fb97b8c207a7241b9e48d4f2aa616138b861d212922cacad04eddf9f28f0a2627dfa7298b4826a3320a8b32f32ac77ea06279840a6fad55054411f6b32b927de28fa05385704b55b33eb1551b2aa15a4ba0ff6ced367e4e60a0500d2bdda045a7f095594f", 0xa2}, {&(0x7f00000019c0)="d099ec99c5094bcaf799a4f89fbc7d51a67e65d391fc340547ff7a2bdd40ddc7d32c1d5c90562a3a19ab3734f3f2edf3688b154d6aef9a4c707118827fefbe18ef735491c72f7017ef5b55029844ca036db4115c19", 0x55}, {&(0x7f0000001a40)="b72dac5a1efd901ad49974a8e928566d4c42cdc7ead2b38dd6d770bc19fdae1405617fc361412ff391c82ecc", 0x2c}], 0x3}}], 0x3, 0x8000) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) [ 565.988811][T15576] EXT4-fs error (device loop3): __ext4_fill_super:5226: inode #2: comm syz-executor.3: iget: root inode unallocated [ 566.003459][T15576] EXT4-fs (loop3): get root inode failed 11:00:23 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) [ 566.003476][T15576] EXT4-fs (loop3): mount failed [ 566.028383][T15595] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 566.043797][T15626] loop1: detected capacity change from 0 to 264192 [ 566.104034][T15633] loop3: detected capacity change from 0 to 264192 11:00:23 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000080)=0x1, 0x4) getpeername$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @private2}, &(0x7f0000000140)=0x1c) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000180)={0x80000000}) r1 = openat2(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x80001, 0x48, 0x18}, 0x18) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@private2={0xfc, 0x2, '\x00', 0x1}, 0x8cfb, 0x2, 0x0, 0x9, 0x7, 0x6}, 0x20) 11:00:23 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:23 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x2f, 0x27, 0x3, 0x7, 0x8, @local, @mcast1, 0x40, 0x8, 0x8, 0xc8}}) sendmmsg(r0, &(0x7f0000001ac0)=[{{&(0x7f0000000100)=@ll={0x11, 0x2, r1, 0x1, 0x3, 0x6, @random="6d06bc73b266"}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000180)="4c273d40a086f7b1", 0x8}, {&(0x7f00000001c0)="2e6d056d4c36a06c45b561c4489d5b9298bc09cc76295be2e081048d", 0x1c}, {&(0x7f0000000200)="b17b9536ffd4c1405613e09717e5463c21087ed2b7fd21c59a9d620d5e54d58c6e8357663c7b8b68f9148ce70a2fe7ebff5e146469f7d8963a0c207240c0893be2154c8c6e202046599631a8f90fcbf17f8de925bc3fa111261dd79a4bbeaba0acb3acaf529426b3b0301541209153efdee961cdebc6cbedd87909343164336ae0b056e172efdd31d18bd3a5ef25d4697c0a66e908ca69e0a77ff1eae769a82f174e51d7756b6b33d596d0e4c214232b73a1ec", 0xb3}, {&(0x7f00000002c0)="6b33fb3fbdea666bb5d71b7a0d145488e56992688e2e794468cacde6d81bc5cd76ac50540752d018891dae5752fac976ccdd0f1cc8842ed2023194440ace1579261edf18d1c4ebdfff7070c542cff85c7788b9d44646d9e8a002e799b7c12a841f077be85206bd0695d437805fa1c0a54aedff963b89856b897d5f2ebf4124572a4cf87061262836929768d0f3838f2e0c4f03c569658a79ecece1a73c1f94fbb10c169af3a892585198541159144f0442b15bbbca8929de8d1eae19b9", 0xbd}, {&(0x7f0000000380)="358a58a989a2d653cf3e43d901a7bb55c8a0427b26e6f72d528348c415663bae8cf20fa3ca1dc8e4c737d342363108", 0x2f}, {&(0x7f00000003c0)="1b22fe4714e13058fe3359bf917726fa9eda0676fa3711f6bced36a5adba", 0x1e}, {&(0x7f0000000400)="2ec5c174310b86efc60befa29355773188a16ad8759d78599e43651a7fec89f42f38a3956637739306bedf8901c69fd052f9f2a1676fdd60e9f4d0b5468f0c90949db9fc7c65e8b79cb40601be2e4fedc6edf05a3f6d90f6978e65769aa4038be8ef0e79706dbf2489da5aa90dcc882d9f1c323bb7bda6accd342c8d5af79792add2266fc591252f25d9bffab889ee3084c9f7b3542c9e6777de3bf3553c07", 0x9f}, {&(0x7f00000004c0)="0a8dd99472a1d3e4101170cadc4fbdc829ddfe6afca20580f6d8fd972f9ee49094d1bd3ecf9c573e6a9f94eb03ad63ee67a6", 0x32}, {&(0x7f0000000500)="98945184865bf4e689404cc42c94d547c5bc67f271aaf40d3cf2bd4905bf81dd0baae3ac54b82ad62bb31c26074e27f0e01ebb226c", 0x35}, {&(0x7f0000000540)="ada863f626a79cec3746a77ede7fc52702042d9090acde1a82bf874c2f83609309e519200d3e964fc1e4de344bf4349b36a136bc06c492e27e4cbd9c8e21798a4c4d7f0324b2548162c4b1098ee728c0b87b", 0x52}], 0xa}}, {{&(0x7f0000000680)=@can, 0x80, &(0x7f0000001840)=[{&(0x7f0000000700)="ec46f558923abf26038d1b167784a3d076eadca4f6244b053de851eab69b4aa6b479d7af6372bd056e3502ea72f5d21c7241", 0x32}, {&(0x7f0000000740)="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", 0x1000}, {&(0x7f0000001740)="a74a9bb05f45a46ebfb4c702f0dcce3210cea26921ae20d79d2bd9963a3d4e3fa77d46d381133b239b629a7e07c13e76c0b3be3de0dc3399cfe984fa721d5927942f3017ecba3d20aaf7c1d3e937b3f4d3140034d4f0df8a4fb960a486c03c510ea72409223efca274e40f682f5e0fad31d0ce3d5903dbf470c0252abe6b7cc64708c74ce651e28b22126362321d742c4108a73643a49328a4d12d30630cf45dd604e863ada4037923561d0ba06cbd304d037e8907f324aa783a86692edb503d7d8f8da74f2fb8576a6bdbad18b8bd9803fb5982fe1be383e8e7f5ee28c16fef3a052f6673a4d2a842", 0xe9}], 0x3}}, {{&(0x7f0000001880)=@pppoe={0x18, 0x0, {0x1, @random="af752e008c6e", 'rose0\x00'}}, 0x80, &(0x7f0000001a80)=[{&(0x7f0000001900)="e58739457e7b82282463a087f2ba5526b3a750d8168a321124c8a6bf093f4e56a7423497d1e733cecc0ad97312e61359f21773aaa2b8c0dbedb543e7564fb97b8c207a7241b9e48d4f2aa616138b861d212922cacad04eddf9f28f0a2627dfa7298b4826a3320a8b32f32ac77ea06279840a6fad55054411f6b32b927de28fa05385704b55b33eb1551b2aa15a4ba0ff6ced367e4e60a0500d2bdda045a7f095594f", 0xa2}, {&(0x7f00000019c0)="d099ec99c5094bcaf799a4f89fbc7d51a67e65d391fc340547ff7a2bdd40ddc7d32c1d5c90562a3a19ab3734f3f2edf3688b154d6aef9a4c707118827fefbe18ef735491c72f7017ef5b55029844ca036db4115c19", 0x55}, {&(0x7f0000001a40)="b72dac5a1efd901ad49974a8e928566d4c42cdc7ead2b38dd6d770bc19fdae1405617fc361412ff391c82ecc", 0x2c}], 0x3}}], 0x3, 0x8000) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) socket$inet6_mptcp(0xa, 0x1, 0x106) (async) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) (async) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x2f, 0x27, 0x3, 0x7, 0x8, @local, @mcast1, 0x40, 0x8, 0x8, 0xc8}}) (async) sendmmsg(r0, &(0x7f0000001ac0)=[{{&(0x7f0000000100)=@ll={0x11, 0x2, r1, 0x1, 0x3, 0x6, @random="6d06bc73b266"}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000180)="4c273d40a086f7b1", 0x8}, {&(0x7f00000001c0)="2e6d056d4c36a06c45b561c4489d5b9298bc09cc76295be2e081048d", 0x1c}, {&(0x7f0000000200)="b17b9536ffd4c1405613e09717e5463c21087ed2b7fd21c59a9d620d5e54d58c6e8357663c7b8b68f9148ce70a2fe7ebff5e146469f7d8963a0c207240c0893be2154c8c6e202046599631a8f90fcbf17f8de925bc3fa111261dd79a4bbeaba0acb3acaf529426b3b0301541209153efdee961cdebc6cbedd87909343164336ae0b056e172efdd31d18bd3a5ef25d4697c0a66e908ca69e0a77ff1eae769a82f174e51d7756b6b33d596d0e4c214232b73a1ec", 0xb3}, {&(0x7f00000002c0)="6b33fb3fbdea666bb5d71b7a0d145488e56992688e2e794468cacde6d81bc5cd76ac50540752d018891dae5752fac976ccdd0f1cc8842ed2023194440ace1579261edf18d1c4ebdfff7070c542cff85c7788b9d44646d9e8a002e799b7c12a841f077be85206bd0695d437805fa1c0a54aedff963b89856b897d5f2ebf4124572a4cf87061262836929768d0f3838f2e0c4f03c569658a79ecece1a73c1f94fbb10c169af3a892585198541159144f0442b15bbbca8929de8d1eae19b9", 0xbd}, {&(0x7f0000000380)="358a58a989a2d653cf3e43d901a7bb55c8a0427b26e6f72d528348c415663bae8cf20fa3ca1dc8e4c737d342363108", 0x2f}, {&(0x7f00000003c0)="1b22fe4714e13058fe3359bf917726fa9eda0676fa3711f6bced36a5adba", 0x1e}, {&(0x7f0000000400)="2ec5c174310b86efc60befa29355773188a16ad8759d78599e43651a7fec89f42f38a3956637739306bedf8901c69fd052f9f2a1676fdd60e9f4d0b5468f0c90949db9fc7c65e8b79cb40601be2e4fedc6edf05a3f6d90f6978e65769aa4038be8ef0e79706dbf2489da5aa90dcc882d9f1c323bb7bda6accd342c8d5af79792add2266fc591252f25d9bffab889ee3084c9f7b3542c9e6777de3bf3553c07", 0x9f}, {&(0x7f00000004c0)="0a8dd99472a1d3e4101170cadc4fbdc829ddfe6afca20580f6d8fd972f9ee49094d1bd3ecf9c573e6a9f94eb03ad63ee67a6", 0x32}, {&(0x7f0000000500)="98945184865bf4e689404cc42c94d547c5bc67f271aaf40d3cf2bd4905bf81dd0baae3ac54b82ad62bb31c26074e27f0e01ebb226c", 0x35}, {&(0x7f0000000540)="ada863f626a79cec3746a77ede7fc52702042d9090acde1a82bf874c2f83609309e519200d3e964fc1e4de344bf4349b36a136bc06c492e27e4cbd9c8e21798a4c4d7f0324b2548162c4b1098ee728c0b87b", 0x52}], 0xa}}, {{&(0x7f0000000680)=@can, 0x80, &(0x7f0000001840)=[{&(0x7f0000000700)="ec46f558923abf26038d1b167784a3d076eadca4f6244b053de851eab69b4aa6b479d7af6372bd056e3502ea72f5d21c7241", 0x32}, {&(0x7f0000000740)="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", 0x1000}, {&(0x7f0000001740)="a74a9bb05f45a46ebfb4c702f0dcce3210cea26921ae20d79d2bd9963a3d4e3fa77d46d381133b239b629a7e07c13e76c0b3be3de0dc3399cfe984fa721d5927942f3017ecba3d20aaf7c1d3e937b3f4d3140034d4f0df8a4fb960a486c03c510ea72409223efca274e40f682f5e0fad31d0ce3d5903dbf470c0252abe6b7cc64708c74ce651e28b22126362321d742c4108a73643a49328a4d12d30630cf45dd604e863ada4037923561d0ba06cbd304d037e8907f324aa783a86692edb503d7d8f8da74f2fb8576a6bdbad18b8bd9803fb5982fe1be383e8e7f5ee28c16fef3a052f6673a4d2a842", 0xe9}], 0x3}}, {{&(0x7f0000001880)=@pppoe={0x18, 0x0, {0x1, @random="af752e008c6e", 'rose0\x00'}}, 0x80, &(0x7f0000001a80)=[{&(0x7f0000001900)="e58739457e7b82282463a087f2ba5526b3a750d8168a321124c8a6bf093f4e56a7423497d1e733cecc0ad97312e61359f21773aaa2b8c0dbedb543e7564fb97b8c207a7241b9e48d4f2aa616138b861d212922cacad04eddf9f28f0a2627dfa7298b4826a3320a8b32f32ac77ea06279840a6fad55054411f6b32b927de28fa05385704b55b33eb1551b2aa15a4ba0ff6ced367e4e60a0500d2bdda045a7f095594f", 0xa2}, {&(0x7f00000019c0)="d099ec99c5094bcaf799a4f89fbc7d51a67e65d391fc340547ff7a2bdd40ddc7d32c1d5c90562a3a19ab3734f3f2edf3688b154d6aef9a4c707118827fefbe18ef735491c72f7017ef5b55029844ca036db4115c19", 0x55}, {&(0x7f0000001a40)="b72dac5a1efd901ad49974a8e928566d4c42cdc7ead2b38dd6d770bc19fdae1405617fc361412ff391c82ecc", 0x2c}], 0x3}}], 0x3, 0x8000) (async) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) (async) 11:00:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a09", 0xb, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000080000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) [ 566.149649][T15639] loop1: detected capacity change from 0 to 264192 11:00:23 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000080)=0x1, 0x4) getpeername$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @private2}, &(0x7f0000000140)=0x1c) (async) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000180)={0x80000000}) (async) r1 = openat2(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x80001, 0x48, 0x18}, 0x18) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@private2={0xfc, 0x2, '\x00', 0x1}, 0x8cfb, 0x2, 0x0, 0x9, 0x7, 0x6}, 0x20) 11:00:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:23 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x2f, 0x27, 0x3, 0x7, 0x8, @local, @mcast1, 0x40, 0x8, 0x8, 0xc8}}) sendmmsg(r0, &(0x7f0000001ac0)=[{{&(0x7f0000000100)=@ll={0x11, 0x2, r1, 0x1, 0x3, 0x6, @random="6d06bc73b266"}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000180)="4c273d40a086f7b1", 0x8}, {&(0x7f00000001c0)="2e6d056d4c36a06c45b561c4489d5b9298bc09cc76295be2e081048d", 0x1c}, {&(0x7f0000000200)="b17b9536ffd4c1405613e09717e5463c21087ed2b7fd21c59a9d620d5e54d58c6e8357663c7b8b68f9148ce70a2fe7ebff5e146469f7d8963a0c207240c0893be2154c8c6e202046599631a8f90fcbf17f8de925bc3fa111261dd79a4bbeaba0acb3acaf529426b3b0301541209153efdee961cdebc6cbedd87909343164336ae0b056e172efdd31d18bd3a5ef25d4697c0a66e908ca69e0a77ff1eae769a82f174e51d7756b6b33d596d0e4c214232b73a1ec", 0xb3}, {&(0x7f00000002c0)="6b33fb3fbdea666bb5d71b7a0d145488e56992688e2e794468cacde6d81bc5cd76ac50540752d018891dae5752fac976ccdd0f1cc8842ed2023194440ace1579261edf18d1c4ebdfff7070c542cff85c7788b9d44646d9e8a002e799b7c12a841f077be85206bd0695d437805fa1c0a54aedff963b89856b897d5f2ebf4124572a4cf87061262836929768d0f3838f2e0c4f03c569658a79ecece1a73c1f94fbb10c169af3a892585198541159144f0442b15bbbca8929de8d1eae19b9", 0xbd}, {&(0x7f0000000380)="358a58a989a2d653cf3e43d901a7bb55c8a0427b26e6f72d528348c415663bae8cf20fa3ca1dc8e4c737d342363108", 0x2f}, {&(0x7f00000003c0)="1b22fe4714e13058fe3359bf917726fa9eda0676fa3711f6bced36a5adba", 0x1e}, {&(0x7f0000000400)="2ec5c174310b86efc60befa29355773188a16ad8759d78599e43651a7fec89f42f38a3956637739306bedf8901c69fd052f9f2a1676fdd60e9f4d0b5468f0c90949db9fc7c65e8b79cb40601be2e4fedc6edf05a3f6d90f6978e65769aa4038be8ef0e79706dbf2489da5aa90dcc882d9f1c323bb7bda6accd342c8d5af79792add2266fc591252f25d9bffab889ee3084c9f7b3542c9e6777de3bf3553c07", 0x9f}, {&(0x7f00000004c0)="0a8dd99472a1d3e4101170cadc4fbdc829ddfe6afca20580f6d8fd972f9ee49094d1bd3ecf9c573e6a9f94eb03ad63ee67a6", 0x32}, {&(0x7f0000000500)="98945184865bf4e689404cc42c94d547c5bc67f271aaf40d3cf2bd4905bf81dd0baae3ac54b82ad62bb31c26074e27f0e01ebb226c", 0x35}, {&(0x7f0000000540)="ada863f626a79cec3746a77ede7fc52702042d9090acde1a82bf874c2f83609309e519200d3e964fc1e4de344bf4349b36a136bc06c492e27e4cbd9c8e21798a4c4d7f0324b2548162c4b1098ee728c0b87b", 0x52}], 0xa}}, {{&(0x7f0000000680)=@can, 0x80, &(0x7f0000001840)=[{&(0x7f0000000700)="ec46f558923abf26038d1b167784a3d076eadca4f6244b053de851eab69b4aa6b479d7af6372bd056e3502ea72f5d21c7241", 0x32}, {&(0x7f0000000740)="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", 0x1000}, {&(0x7f0000001740)="a74a9bb05f45a46ebfb4c702f0dcce3210cea26921ae20d79d2bd9963a3d4e3fa77d46d381133b239b629a7e07c13e76c0b3be3de0dc3399cfe984fa721d5927942f3017ecba3d20aaf7c1d3e937b3f4d3140034d4f0df8a4fb960a486c03c510ea72409223efca274e40f682f5e0fad31d0ce3d5903dbf470c0252abe6b7cc64708c74ce651e28b22126362321d742c4108a73643a49328a4d12d30630cf45dd604e863ada4037923561d0ba06cbd304d037e8907f324aa783a86692edb503d7d8f8da74f2fb8576a6bdbad18b8bd9803fb5982fe1be383e8e7f5ee28c16fef3a052f6673a4d2a842", 0xe9}], 0x3}}, {{&(0x7f0000001880)=@pppoe={0x18, 0x0, {0x1, @random="af752e008c6e", 'rose0\x00'}}, 0x80, &(0x7f0000001a80)=[{&(0x7f0000001900)="e58739457e7b82282463a087f2ba5526b3a750d8168a321124c8a6bf093f4e56a7423497d1e733cecc0ad97312e61359f21773aaa2b8c0dbedb543e7564fb97b8c207a7241b9e48d4f2aa616138b861d212922cacad04eddf9f28f0a2627dfa7298b4826a3320a8b32f32ac77ea06279840a6fad55054411f6b32b927de28fa05385704b55b33eb1551b2aa15a4ba0ff6ced367e4e60a0500d2bdda045a7f095594f", 0xa2}, {&(0x7f00000019c0)="d099ec99c5094bcaf799a4f89fbc7d51a67e65d391fc340547ff7a2bdd40ddc7d32c1d5c90562a3a19ab3734f3f2edf3688b154d6aef9a4c707118827fefbe18ef735491c72f7017ef5b55029844ca036db4115c19", 0x55}, {&(0x7f0000001a40)="b72dac5a1efd901ad49974a8e928566d4c42cdc7ead2b38dd6d770bc19fdae1405617fc361412ff391c82ecc", 0x2c}], 0x3}}], 0x3, 0x8000) (async) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) 11:00:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a09", 0xb, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) [ 566.159113][T15644] loop0: detected capacity change from 0 to 264192 [ 566.183586][T15633] EXT4-fs error (device loop3): __ext4_fill_super:5226: inode #2: comm syz-executor.3: iget: root inode unallocated [ 566.183770][T15633] EXT4-fs (loop3): get root inode failed [ 566.183782][T15633] EXT4-fs (loop3): mount failed 11:00:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000180000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03000000", 0x4, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) [ 566.206648][T15639] EXT4-fs error (device loop1): ext4_lookup:1812: inode #2: comm syz-executor.1: deleted inode referenced: 12 [ 566.234364][T15659] loop0: detected capacity change from 0 to 264192 [ 566.280625][T15669] loop0: detected capacity change from 0 to 264192 [ 566.311878][T15673] loop1: detected capacity change from 0 to 264192 11:00:23 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000080)=0x1, 0x4) (async) getpeername$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @private2}, &(0x7f0000000140)=0x1c) (async) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000180)={0x80000000}) (async) r1 = openat2(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x80001, 0x48, 0x18}, 0x18) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@private2={0xfc, 0x2, '\x00', 0x1}, 0x8cfb, 0x2, 0x0, 0x9, 0x7, 0x6}, 0x20) 11:00:23 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000260000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:23 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) getsockname$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000080)=0x1c) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x800, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r1, 0x3, 0x0) getdents64(r1, 0xfffffffffffffffe, 0x29) shutdown(r1, 0x1) [ 566.317371][T15676] loop3: detected capacity change from 0 to 264192 [ 566.330540][T15676] EXT4-fs error (device loop3): __ext4_fill_super:5226: inode #2: comm syz-executor.3: iget: root inode unallocated 11:00:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r0, 0x3, 0x0) getdents64(r0, 0xfffffffffffffffe, 0x29) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x4e22, @remote}, {0x6, @local}, 0x50, {0x2, 0x4e23, @broadcast}, 'batadv_slave_0\x00'}) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) r2 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r2, 0x3, 0x0) getdents64(r2, 0xfffffffffffffffe, 0x29) sendto$inet6(r2, &(0x7f0000000100)="2989169092f2b0db0ce9842342c4e43ef0823fe955922192325d750434e768bb27081f", 0x23, 0x20044000, &(0x7f0000000140)={0xa, 0x4e23, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xfff}, 0x1c) setsockopt$inet6_tcp_int(r1, 0x6, 0x7, &(0x7f0000000080)=0x1, 0x4) 11:00:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a09", 0xb, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:23 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) getsockname$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000080)=0x1c) (async) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x800, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) (async) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) (async) r1 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r1, 0x3, 0x0) (async) getdents64(r1, 0xfffffffffffffffe, 0x29) shutdown(r1, 0x1) 11:00:23 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540), 0x0, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) [ 566.330692][T15676] EXT4-fs (loop3): get root inode failed [ 566.330727][T15676] EXT4-fs (loop3): mount failed [ 566.367489][T15673] EXT4-fs error (device loop1): ext4_lookup:1812: inode #2: comm syz-executor.1: deleted inode referenced: 12 [ 566.376722][T15694] loop0: detected capacity change from 0 to 264192 11:00:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f0000003f0000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03000000", 0x4, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) [ 566.400020][T15698] loop3: detected capacity change from 0 to 264192 [ 566.426514][ T7746] loop0: unable to read partition table [ 566.426534][ T7746] loop0: partition table beyond EOD, truncated [ 566.467201][T15698] EXT4-fs error (device loop3): __ext4_fill_super:5226: inode #2: comm syz-executor.3: iget: root inode unallocated [ 566.467456][T15698] EXT4-fs (loop3): get root inode failed [ 566.467468][T15698] EXT4-fs (loop3): mount failed 11:00:23 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) getsockname$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000080)=0x1c) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x800, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r1, 0x3, 0x0) getdents64(r1, 0xfffffffffffffffe, 0x29) shutdown(r1, 0x1) socket$inet6_mptcp(0xa, 0x1, 0x106) (async) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) (async) getsockname$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000080)=0x1c) (async) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x800, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) (async) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) (async) openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) (async) lseek(r1, 0x3, 0x0) (async) getdents64(r1, 0xfffffffffffffffe, 0x29) (async) shutdown(r1, 0x1) (async) 11:00:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r0, 0x3, 0x0) (async) getdents64(r0, 0xfffffffffffffffe, 0x29) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x4e22, @remote}, {0x6, @local}, 0x50, {0x2, 0x4e23, @broadcast}, 'batadv_slave_0\x00'}) (async) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) (async) r2 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r2, 0x3, 0x0) (async) getdents64(r2, 0xfffffffffffffffe, 0x29) (async) sendto$inet6(r2, &(0x7f0000000100)="2989169092f2b0db0ce9842342c4e43ef0823fe955922192325d750434e768bb27081f", 0x23, 0x20044000, &(0x7f0000000140)={0xa, 0x4e23, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xfff}, 0x1c) setsockopt$inet6_tcp_int(r1, 0x6, 0x7, &(0x7f0000000080)=0x1, 0x4) 11:00:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03000000", 0x4, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000400000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) [ 566.479623][T15715] loop0: detected capacity change from 0 to 264192 [ 566.498548][ T7746] loop0: unable to read partition table [ 566.498567][ T7746] loop0: partition table beyond EOD, truncated 11:00:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a0900", 0x10, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:23 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540), 0x0, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000800400000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r0, 0x3, 0x0) (async) getdents64(r0, 0xfffffffffffffffe, 0x29) (async) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x4e22, @remote}, {0x6, @local}, 0x50, {0x2, 0x4e23, @broadcast}, 'batadv_slave_0\x00'}) (async) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) (async) r2 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r2, 0x3, 0x0) (async) getdents64(r2, 0xfffffffffffffffe, 0x29) (async) sendto$inet6(r2, &(0x7f0000000100)="2989169092f2b0db0ce9842342c4e43ef0823fe955922192325d750434e768bb27081f", 0x23, 0x20044000, &(0x7f0000000140)={0xa, 0x4e23, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xfff}, 0x1c) setsockopt$inet6_tcp_int(r1, 0x6, 0x7, &(0x7f0000000080)=0x1, 0x4) [ 566.508529][T15727] loop3: detected capacity change from 0 to 264192 [ 566.536393][T15727] EXT4-fs error (device loop3): __ext4_fill_super:5226: inode #2: comm syz-executor.3: iget: root inode unallocated 11:00:23 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@window={0x3, 0x1000, 0x8}], 0x1) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000080)=0x1, 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r1, 0x3, 0x0) getdents64(r1, 0xfffffffffffffffe, 0x29) getsockopt$bt_hci(r1, 0x0, 0x2, &(0x7f0000000100)=""/252, &(0x7f0000000040)=0xfc) 11:00:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a0900", 0x10, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f0000005a0000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) [ 566.537487][T15727] EXT4-fs (loop3): get root inode failed [ 566.537503][T15727] EXT4-fs (loop3): mount failed [ 566.542081][T15734] No source specified [ 566.544228][T15735] loop1: detected capacity change from 0 to 264192 11:00:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) [ 566.544793][T15735] ext4: Unknown parameter '!q' [ 566.555005][T15735] SELinux: Context system_u:object_r:v4l_device_t:s0 is not valid (left unmapped). [ 566.555271][ T25] audit: type=1400 audit(1655463616.726:524): avc: denied { relabelto } for pid=15720 comm="syz-executor.1" name="file0" dev="sda1" ino=1181 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:v4l_device_t:s0" [ 566.606485][T15744] loop1: detected capacity change from 0 to 264192 11:00:23 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@window={0x3, 0x1000, 0x8}], 0x1) (async) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) (async) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000080)=0x1, 0x4) (async) r1 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r1, 0x3, 0x0) (async) getdents64(r1, 0xfffffffffffffffe, 0x29) getsockopt$bt_hci(r1, 0x0, 0x2, &(0x7f0000000100)=""/252, &(0x7f0000000040)=0xfc) 11:00:24 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540), 0x0, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) [ 566.606928][T15744] ext4: Unknown parameter '!q' [ 566.613620][T15754] loop3: detected capacity change from 0 to 264192 [ 566.621659][T15753] No source specified [ 566.629087][ T7754] loop1: unable to read partition table [ 566.629105][ T7754] loop1: partition table beyond EOD, truncated [ 566.631549][T15754] EXT4-fs error (device loop3): __ext4_fill_super:5226: inode #2: comm syz-executor.3: iget: root inode unallocated 11:00:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000760000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:24 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@window={0x3, 0x1000, 0x8}], 0x1) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000080)=0x1, 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r1, 0x3, 0x0) getdents64(r1, 0xfffffffffffffffe, 0x29) getsockopt$bt_hci(r1, 0x0, 0x2, &(0x7f0000000100)=""/252, &(0x7f0000000040)=0xfc) socket$inet6_mptcp(0xa, 0x1, 0x106) (async) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@window={0x3, 0x1000, 0x8}], 0x1) (async) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) (async) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000080)=0x1, 0x4) (async) openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) (async) lseek(r1, 0x3, 0x0) (async) getdents64(r1, 0xfffffffffffffffe, 0x29) (async) getsockopt$bt_hci(r1, 0x0, 0x2, &(0x7f0000000100)=""/252, &(0x7f0000000040)=0xfc) (async) 11:00:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a0900", 0x10, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) [ 566.647761][T15754] EXT4-fs (loop3): get root inode failed [ 566.647777][T15754] EXT4-fs (loop3): mount failed [ 566.700683][T15776] loop1: detected capacity change from 0 to 264192 [ 566.701060][T15776] ext4: Unknown parameter '!q' [ 566.702609][T15785] No source specified [ 566.726168][T15786] loop3: detected capacity change from 0 to 264192 11:00:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000830000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) [ 566.739122][T15786] EXT4-fs error (device loop3): __ext4_fill_super:5226: inode #2: comm syz-executor.3: iget: root inode unallocated [ 566.739306][T15786] EXT4-fs (loop3): get root inode failed [ 566.739319][T15786] EXT4-fs (loop3): mount failed [ 566.753420][T15799] loop0: detected capacity change from 0 to 264192 [ 566.755214][T15801] loop1: detected capacity change from 0 to 264192 [ 566.756837][T15799] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled 11:00:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000ffffffff60000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:24 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f00", 0x10, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:24 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$F2FS_IOC_PRECACHE_EXTENTS(r0, 0xf50f, 0x0) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r2 = dup(r1) r3 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r3, 0x3, 0x0) getdents64(r3, 0xfffffffffffffffe, 0x29) r4 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r4, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r4, 0xc0189376, &(0x7f0000000640)=ANY=[@ANYBLOB="922a488800"/19, @ANYRES32=r1, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$IMCLEAR_L2(r5, 0x80044946, &(0x7f0000000600)=0x8) getdents64(r4, 0xfffffffffffffffe, 0x29) io_submit(0x0, 0x5, &(0x7f0000000580)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x3e7, r1, &(0x7f0000000100)="d7232a2df7a66c768e3d56e014c13be474b72915295bc44728fd37338beaa220b20b77e32a7d6c65a363", 0x2a, 0x10000, 0x0, 0x3}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0x5, r0, &(0x7f0000000180)="0c0aaf787cd3ebfc638f52357e4494a1c5e7dfcdaf3f57f3e30fc4209932bb58bfdfce53334cb7b553011bcbf4b224a648a4a255353284c8118c6b94cc4dc6433600c05ec38eed253f923d5ba36a292474c09b85894b72cc9d66830addca0c588943fc6fb3b25679dda29416b2057d8b50f55939c56a53aca64e94754ccb5eda2f1630fbeb10a947d05f49af0a8c6d829658ea6ba81cd706913b47931a71617edd194fcc9b38e9b68d5b3d13b1facc65d4af669954dda479124a413975ece24edf8b843ee7e97ebeff8925a9d98d2ab964", 0xd1, 0x2, 0x0, 0x0, r2}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x2, 0x400, r3, &(0x7f00000002c0)="9ef5d86ef864f74bef22767703eb3817", 0x10, 0x47a4}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0xc, 0xfff, r1, &(0x7f0000000340)="3835e69d13e5fd7a766c8db8d8de29ab8f0106e164bfe7bf88c566aaa82d85b578f4456c980e31f4a1fc9e96812ddc544434ece163381af4f4354dd038da3b3e070fcdcaa5559ad669b04fd1cee46dc8337d78e5566559a6eea210233158a9dbaa8d2abae794831b7bbbd388c180fa4253cd584b63a3a9329e3ca845b647677eed96c1050a5d551e2024f2f4c855c36edff86efa7f79c7107d5e70c0ff49e3f338b16d322a64190b709a12cc4dc006df956c82942adfa2fcd4682084fb61542d245cca317dce60", 0xc7, 0xd923, 0x0, 0x1}, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x8, 0x9, r1, &(0x7f0000000480)="07949aeac6b74ca954a2c08cd7498df3c07b37253048999de9bdd0d4de46515836e444ecce549b5cfb31c4c1823075fb3907e355896eab2c376dc92172b47846374a6713e115a0db90383ce368a2db4863cc0e3121b8f03f9175cda7a3b0b076b7bc028a76e291cfe72f381389d1755a88d624b78ebfe0913166067342dbf5a90f41acc50810a787", 0x88, 0x1, 0x0, 0x1, r4}]) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r1, 0x40049366, &(0x7f0000000080)=0x2) r6 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r6, 0x3, 0x0) getdents64(r6, 0xfffffffffffffffe, 0x29) setsockopt$bt_hci_HCI_FILTER(r6, 0x0, 0x2, &(0x7f0000000040)={0xea, [0x2, 0x7], 0x8001}, 0x10) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x17, &(0x7f0000000000)=0x1, 0x4) 11:00:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000ffffffffe0000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) [ 566.811346][T15801] EXT4-fs error (device loop1): ext4_lookup:1812: inode #2: comm syz-executor.1: deleted inode referenced: 12 [ 566.838223][T15820] loop3: detected capacity change from 0 to 264192 [ 566.846043][T15820] EXT4-fs error (device loop3): __ext4_fill_super:5226: inode #2: comm syz-executor.3: iget: root inode unallocated [ 566.846281][T15820] EXT4-fs (loop3): get root inode failed 11:00:24 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$F2FS_IOC_PRECACHE_EXTENTS(r0, 0xf50f, 0x0) (async, rerun: 32) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) (rerun: 32) r2 = dup(r1) (async) r3 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r3, 0x3, 0x0) (async) getdents64(r3, 0xfffffffffffffffe, 0x29) r4 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r4, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r4, 0xc0189376, &(0x7f0000000640)=ANY=[@ANYBLOB="922a488800"/19, @ANYRES32=r1, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00./file0\x00']) (async) ioctl$IMCLEAR_L2(r5, 0x80044946, &(0x7f0000000600)=0x8) (async) getdents64(r4, 0xfffffffffffffffe, 0x29) (async) io_submit(0x0, 0x5, &(0x7f0000000580)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x3e7, r1, &(0x7f0000000100)="d7232a2df7a66c768e3d56e014c13be474b72915295bc44728fd37338beaa220b20b77e32a7d6c65a363", 0x2a, 0x10000, 0x0, 0x3}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0x5, r0, &(0x7f0000000180)="0c0aaf787cd3ebfc638f52357e4494a1c5e7dfcdaf3f57f3e30fc4209932bb58bfdfce53334cb7b553011bcbf4b224a648a4a255353284c8118c6b94cc4dc6433600c05ec38eed253f923d5ba36a292474c09b85894b72cc9d66830addca0c588943fc6fb3b25679dda29416b2057d8b50f55939c56a53aca64e94754ccb5eda2f1630fbeb10a947d05f49af0a8c6d829658ea6ba81cd706913b47931a71617edd194fcc9b38e9b68d5b3d13b1facc65d4af669954dda479124a413975ece24edf8b843ee7e97ebeff8925a9d98d2ab964", 0xd1, 0x2, 0x0, 0x0, r2}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x2, 0x400, r3, &(0x7f00000002c0)="9ef5d86ef864f74bef22767703eb3817", 0x10, 0x47a4}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0xc, 0xfff, r1, &(0x7f0000000340)="3835e69d13e5fd7a766c8db8d8de29ab8f0106e164bfe7bf88c566aaa82d85b578f4456c980e31f4a1fc9e96812ddc544434ece163381af4f4354dd038da3b3e070fcdcaa5559ad669b04fd1cee46dc8337d78e5566559a6eea210233158a9dbaa8d2abae794831b7bbbd388c180fa4253cd584b63a3a9329e3ca845b647677eed96c1050a5d551e2024f2f4c855c36edff86efa7f79c7107d5e70c0ff49e3f338b16d322a64190b709a12cc4dc006df956c82942adfa2fcd4682084fb61542d245cca317dce60", 0xc7, 0xd923, 0x0, 0x1}, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x8, 0x9, r1, &(0x7f0000000480)="07949aeac6b74ca954a2c08cd7498df3c07b37253048999de9bdd0d4de46515836e444ecce549b5cfb31c4c1823075fb3907e355896eab2c376dc92172b47846374a6713e115a0db90383ce368a2db4863cc0e3121b8f03f9175cda7a3b0b076b7bc028a76e291cfe72f381389d1755a88d624b78ebfe0913166067342dbf5a90f41acc50810a787", 0x88, 0x1, 0x0, 0x1, r4}]) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r1, 0x40049366, &(0x7f0000000080)=0x2) r6 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r6, 0x3, 0x0) (async) getdents64(r6, 0xfffffffffffffffe, 0x29) (async) setsockopt$bt_hci_HCI_FILTER(r6, 0x0, 0x2, &(0x7f0000000040)={0xea, [0x2, 0x7], 0x8001}, 0x10) (async) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x17, &(0x7f0000000000)=0x1, 0x4) 11:00:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000ff6ffffff0000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) [ 566.846293][T15820] EXT4-fs (loop3): mount failed [ 566.927823][T15832] loop0: detected capacity change from 0 to 264192 [ 566.934652][T15835] loop1: detected capacity change from 0 to 264192 11:00:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000ffeffffff0000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:24 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f00", 0x10, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) [ 566.935440][T15838] loop3: detected capacity change from 0 to 264192 11:00:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:24 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$F2FS_IOC_PRECACHE_EXTENTS(r0, 0xf50f, 0x0) (async) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r2 = dup(r1) (async) r3 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r3, 0x3, 0x0) (async) getdents64(r3, 0xfffffffffffffffe, 0x29) (async) r4 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r4, 0x3, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_READY(r4, 0xc0189376, &(0x7f0000000640)=ANY=[@ANYBLOB="922a488800"/19, @ANYRES32=r1, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00./file0\x00']) (async) ioctl$IMCLEAR_L2(r5, 0x80044946, &(0x7f0000000600)=0x8) getdents64(r4, 0xfffffffffffffffe, 0x29) (async) io_submit(0x0, 0x5, &(0x7f0000000580)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x3e7, r1, &(0x7f0000000100)="d7232a2df7a66c768e3d56e014c13be474b72915295bc44728fd37338beaa220b20b77e32a7d6c65a363", 0x2a, 0x10000, 0x0, 0x3}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0x5, r0, &(0x7f0000000180)="0c0aaf787cd3ebfc638f52357e4494a1c5e7dfcdaf3f57f3e30fc4209932bb58bfdfce53334cb7b553011bcbf4b224a648a4a255353284c8118c6b94cc4dc6433600c05ec38eed253f923d5ba36a292474c09b85894b72cc9d66830addca0c588943fc6fb3b25679dda29416b2057d8b50f55939c56a53aca64e94754ccb5eda2f1630fbeb10a947d05f49af0a8c6d829658ea6ba81cd706913b47931a71617edd194fcc9b38e9b68d5b3d13b1facc65d4af669954dda479124a413975ece24edf8b843ee7e97ebeff8925a9d98d2ab964", 0xd1, 0x2, 0x0, 0x0, r2}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x2, 0x400, r3, &(0x7f00000002c0)="9ef5d86ef864f74bef22767703eb3817", 0x10, 0x47a4}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0xc, 0xfff, r1, &(0x7f0000000340)="3835e69d13e5fd7a766c8db8d8de29ab8f0106e164bfe7bf88c566aaa82d85b578f4456c980e31f4a1fc9e96812ddc544434ece163381af4f4354dd038da3b3e070fcdcaa5559ad669b04fd1cee46dc8337d78e5566559a6eea210233158a9dbaa8d2abae794831b7bbbd388c180fa4253cd584b63a3a9329e3ca845b647677eed96c1050a5d551e2024f2f4c855c36edff86efa7f79c7107d5e70c0ff49e3f338b16d322a64190b709a12cc4dc006df956c82942adfa2fcd4682084fb61542d245cca317dce60", 0xc7, 0xd923, 0x0, 0x1}, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x8, 0x9, r1, &(0x7f0000000480)="07949aeac6b74ca954a2c08cd7498df3c07b37253048999de9bdd0d4de46515836e444ecce549b5cfb31c4c1823075fb3907e355896eab2c376dc92172b47846374a6713e115a0db90383ce368a2db4863cc0e3121b8f03f9175cda7a3b0b076b7bc028a76e291cfe72f381389d1755a88d624b78ebfe0913166067342dbf5a90f41acc50810a787", 0x88, 0x1, 0x0, 0x1, r4}]) (async) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r1, 0x40049366, &(0x7f0000000080)=0x2) r6 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r6, 0x3, 0x0) (async) getdents64(r6, 0xfffffffffffffffe, 0x29) (async) setsockopt$bt_hci_HCI_FILTER(r6, 0x0, 0x2, &(0x7f0000000040)={0xea, [0x2, 0x7], 0x8001}, 0x10) (async) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) (async) setsockopt$inet6_tcp_int(r0, 0x6, 0x17, &(0x7f0000000000)=0x1, 0x4) 11:00:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000008000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) [ 566.956407][T15838] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 566.956430][T15838] EXT4-fs (loop3): mount failed 11:00:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:24 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000000)=0x7, 0x4) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r1, 0x3, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x100, 0x4) getdents64(r1, 0xfffffffffffffffe, 0x29) setsockopt$inet6_tcp_int(r1, 0x6, 0x17, &(0x7f0000000100)=0x1, 0x4) [ 566.960563][T15832] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled 11:00:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000010000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:24 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000000)=0x7, 0x4) (async) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) (async) r1 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r1, 0x3, 0x0) (async) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x100, 0x4) getdents64(r1, 0xfffffffffffffffe, 0x29) (async) setsockopt$inet6_tcp_int(r1, 0x6, 0x17, &(0x7f0000000100)=0x1, 0x4) 11:00:24 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f00", 0x10, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000fffffffffffff070000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) [ 567.071741][T15879] loop0: detected capacity change from 0 to 264192 [ 567.074237][T15879] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled 11:00:24 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000", 0x18, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000080000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:24 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000000)=0x7, 0x4) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r1, 0x3, 0x0) (async, rerun: 32) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x100, 0x4) (rerun: 32) getdents64(r1, 0xfffffffffffffffe, 0x29) (async) setsockopt$inet6_tcp_int(r1, 0x6, 0x17, &(0x7f0000000100)=0x1, 0x4) 11:00:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a090000000000", 0x14, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:24 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000", 0x18, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000200000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) [ 567.078078][T15882] loop3: detected capacity change from 0 to 264192 [ 567.128851][T15893] loop1: detected capacity change from 0 to 16383 [ 567.146043][T15882] EXT4-fs (loop3): corrupt root inode, run e2fsck 11:00:24 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r1, 0x3, 0x0) getdents64(r1, 0xfffffffffffffffe, 0x29) r2 = openat$urandom(0xffffffffffffff9c, &(0x7f00000022c0), 0x81, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000002300)='net/rt_acct\x00') sendfile(r2, r3, &(0x7f0000002340)=0x3, 0x7) recvmsg(r1, &(0x7f0000002200)={&(0x7f0000000000)=@alg, 0x80, &(0x7f0000002180)=[{&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/80, 0x50}, {&(0x7f0000001180)=""/4096, 0x1000}], 0x3, &(0x7f00000021c0)=""/57, 0x39}, 0x41) bind(r1, &(0x7f0000002240)=@caif=@rfm={0x25, 0xf685, "1810170715b13b3790d723815066a164"}, 0x80) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000080)=0x1, 0x4) 11:00:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) [ 567.146104][T15882] EXT4-fs (loop3): mount failed 11:00:24 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r1, 0x3, 0x0) getdents64(r1, 0xfffffffffffffffe, 0x29) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)={0x0, 0x29, "a473582aeda1af0d822340fbaf5ac6fe1b734286d1171da04574f5739682872a88a9b4a54677c9fd88"}, &(0x7f0000000040)=0x31) r2 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r2, 0x3, 0x0) getdents64(r2, 0xfffffffffffffffe, 0x29) r3 = openat(r1, &(0x7f0000000080)='./file0\x00', 0x88c0, 0x5) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r3) sendto$inet6(r2, &(0x7f0000000300)="00eecef279d458e4e8e12b10532fdb884747ce4e6b9d318cbc11e272a54afa4e09472b16f807763a001f0256a5983bccc87ffdeab3140cf24dce398587b274a534f73dadc9a0", 0x46, 0x20044080, &(0x7f0000000380)={0xa, 0xfffe, 0xffffffc0, @dev={0xfe, 0x80, '\x00', 0x20}, 0x843d}, 0x1c) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000240)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="48040000", @ANYBLOB, @ANYRES32=r6, @ANYBLOB="2c33005000de295b3acb862ee4080211005050506a9ce325d3111cdbf49ca42393370536c46eb8ebc0f3f6a87b7fc88d01bc9c553c0c33d21a18854e36f4ee15b2480f5093edeb68bcc39f5d27f7c5f729f3ffeaa83d1909d16641c59682674bf4a56f9e792ea93de51e"], 0x448}}, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r2, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x9c, r4, 0x200, 0x70bd29, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r6}, @val={0xc, 0x99, {0x8, 0x5}}}}, [@NL80211_ATTR_SCHED_SCAN_RELATIVE_RSSI={0x5}, @NL80211_ATTR_SCHED_SCAN_MULTI={0x4}, @NL80211_ATTR_SCAN_SSIDS={0x68, 0x2d, 0x0, 0x1, [{0xa, 0x0, @default_ibss_ssid}, {0x23, 0x0, @random="519ff3bd17f07874c9a559c6d4c1d1d4a17789cf687d5a7acc4fea9a377185"}, {0x17, 0x0, @random="456d905aba49bca0a362e129bb02949b14bf13"}, {0x1b, 0x0, @random="12591c7145a5190f151af039c1cae2205d2e9154758787"}]}]}, 0x9c}, 0x1, 0x0, 0x0, 0x24041}, 0x4800) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000140)={0x80000001, 0x10001, 0x3}) 11:00:24 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000", 0x18, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:24 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) (async) r1 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r1, 0x3, 0x0) getdents64(r1, 0xfffffffffffffffe, 0x29) (async) r2 = openat$urandom(0xffffffffffffff9c, &(0x7f00000022c0), 0x81, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000002300)='net/rt_acct\x00') sendfile(r2, r3, &(0x7f0000002340)=0x3, 0x7) recvmsg(r1, &(0x7f0000002200)={&(0x7f0000000000)=@alg, 0x80, &(0x7f0000002180)=[{&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/80, 0x50}, {&(0x7f0000001180)=""/4096, 0x1000}], 0x3, &(0x7f00000021c0)=""/57, 0x39}, 0x41) bind(r1, &(0x7f0000002240)=@caif=@rfm={0x25, 0xf685, "1810170715b13b3790d723815066a164"}, 0x80) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000080)=0x1, 0x4) 11:00:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000200000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) [ 567.177230][T15893] EXT4-fs error (device loop1): __ext4_new_inode:1072: comm syz-executor.1: reserved inode found cleared - inode=1 11:00:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a090000000000", 0x14, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000040200000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:24 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f00030004000000000000000000", 0x1c, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:24 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) (async) r1 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r1, 0x3, 0x0) getdents64(r1, 0xfffffffffffffffe, 0x29) (async, rerun: 32) r2 = openat$urandom(0xffffffffffffff9c, &(0x7f00000022c0), 0x81, 0x0) (async, rerun: 32) r3 = syz_open_procfs(0x0, &(0x7f0000002300)='net/rt_acct\x00') sendfile(r2, r3, &(0x7f0000002340)=0x3, 0x7) (async) recvmsg(r1, &(0x7f0000002200)={&(0x7f0000000000)=@alg, 0x80, &(0x7f0000002180)=[{&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/80, 0x50}, {&(0x7f0000001180)=""/4096, 0x1000}], 0x3, &(0x7f00000021c0)=""/57, 0x39}, 0x41) bind(r1, &(0x7f0000002240)=@caif=@rfm={0x25, 0xf685, "1810170715b13b3790d723815066a164"}, 0x80) (async) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000080)=0x1, 0x4) 11:00:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a090000000000", 0x14, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:24 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r1, 0x3, 0x0) getdents64(r1, 0xfffffffffffffffe, 0x29) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)={0x0, 0x29, "a473582aeda1af0d822340fbaf5ac6fe1b734286d1171da04574f5739682872a88a9b4a54677c9fd88"}, &(0x7f0000000040)=0x31) r2 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r2, 0x3, 0x0) getdents64(r2, 0xfffffffffffffffe, 0x29) r3 = openat(r1, &(0x7f0000000080)='./file0\x00', 0x88c0, 0x5) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r3) sendto$inet6(r2, &(0x7f0000000300)="00eecef279d458e4e8e12b10532fdb884747ce4e6b9d318cbc11e272a54afa4e09472b16f807763a001f0256a5983bccc87ffdeab3140cf24dce398587b274a534f73dadc9a0", 0x46, 0x20044080, &(0x7f0000000380)={0xa, 0xfffe, 0xffffffc0, @dev={0xfe, 0x80, '\x00', 0x20}, 0x843d}, 0x1c) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000240)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="48040000", @ANYBLOB, @ANYRES32=r6, @ANYBLOB="2c33005000de295b3acb862ee4080211005050506a9ce325d3111cdbf49ca42393370536c46eb8ebc0f3f6a87b7fc88d01bc9c553c0c33d21a18854e36f4ee15b2480f5093edeb68bcc39f5d27f7c5f729f3ffeaa83d1909d16641c59682674bf4a56f9e792ea93de51e"], 0x448}}, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r2, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x9c, r4, 0x200, 0x70bd29, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r6}, @val={0xc, 0x99, {0x8, 0x5}}}}, [@NL80211_ATTR_SCHED_SCAN_RELATIVE_RSSI={0x5}, @NL80211_ATTR_SCHED_SCAN_MULTI={0x4}, @NL80211_ATTR_SCAN_SSIDS={0x68, 0x2d, 0x0, 0x1, [{0xa, 0x0, @default_ibss_ssid}, {0x23, 0x0, @random="519ff3bd17f07874c9a559c6d4c1d1d4a17789cf687d5a7acc4fea9a377185"}, {0x17, 0x0, @random="456d905aba49bca0a362e129bb02949b14bf13"}, {0x1b, 0x0, @random="12591c7145a5190f151af039c1cae2205d2e9154758787"}]}]}, 0x9c}, 0x1, 0x0, 0x0, 0x24041}, 0x4800) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000140)={0x80000001, 0x10001, 0x3}) socket$inet6_mptcp(0xa, 0x1, 0x106) (async) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) (async) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) (async) openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) (async) lseek(r1, 0x3, 0x0) (async) getdents64(r1, 0xfffffffffffffffe, 0x29) (async) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)={0x0, 0x29, "a473582aeda1af0d822340fbaf5ac6fe1b734286d1171da04574f5739682872a88a9b4a54677c9fd88"}, &(0x7f0000000040)=0x31) (async) openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) (async) lseek(r2, 0x3, 0x0) (async) getdents64(r2, 0xfffffffffffffffe, 0x29) (async) openat(r1, &(0x7f0000000080)='./file0\x00', 0x88c0, 0x5) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r3) (async) sendto$inet6(r2, &(0x7f0000000300)="00eecef279d458e4e8e12b10532fdb884747ce4e6b9d318cbc11e272a54afa4e09472b16f807763a001f0256a5983bccc87ffdeab3140cf24dce398587b274a534f73dadc9a0", 0x46, 0x20044080, &(0x7f0000000380)={0xa, 0xfffe, 0xffffffc0, @dev={0xfe, 0x80, '\x00', 0x20}, 0x843d}, 0x1c) (async) socket$inet6_udplite(0xa, 0x2, 0x88) (async) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000240)={'wlan1\x00'}) (async) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="48040000", @ANYBLOB, @ANYRES32=r6, @ANYBLOB="2c33005000de295b3acb862ee4080211005050506a9ce325d3111cdbf49ca42393370536c46eb8ebc0f3f6a87b7fc88d01bc9c553c0c33d21a18854e36f4ee15b2480f5093edeb68bcc39f5d27f7c5f729f3ffeaa83d1909d16641c59682674bf4a56f9e792ea93de51e"], 0x448}}, 0x0) (async) sendmsg$NL80211_CMD_TRIGGER_SCAN(r2, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x9c, r4, 0x200, 0x70bd29, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r6}, @val={0xc, 0x99, {0x8, 0x5}}}}, [@NL80211_ATTR_SCHED_SCAN_RELATIVE_RSSI={0x5}, @NL80211_ATTR_SCHED_SCAN_MULTI={0x4}, @NL80211_ATTR_SCAN_SSIDS={0x68, 0x2d, 0x0, 0x1, [{0xa, 0x0, @default_ibss_ssid}, {0x23, 0x0, @random="519ff3bd17f07874c9a559c6d4c1d1d4a17789cf687d5a7acc4fea9a377185"}, {0x17, 0x0, @random="456d905aba49bca0a362e129bb02949b14bf13"}, {0x1b, 0x0, @random="12591c7145a5190f151af039c1cae2205d2e9154758787"}]}]}, 0x9c}, 0x1, 0x0, 0x0, 0x24041}, 0x4800) (async) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000140)={0x80000001, 0x10001, 0x3}) (async) 11:00:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) [ 567.226617][T15922] loop3: detected capacity change from 0 to 264192 [ 567.232535][T15923] loop0: detected capacity change from 0 to 23 11:00:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000300000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:24 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x10, &(0x7f0000000000)=0x801, 0x4) 11:00:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) [ 567.234897][T15923] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 567.234914][T15923] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (11 blocks) 11:00:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000400000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:24 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f00030004000000000000000000", 0x1c, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:24 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x10, &(0x7f0000000000)=0x801, 0x4) socket$inet6_mptcp(0xa, 0x1, 0x106) (async) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) (async) setsockopt$inet6_tcp_int(r0, 0x6, 0x10, &(0x7f0000000000)=0x801, 0x4) (async) 11:00:24 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r1, 0x3, 0x0) getdents64(r1, 0xfffffffffffffffe, 0x29) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)={0x0, 0x29, "a473582aeda1af0d822340fbaf5ac6fe1b734286d1171da04574f5739682872a88a9b4a54677c9fd88"}, &(0x7f0000000040)=0x31) r2 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r2, 0x3, 0x0) getdents64(r2, 0xfffffffffffffffe, 0x29) r3 = openat(r1, &(0x7f0000000080)='./file0\x00', 0x88c0, 0x5) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r3) sendto$inet6(r2, &(0x7f0000000300)="00eecef279d458e4e8e12b10532fdb884747ce4e6b9d318cbc11e272a54afa4e09472b16f807763a001f0256a5983bccc87ffdeab3140cf24dce398587b274a534f73dadc9a0", 0x46, 0x20044080, &(0x7f0000000380)={0xa, 0xfffe, 0xffffffc0, @dev={0xfe, 0x80, '\x00', 0x20}, 0x843d}, 0x1c) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000240)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="48040000", @ANYBLOB, @ANYRES32=r6, @ANYBLOB="2c33005000de295b3acb862ee4080211005050506a9ce325d3111cdbf49ca42393370536c46eb8ebc0f3f6a87b7fc88d01bc9c553c0c33d21a18854e36f4ee15b2480f5093edeb68bcc39f5d27f7c5f729f3ffeaa83d1909d16641c59682674bf4a56f9e792ea93de51e"], 0x448}}, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r2, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x9c, r4, 0x200, 0x70bd29, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r6}, @val={0xc, 0x99, {0x8, 0x5}}}}, [@NL80211_ATTR_SCHED_SCAN_RELATIVE_RSSI={0x5}, @NL80211_ATTR_SCHED_SCAN_MULTI={0x4}, @NL80211_ATTR_SCAN_SSIDS={0x68, 0x2d, 0x0, 0x1, [{0xa, 0x0, @default_ibss_ssid}, {0x23, 0x0, @random="519ff3bd17f07874c9a559c6d4c1d1d4a17789cf687d5a7acc4fea9a377185"}, {0x17, 0x0, @random="456d905aba49bca0a362e129bb02949b14bf13"}, {0x1b, 0x0, @random="12591c7145a5190f151af039c1cae2205d2e9154758787"}]}]}, 0x9c}, 0x1, 0x0, 0x0, 0x24041}, 0x4800) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000140)={0x80000001, 0x10001, 0x3}) socket$inet6_mptcp(0xa, 0x1, 0x106) (async) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) (async) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) (async) openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) (async) lseek(r1, 0x3, 0x0) (async) getdents64(r1, 0xfffffffffffffffe, 0x29) (async) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)={0x0, 0x29, "a473582aeda1af0d822340fbaf5ac6fe1b734286d1171da04574f5739682872a88a9b4a54677c9fd88"}, &(0x7f0000000040)=0x31) (async) openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) (async) lseek(r2, 0x3, 0x0) (async) getdents64(r2, 0xfffffffffffffffe, 0x29) (async) openat(r1, &(0x7f0000000080)='./file0\x00', 0x88c0, 0x5) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r3) (async) sendto$inet6(r2, &(0x7f0000000300)="00eecef279d458e4e8e12b10532fdb884747ce4e6b9d318cbc11e272a54afa4e09472b16f807763a001f0256a5983bccc87ffdeab3140cf24dce398587b274a534f73dadc9a0", 0x46, 0x20044080, &(0x7f0000000380)={0xa, 0xfffe, 0xffffffc0, @dev={0xfe, 0x80, '\x00', 0x20}, 0x843d}, 0x1c) (async) socket$inet6_udplite(0xa, 0x2, 0x88) (async) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000240)={'wlan1\x00'}) (async) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="48040000", @ANYBLOB, @ANYRES32=r6, @ANYBLOB="2c33005000de295b3acb862ee4080211005050506a9ce325d3111cdbf49ca42393370536c46eb8ebc0f3f6a87b7fc88d01bc9c553c0c33d21a18854e36f4ee15b2480f5093edeb68bcc39f5d27f7c5f729f3ffeaa83d1909d16641c59682674bf4a56f9e792ea93de51e"], 0x448}}, 0x0) (async) sendmsg$NL80211_CMD_TRIGGER_SCAN(r2, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x9c, r4, 0x200, 0x70bd29, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r6}, @val={0xc, 0x99, {0x8, 0x5}}}}, [@NL80211_ATTR_SCHED_SCAN_RELATIVE_RSSI={0x5}, @NL80211_ATTR_SCHED_SCAN_MULTI={0x4}, @NL80211_ATTR_SCAN_SSIDS={0x68, 0x2d, 0x0, 0x1, [{0xa, 0x0, @default_ibss_ssid}, {0x23, 0x0, @random="519ff3bd17f07874c9a559c6d4c1d1d4a17789cf687d5a7acc4fea9a377185"}, {0x17, 0x0, @random="456d905aba49bca0a362e129bb02949b14bf13"}, {0x1b, 0x0, @random="12591c7145a5190f151af039c1cae2205d2e9154758787"}]}]}, 0x9c}, 0x1, 0x0, 0x0, 0x24041}, 0x4800) (async) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000140)={0x80000001, 0x10001, 0x3}) (async) [ 567.269147][T15922] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 567.269222][T15922] EXT4-fs (loop3): mount failed 11:00:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:24 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f00030004000000000000000000", 0x1c, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000500000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:24 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x10, &(0x7f0000000000)=0x801, 0x4) [ 567.310853][T15939] loop0: detected capacity change from 0 to 23 [ 567.319108][T15939] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 567.319127][T15939] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (11 blocks) [ 567.333063][T15944] loop1: detected capacity change from 0 to 16383 11:00:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000040600000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a", 0x10, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:24 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, &(0x7f0000000340)=""/4096, 0x1000, 0x0, &(0x7f0000001340)=""/145, 0x91}, &(0x7f0000000180)=0x40) r1 = accept4$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000040)=0x1c, 0x80000) r2 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r2, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, &(0x7f0000000200)=ANY=[@ANYBLOB="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", @ANYRES32=r1, @ANYBLOB="00010000000000002e2f66696c653000"]) ioctl$F2FS_IOC_RESIZE_FS(r3, 0x4008f510, &(0x7f0000000140)=0x2) getdents64(r2, 0xfffffffffffffffe, 0x29) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000001400)='\x00\xd6\t\xcf/:\xf6gnfv\xcc\x9c\xdb\xcf\xdd\xe4w\x841\xf6Q\xe3\x8a\x8dE\xc1B\x1c\xf3/\x9c\x16C!\b\r\xf9o\xf1\xea?*\x87<\xd4^\x8b\x91y9\x80\x12\x888\xe2\x9ds\xcb\x94P\n\x8aBE5\xb3\xf9d+\xb3\x1f\xdf\xa4\x1fT!\xb2\xedLy<+\xd1\xb3\xc3\xdf\xde\x8f\xc6\xa2\xa6\xe3\xca\x14\x88\xf2\xe3\xd4^e1*\xe3Q\xde\x10g_\\y\xbc}\x13~\x9aR\xbb\xbbx\xb8\xae\xac\xa1\xf9\xee\x10\xfbH}\x03\x81\x7fw#\x87\xbb\xbd%|\xa4:\xae\xd6Q\xeb`\xb9\xb2\xae.}\xb2\xf5\xc2]\xfd\xa2\xa3\xa9\x8aY\xc0\x9a\x06\xb5\x1aL;\x14{0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a", 0x10, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:25 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, &(0x7f0000000340)=""/4096, 0x1000, 0x0, &(0x7f0000001340)=""/145, 0x91}, &(0x7f0000000180)=0x40) r1 = accept4$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000040)=0x1c, 0x80000) r2 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r2, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, &(0x7f0000000200)=ANY=[@ANYBLOB="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", @ANYRES32=r1, @ANYBLOB="00010000000000002e2f66696c653000"]) ioctl$F2FS_IOC_RESIZE_FS(r3, 0x4008f510, &(0x7f0000000140)=0x2) getdents64(r2, 0xfffffffffffffffe, 0x29) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000001400)='\x00\xd6\t\xcf/:\xf6gnfv\xcc\x9c\xdb\xcf\xdd\xe4w\x841\xf6Q\xe3\x8a\x8dE\xc1B\x1c\xf3/\x9c\x16C!\b\r\xf9o\xf1\xea?*\x87<\xd4^\x8b\x91y9\x80\x12\x888\xe2\x9ds\xcb\x94P\n\x8aBE5\xb3\xf9d+\xb3\x1f\xdf\xa4\x1fT!\xb2\xedLy<+\xd1\xb3\xc3\xdf\xde\x8f\xc6\xa2\xa6\xe3\xca\x14\x88\xf2\xe3\xd4^e1*\xe3Q\xde\x10g_\\y\xbc}\x13~\x9aR\xbb\xbbx\xb8\xae\xac\xa1\xf9\xee\x10\xfbH}\x03\x81\x7fw#\x87\xbb\xbd%|\xa4:\xae\xd6Q\xeb`\xb9\xb2\xae.}\xb2\xf5\xc2]\xfd\xa2\xa3\xa9\x8aY\xc0\x9a\x06\xb5\x1aL;\x14{r1, @ANYBLOB="00010000000000002e2f66696c653000"]) ioctl$F2FS_IOC_RESIZE_FS(r3, 0x4008f510, &(0x7f0000000140)=0x2) getdents64(r2, 0xfffffffffffffffe, 0x29) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000001400)='\x00\xd6\t\xcf/:\xf6gnfv\xcc\x9c\xdb\xcf\xdd\xe4w\x841\xf6Q\xe3\x8a\x8dE\xc1B\x1c\xf3/\x9c\x16C!\b\r\xf9o\xf1\xea?*\x87<\xd4^\x8b\x91y9\x80\x12\x888\xe2\x9ds\xcb\x94P\n\x8aBE5\xb3\xf9d+\xb3\x1f\xdf\xa4\x1fT!\xb2\xedLy<+\xd1\xb3\xc3\xdf\xde\x8f\xc6\xa2\xa6\xe3\xca\x14\x88\xf2\xe3\xd4^e1*\xe3Q\xde\x10g_\\y\xbc}\x13~\x9aR\xbb\xbbx\xb8\xae\xac\xa1\xf9\xee\x10\xfbH}\x03\x81\x7fw#\x87\xbb\xbd%|\xa4:\xae\xd6Q\xeb`\xb9\xb2\xae.}\xb2\xf5\xc2]\xfd\xa2\xa3\xa9\x8aY\xc0\x9a\x06\xb5\x1aL;\x14{0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) [ 567.442727][T15963] EXT4-fs error (device loop1): __ext4_new_inode:1072: comm syz-executor.1: reserved inode found cleared - inode=1 [ 567.497713][T15987] loop0: detected capacity change from 0 to 23 [ 567.506969][T15987] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 567.506987][T15987] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (11 blocks) [ 567.522292][T15993] loop1: detected capacity change from 0 to 264192 11:00:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00", 0x1e, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:25 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4000, 0x0, @empty}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="2321202e2f66696c653020272e5c0a52c9a8fbec7422895fe7a955ff816dd95a424550fad3bda0ea9617a1785da1a07fb9c1f15497e7275e138071e0c52a040cf9064da28ad9fe9573a090419c52bfe8fd571bd959a5138d09000df99db1ddb833d7ea09d6bced7c0d12166aaf656317fbc2580493411c8a54c4240231fed4c05ff77c65ddeeddca6d95187f0b981e1caa05d4bbf45793d09f89d48e2b8588b7ca6ff59a41fbada972808ead2c60f6d3e007ad00000000000000efffffff00"/204], 0xd7) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000004c0), 0x4) r2 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r2, 0x3, 0x0) getdents64(r2, 0xfffffffffffffffe, 0x29) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000200)=0x0) sendmsg$nl_generic(r2, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000400)={&(0x7f0000000500)={0x244, 0x1f, 0x10, 0x70bd2c, 0x25dfdbfe, {0x14}, [@generic="3c12a2651bda9b9382e4a89211cc6bbd14f264c912e382181257a75892b893db00d90b47c88ed5057b94698221f88f91d57e69515fdd91", @generic="fc7fc9276e6b59aa1cece8467c5aa0df44e025ffe96b266165e57de25dd7b08ee131753139ccc12d11fd128e0a972929ec361963f4dff2d5ded09c0f4eb22e4fe2ee0e56850a6f2e5c8f80624028ac76c71e9b026fceca27e0720d069d2bc968163ea34477cb3459d5adb10f620d183467b6842d466225f45532faf6a0509062e433440146378c1fa465fd5c0fd44bb2d1906b0d5ba4dbf8ab22100c056970f7e53e486d0856bd6811213275c439e16465890a970a8f34929467e50200f26f7e9ebe00d92cbc0658c74b987e3b74fdd5f44ce0272eb9", @nested={0x11e, 0x5f, 0x0, 0x1, [@generic="43735fef6050f2bed7f4fd67568702f657b18160253c3e979b0821ee4fe175d28c2d1a3cb64802a64e6c81bdf28e6f1294a064040eb6680a88c91a00b2c8b8b62f2b3e", @typed={0x8, 0x7f, 0x0, 0x0, @uid=r3}, @typed={0x8, 0x93, 0x0, 0x0, @uid=0xffffffffffffffff}, @generic="bda471f770f1", @generic="8951ee9807f7b25681f3025618377fceb64d543890353f77d075a605f15d6c36b4255d9c443682a304358dae5c48d670a9507a77e21624277ea53248fe24db02d3ba73a9cb28ce0805bae9135f4935013fc7d789cda4ebeb9e06d039010bef3c932cf2b59a161b0e641bc17bb1b82780b7a8beb61648316343a8b3cebe411f21ca8e207644c8ec557c3bf4bac0450a3788ccdc77a773d242a61c4bfea845da8522ed4031e1755ea6fe64acc164b6a21587ffcbeb5154f22fe5", @typed={0x8, 0x5a, 0x0, 0x0, @u32=0x8000}]}]}, 0x244}, 0x1, 0x0, 0x0, 0x4}, 0xc0c4) 11:00:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000004000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:25 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4000, 0x0, @empty}, 0x1c) (async) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) (async) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="2321202e2f66696c653020272e5c0a52c9a8fbec7422895fe7a955ff816dd95a424550fad3bda0ea9617a1785da1a07fb9c1f15497e7275e138071e0c52a040cf9064da28ad9fe9573a090419c52bfe8fd571bd959a5138d09000df99db1ddb833d7ea09d6bced7c0d12166aaf656317fbc2580493411c8a54c4240231fed4c05ff77c65ddeeddca6d95187f0b981e1caa05d4bbf45793d09f89d48e2b8588b7ca6ff59a41fbada972808ead2c60f6d3e007ad00000000000000efffffff00"/204], 0xd7) (async) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000004c0), 0x4) (async) r2 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r2, 0x3, 0x0) (async) getdents64(r2, 0xfffffffffffffffe, 0x29) (async) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000200)=0x0) sendmsg$nl_generic(r2, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000400)={&(0x7f0000000500)={0x244, 0x1f, 0x10, 0x70bd2c, 0x25dfdbfe, {0x14}, [@generic="3c12a2651bda9b9382e4a89211cc6bbd14f264c912e382181257a75892b893db00d90b47c88ed5057b94698221f88f91d57e69515fdd91", @generic="fc7fc9276e6b59aa1cece8467c5aa0df44e025ffe96b266165e57de25dd7b08ee131753139ccc12d11fd128e0a972929ec361963f4dff2d5ded09c0f4eb22e4fe2ee0e56850a6f2e5c8f80624028ac76c71e9b026fceca27e0720d069d2bc968163ea34477cb3459d5adb10f620d183467b6842d466225f45532faf6a0509062e433440146378c1fa465fd5c0fd44bb2d1906b0d5ba4dbf8ab22100c056970f7e53e486d0856bd6811213275c439e16465890a970a8f34929467e50200f26f7e9ebe00d92cbc0658c74b987e3b74fdd5f44ce0272eb9", @nested={0x11e, 0x5f, 0x0, 0x1, [@generic="43735fef6050f2bed7f4fd67568702f657b18160253c3e979b0821ee4fe175d28c2d1a3cb64802a64e6c81bdf28e6f1294a064040eb6680a88c91a00b2c8b8b62f2b3e", @typed={0x8, 0x7f, 0x0, 0x0, @uid=r3}, @typed={0x8, 0x93, 0x0, 0x0, @uid=0xffffffffffffffff}, @generic="bda471f770f1", @generic="8951ee9807f7b25681f3025618377fceb64d543890353f77d075a605f15d6c36b4255d9c443682a304358dae5c48d670a9507a77e21624277ea53248fe24db02d3ba73a9cb28ce0805bae9135f4935013fc7d789cda4ebeb9e06d039010bef3c932cf2b59a161b0e641bc17bb1b82780b7a8beb61648316343a8b3cebe411f21ca8e207644c8ec557c3bf4bac0450a3788ccdc77a773d242a61c4bfea845da8522ed4031e1755ea6fe64acc164b6a21587ffcbeb5154f22fe5", @typed={0x8, 0x5a, 0x0, 0x0, @u32=0x8000}]}]}, 0x244}, 0x1, 0x0, 0x0, 0x4}, 0xc0c4) 11:00:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000008004000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) [ 567.549165][T16003] loop3: detected capacity change from 0 to 264192 [ 567.598886][T15993] EXT4-fs error (device loop1): ext4_lookup:1812: inode #2: comm syz-executor.1: deleted inode referenced: 12 11:00:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c89", 0x18, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f0069", 0x1f, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:25 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4000, 0x0, @empty}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="2321202e2f66696c653020272e5c0a52c9a8fbec7422895fe7a955ff816dd95a424550fad3bda0ea9617a1785da1a07fb9c1f15497e7275e138071e0c52a040cf9064da28ad9fe9573a090419c52bfe8fd571bd959a5138d09000df99db1ddb833d7ea09d6bced7c0d12166aaf656317fbc2580493411c8a54c4240231fed4c05ff77c65ddeeddca6d95187f0b981e1caa05d4bbf45793d09f89d48e2b8588b7ca6ff59a41fbada972808ead2c60f6d3e007ad00000000000000efffffff00"/204], 0xd7) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000004c0), 0x4) r2 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r2, 0x3, 0x0) getdents64(r2, 0xfffffffffffffffe, 0x29) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000200)=0x0) sendmsg$nl_generic(r2, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000400)={&(0x7f0000000500)={0x244, 0x1f, 0x10, 0x70bd2c, 0x25dfdbfe, {0x14}, [@generic="3c12a2651bda9b9382e4a89211cc6bbd14f264c912e382181257a75892b893db00d90b47c88ed5057b94698221f88f91d57e69515fdd91", @generic="fc7fc9276e6b59aa1cece8467c5aa0df44e025ffe96b266165e57de25dd7b08ee131753139ccc12d11fd128e0a972929ec361963f4dff2d5ded09c0f4eb22e4fe2ee0e56850a6f2e5c8f80624028ac76c71e9b026fceca27e0720d069d2bc968163ea34477cb3459d5adb10f620d183467b6842d466225f45532faf6a0509062e433440146378c1fa465fd5c0fd44bb2d1906b0d5ba4dbf8ab22100c056970f7e53e486d0856bd6811213275c439e16465890a970a8f34929467e50200f26f7e9ebe00d92cbc0658c74b987e3b74fdd5f44ce0272eb9", @nested={0x11e, 0x5f, 0x0, 0x1, [@generic="43735fef6050f2bed7f4fd67568702f657b18160253c3e979b0821ee4fe175d28c2d1a3cb64802a64e6c81bdf28e6f1294a064040eb6680a88c91a00b2c8b8b62f2b3e", @typed={0x8, 0x7f, 0x0, 0x0, @uid=r3}, @typed={0x8, 0x93, 0x0, 0x0, @uid=0xffffffffffffffff}, @generic="bda471f770f1", @generic="8951ee9807f7b25681f3025618377fceb64d543890353f77d075a605f15d6c36b4255d9c443682a304358dae5c48d670a9507a77e21624277ea53248fe24db02d3ba73a9cb28ce0805bae9135f4935013fc7d789cda4ebeb9e06d039010bef3c932cf2b59a161b0e641bc17bb1b82780b7a8beb61648316343a8b3cebe411f21ca8e207644c8ec557c3bf4bac0450a3788ccdc77a773d242a61c4bfea845da8522ed4031e1755ea6fe64acc164b6a21587ffcbeb5154f22fe5", @typed={0x8, 0x5a, 0x0, 0x0, @u32=0x8000}]}]}, 0x244}, 0x1, 0x0, 0x0, 0x4}, 0xc0c4) socket$inet6_mptcp(0xa, 0x1, 0x106) (async) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4000, 0x0, @empty}, 0x1c) (async) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) (async) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="2321202e2f66696c653020272e5c0a52c9a8fbec7422895fe7a955ff816dd95a424550fad3bda0ea9617a1785da1a07fb9c1f15497e7275e138071e0c52a040cf9064da28ad9fe9573a090419c52bfe8fd571bd959a5138d09000df99db1ddb833d7ea09d6bced7c0d12166aaf656317fbc2580493411c8a54c4240231fed4c05ff77c65ddeeddca6d95187f0b981e1caa05d4bbf45793d09f89d48e2b8588b7ca6ff59a41fbada972808ead2c60f6d3e007ad00000000000000efffffff00"/204], 0xd7) (async) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) (async) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000004c0), 0x4) (async) openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) (async) lseek(r2, 0x3, 0x0) (async) getdents64(r2, 0xfffffffffffffffe, 0x29) (async) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000200)) (async) sendmsg$nl_generic(r2, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000400)={&(0x7f0000000500)={0x244, 0x1f, 0x10, 0x70bd2c, 0x25dfdbfe, {0x14}, [@generic="3c12a2651bda9b9382e4a89211cc6bbd14f264c912e382181257a75892b893db00d90b47c88ed5057b94698221f88f91d57e69515fdd91", @generic="fc7fc9276e6b59aa1cece8467c5aa0df44e025ffe96b266165e57de25dd7b08ee131753139ccc12d11fd128e0a972929ec361963f4dff2d5ded09c0f4eb22e4fe2ee0e56850a6f2e5c8f80624028ac76c71e9b026fceca27e0720d069d2bc968163ea34477cb3459d5adb10f620d183467b6842d466225f45532faf6a0509062e433440146378c1fa465fd5c0fd44bb2d1906b0d5ba4dbf8ab22100c056970f7e53e486d0856bd6811213275c439e16465890a970a8f34929467e50200f26f7e9ebe00d92cbc0658c74b987e3b74fdd5f44ce0272eb9", @nested={0x11e, 0x5f, 0x0, 0x1, [@generic="43735fef6050f2bed7f4fd67568702f657b18160253c3e979b0821ee4fe175d28c2d1a3cb64802a64e6c81bdf28e6f1294a064040eb6680a88c91a00b2c8b8b62f2b3e", @typed={0x8, 0x7f, 0x0, 0x0, @uid=r3}, @typed={0x8, 0x93, 0x0, 0x0, @uid=0xffffffffffffffff}, @generic="bda471f770f1", @generic="8951ee9807f7b25681f3025618377fceb64d543890353f77d075a605f15d6c36b4255d9c443682a304358dae5c48d670a9507a77e21624277ea53248fe24db02d3ba73a9cb28ce0805bae9135f4935013fc7d789cda4ebeb9e06d039010bef3c932cf2b59a161b0e641bc17bb1b82780b7a8beb61648316343a8b3cebe411f21ca8e207644c8ec557c3bf4bac0450a3788ccdc77a773d242a61c4bfea845da8522ed4031e1755ea6fe64acc164b6a21587ffcbeb5154f22fe5", @typed={0x8, 0x5a, 0x0, 0x0, @u32=0x8000}]}]}, 0x244}, 0x1, 0x0, 0x0, 0x4}, 0xc0c4) (async) 11:00:25 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket(0x26, 0xa, 0x4) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) sendto$inet6(r1, &(0x7f0000000000)="af2b979edf8336aca73e7a1456", 0xd, 0x40c0, &(0x7f0000000040)={0xa, 0x4e23, 0x271d, @private2={0xfc, 0x2, '\x00', 0x1}, 0x8001}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000080)=0x1, 0x4) socket$inet6(0xa, 0x54e0741b9e53b15b, 0x40) socket$inet6_mptcp(0xa, 0x1, 0x106) (async) socket(0x26, 0xa, 0x4) (async) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) (async) sendto$inet6(r1, &(0x7f0000000000)="af2b979edf8336aca73e7a1456", 0xd, 0x40c0, &(0x7f0000000040)={0xa, 0x4e23, 0x271d, @private2={0xfc, 0x2, '\x00', 0x1}, 0x8001}, 0x1c) (async) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000080)=0x1, 0x4) (async) socket$inet6(0xa, 0x54e0741b9e53b15b, 0x40) (async) 11:00:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000005a00000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) [ 567.599423][T15993] EXT4-fs error (device loop1): ext4_lookup:1812: inode #2: comm syz-executor.1: deleted inode referenced: 12 11:00:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000007600000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:25 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="0100000010e13bc3bf8b47dc504a7e2d346300001e4054"]) accept4$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @multicast1}}, &(0x7f0000000080)=0x1c, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x240088c4, 0x0, 0xffffffffffffff4c) 11:00:25 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket(0x26, 0xa, 0x4) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) sendto$inet6(r1, &(0x7f0000000000)="af2b979edf8336aca73e7a1456", 0xd, 0x40c0, &(0x7f0000000040)={0xa, 0x4e23, 0x271d, @private2={0xfc, 0x2, '\x00', 0x1}, 0x8001}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000080)=0x1, 0x4) socket$inet6(0xa, 0x54e0741b9e53b15b, 0x40) socket$inet6_mptcp(0xa, 0x1, 0x106) (async) socket(0x26, 0xa, 0x4) (async) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) (async) sendto$inet6(r1, &(0x7f0000000000)="af2b979edf8336aca73e7a1456", 0xd, 0x40c0, &(0x7f0000000040)={0xa, 0x4e23, 0x271d, @private2={0xfc, 0x2, '\x00', 0x1}, 0x8001}, 0x1c) (async) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000080)=0x1, 0x4) (async) socket$inet6(0xa, 0x54e0741b9e53b15b, 0x40) (async) 11:00:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f0069", 0x1f, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c89", 0x18, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) [ 567.632898][T16038] loop0: detected capacity change from 0 to 23 [ 567.636195][T16038] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled 11:00:25 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="0100000010e13bc3bf8b47dc504a7e2d346300001e4054"]) accept4$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @multicast1}}, &(0x7f0000000080)=0x1c, 0x0) (async) sendto$inet6(r0, 0x0, 0x0, 0x240088c4, 0x0, 0xffffffffffffff4c) 11:00:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000008300000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f0069", 0x1f, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c89", 0x18, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:25 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x10, &(0x7f0000000080)=0x9, 0x4) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000), 0x4) 11:00:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {0x0, 0x0, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) [ 567.636212][T16038] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (11 blocks) [ 567.653472][T16042] loop1: detected capacity change from 0 to 264192 [ 567.668298][T16047] loop3: detected capacity change from 0 to 264192 11:00:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f00000000fffffff600000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:25 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="0100000010e13bc3bf8b47dc504a7e2d346300001e4054"]) (async) accept4$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @multicast1}}, &(0x7f0000000080)=0x1c, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x240088c4, 0x0, 0xffffffffffffff4c) 11:00:25 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) (async) setsockopt$inet6_tcp_int(r0, 0x6, 0x10, &(0x7f0000000080)=0x9, 0x4) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000), 0x4) 11:00:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f00000000fffffffe00000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:25 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x17, &(0x7f0000000000)=0xb1a2, 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r1, 0x3, 0x0) getdents64(r1, 0xfffffffffffffffe, 0x29) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) 11:00:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {0x0, 0x0, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) [ 567.676206][T16047] EXT4-fs (loop3): corrupt root inode, run e2fsck 11:00:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) [ 567.676230][T16047] EXT4-fs (loop3): mount failed 11:00:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045", 0x1c, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:25 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x10, &(0x7f0000000080)=0x9, 0x4) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000), 0x4) socket$inet6_mptcp(0xa, 0x1, 0x106) (async) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) (async) setsockopt$inet6_tcp_int(r0, 0x6, 0x10, &(0x7f0000000080)=0x9, 0x4) (async) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000), 0x4) (async) 11:00:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000ffffffffffffffffe00000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:25 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x17, &(0x7f0000000000)=0xb1a2, 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r1, 0x3, 0x0) getdents64(r1, 0xfffffffffffffffe, 0x29) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) socket$inet6_mptcp(0xa, 0x1, 0x106) (async) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) (async) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) (async) setsockopt$inet6_int(r0, 0x29, 0x17, &(0x7f0000000000)=0xb1a2, 0x4) (async) openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) (async) lseek(r1, 0x3, 0x0) (async) getdents64(r1, 0xfffffffffffffffe, 0x29) (async) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) (async) 11:00:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {0x0, 0x0, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) [ 567.725659][T16058] loop0: detected capacity change from 0 to 23 [ 567.773922][T16064] loop3: detected capacity change from 0 to 264192 11:00:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f00000000ffffffff00000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:25 executing program 4: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000045c0)={0x0, 0x4, 0x7ff, 0x6, 0x5, 0x2, 0xdbf, 0x2, {0x0, @in={{0x2, 0x4e23, @multicast2}}, 0x0, 0x6, 0x7fffffff, 0x3, 0x9}}, &(0x7f0000003080)=0xb0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000004680)={r0, 0x8}, 0x8) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000004440)=[{&(0x7f0000000000)=@in={0x2, 0x4e22, @empty}, 0x10, &(0x7f0000000040)=[{&(0x7f0000000100)="3aec5a420a46e31231af3678ca0aa555aa55441bb0c1eb8f79aff7e5c2cb92f9fca1b1f81cbe100dfba0be035ca9b31066ab8670eedd44889f01fc2217f25f69ba08efa6491340686f79bb298a80e551de8c3caa819043bda14acda11ca79b8bf6060bfd6e3dac5e05c3f333170ca451163723f498a0c470428ecfb7f3003523f8caf302a8ad3238d34127e09a7467d60a46294620688430874bcf8b1ca155fa6c7f26a0f6ca7ae2a6ff4c501ea7065bdb63ddd52da76b2354", 0xb9}, {&(0x7f00000001c0)="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", 0x1000}], 0x2, &(0x7f00000011c0)=ANY=[@ANYBLOB="1800000000000000840000000000000000012000dfe694c800bbf1903700000084a5710008000000fe8000000000000000000000000000aa180071d6cf6400008400000006000000008000000000000018000000000000008400000000000000050000040101060020000000000000008400000008000000fc02000000000000000000000000000018000000000000008455e5b3795149341fd98d3600000000"], 0xa0, 0xc890}, {&(0x7f0000001280)=@in6={0xa, 0x4e23, 0x1, @mcast2, 0xff}, 0x1c, &(0x7f0000002700)=[{&(0x7f00000012c0)="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", 0x1000}, {&(0x7f00000022c0)="303e96a3366b6113b2df8aee5bd4a25a019b94c6e3f4f77dc5a6c281e9c4a8bb6db57db44ba042226e5055aee54a03e89063", 0x32}, {&(0x7f0000002300)="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", 0xfb}, {&(0x7f0000002400)="3cb6b729847e9d2ee663b7cf7a5482b5d60b16dc9613528a9828369cd2da752f943db778cf782efe94bef1ba2025d7d3", 0x30}, {&(0x7f0000002440)="1113b1a6e0c6521bfcc3d63a49bf6fb3ce893c78e8a6c0e3db12e58961de1009471df222d9585f5d3c009e5eca81a21fc200c0e9654ce287336dbdc53f96b6940b8517e5d11156e352c01a4491430d229cc6214eca85ed3da0191c54c97d4572c74df08d0bd966b38ead5e0cf5082f160df124caf1808f4206b5f9aa54bd308204490af59e01f2e4a632931f7d216a132c5717dc43484c65b068823dd14627c10f105574d92c4a3c2cafb352a22d4e94eec22645adf14f50d771b8633e5795d7b60bc804ea41847b2e00ac5af3", 0xcd}, {&(0x7f0000002540)="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", 0xff}, {&(0x7f0000002640)="9a4193586253d1a93ef2c4f34f605cf22e8787bb63031ce0e27f5d1a0ad8bc099aa95dcb902699900aad67bb872f4502650eb64a", 0x34}, {&(0x7f0000002680)="e71545621b35bbcf4783aa7a60abe0c6f3de32887f6a03533421ea77db98517a68e7a991a44b893653da08788a85c03e20ef2b50c1735b6e0d95d9c3dfa03dfc0c60bfc0a671e3cd360c5470493b07d49463f15f9cf81d1174298cfcd2ffbbbc99", 0x61}], 0x8, 0x0, 0x0, 0x20004005}, {&(0x7f0000002780)=@in={0x2, 0x4e23, @empty}, 0x10, &(0x7f0000002b00)=[{&(0x7f00000027c0)="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", 0xff}, {&(0x7f00000028c0)="ae56a397c4cf6ae4a5dee9057c61ebce70e2304b552408a7ad15fcf5e60675404b9dc93a9ec27fa29430bac1d7a28617", 0x30}, {&(0x7f0000002900)="11712c7d35344b70d9c9df8bb8425c1fa74f824a9a925e5d946454703bdd5295bcd3161e988fa914407f3d0b4e41ed63849f5269a434b135becc923c97e9c885c42c008a1ccc01c5a48d0c41f6e8ae3a432b70f86b093e6e9c8a274d2e98369c4b105e04047682ff04404a3a7af04add384d2d2061d9dfc74d52ae841f6512c57dcedb53fb8bb0f8528311c9176594b3c23b5d6b5dab9327e0a5bc61098cda1836b5de1b822bd03dcf6b0af01f52e0945b7c14859226b38a59b9717aa1c3d6801138ad7715b5", 0xc6}, {&(0x7f0000002a00)="d947400edf7f873af475fe30d0865aad72b210325cff1717f233dd00be68be8a43796e4c8e3189a22e225b15fc1d5e37fcba9ad931ab3ac258af37a92e9103ba7d943b7a72c7229c2a5fa8278ff5fb96af84132bfe5a48f4cee4fc7119f6af8c94a399ebb1bea9fce625e7a84c38dcab29a209d2ed708d618095b01a7b378f158bd202b43ab1d57110f01be64bab2155186014c349af8534881ef563f7da651cf01aa6ea7becb8a3c95a905d07024d2d0e2ff23e738479e9d7eb71499a1c650456d7144dda7941ccf9864e216d5b851966efafe7ca2b198fdb256fe9d2813c2f9d7b0845b6679168aca64a6395", 0xed}], 0x4, &(0x7f0000002b40)=[@sndinfo={0x20, 0x84, 0x2, {0x9, 0x8, 0x3, 0x101}}], 0x20, 0xc080}, {&(0x7f0000002b80)=@in={0x2, 0x4e24, @broadcast}, 0x10, &(0x7f00000030c0)=[{&(0x7f0000002bc0)="838f0b84b0300f50f7f4836f67934d86ebc5b4f2cedf3c9d943faaf709bfc04be8dbd8df94064c7a1ffa8319d091a3ca295d613361487f28b6f8b7a76f86f3b4c281a2f10cc439c9a15003fc2cee7f720acee10aff21eecd94bd482ec2b29ee2546fb7ab2b24ff37454a36f867b712eabe4901c3479d8e264f32bb84ea35a31956206856d4b6d2b888c2556eca70615683", 0x91}, {&(0x7f0000002c80)="8cb9e7f320071c42cd6a1a7e342bd609193c4190a6fbcfda3197926efe165f3d6ecc83a31b2333001325a7e59895056e44ffd3907828401ec656eaaaa07b53b2a1c6b1abc1e695301622ebbb1585502825b567a484b0c75f0516b8b949db376e12dac6003b514af66333a026930a5a591e86081523c8b202aa3adf7a1e5da7413a8f4c927bc83152db71836cd9cc590f6ee264cec447ca03b07a39610ebe5bea18417e622f802871", 0xa8}, {&(0x7f0000002d40)="b1a9a9e49b27d647aff93d52641921972511c199bae43fa23a880a0e8d3fa55ccb003b578338217c03c9b21c802a7d4d7814ffaa7a03db5ba966d64ef075fbf38c5c866c9eeda746b6b5442d51346e49cf18b0685d25b9b344d27e72e2026d0a4c0742e60c8eb2a0903f58e3c76c7074ec6ca4b83889afec5b0cdd8be465049947a9b0ecd14d5ee76aeec6448919743a6a2e471a3af663f53788528d5d0ee1fdd5258d34f67cfc560fb2c333c23f46152a2f9aff3aff1126b13ea016ccb6dc2a0594c21d04679929e86d97d7635d52e387", 0xd1}, {&(0x7f0000002e40)="e93444f5f2e8a504e19f2643253085ee0feee0d9af27a79e09031d97bee0c9a4e156b1", 0x23}, {&(0x7f0000002e80)="d5fa31374b5e03d400035b5d1cf21fb4d4604a4800464758408c0d38df4d7b3b1a42d0e28ab31ab41d464aebf38f992e0b7a75208c2c4890b42d256375bf104274a9253feac83553ecdf3f8050567aa3eaef1e8219c51de9beb9cde66dcffdae6ceb9cd827230b51baa274215e825594d67a9ed082e0141ae94ce62e7c80354e8886a57a0b53c85c2450e45c89e731a642d6f29b77ee5890ab73346edc84369caa4a2fbebd8d908a969eeff1c91c7df9ddc157ce6f3780123635c0af64ef7616cf06012d59c5495506a3187641a2cd", 0xcf}, {&(0x7f0000002f80)="4763484b281cf4ff8bd0eb3c440ba198ea8904377b1df72e68e808d46d1a28c3cb388ad0e4a083388fd5a08b9b95bdd7b42cefd9ad4430f2ca96be5513e69735ff47ef05a7de0c6e1536231d2e71fecbc37ee926d952b29aaa9341f57143ed1dec0bc205d1785c5f80d937850b61605d55e7a4f90514eac49c08c7", 0x7b}, {&(0x7f0000003000)="0c775a9f794cd7f4afd7f781ffb286facc5be13654ca6fc6ce5ae1a32d1cc93a01d005be704c35cdea7586b4c4990a5fa364ba432c4de150716d8507aa8049e76a09b123c78367c8079f53c0b8324d08f4334ced8e044bde", 0x58}, {&(0x7f0000003080)}], 0x8, 0x0, 0x0, 0x800}, {&(0x7f0000003140)=@in6={0xa, 0x4e24, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x1c, &(0x7f00000032c0)=[{&(0x7f0000003180)="31ed0e3f2dc8639daeaa37f1e14bfd8ff5d808c54deab8562b0b4f2ab15ec36f66c3383125cbde405cc0a885d1ac3560f671d479b48c2caf3e5ec97f16fb41190847436bf2db", 0x46}, {&(0x7f0000003200)="b4fc64ebdc71f59a69fc10d6af600b8bc54862281561711899759bcfef8833dd1648cfbd134ee73557676b4d61b3e6adb2006961737e62d9cfb9cb1b4d96fd1359523eafa5fd7c20d7f70b3414731e665a5b16a4e27d9c23b052db92c0f1a957e37cd1b390728a015213356079445dc716d91984467075de957e97d0fac7bac2bd908f499cebfdd754a84620a31633d637f713b6", 0x94}], 0x2, &(0x7f0000003300)=[@dstaddrv6={0x20, 0x84, 0x8, @dev={0xfe, 0x80, '\x00', 0x44}}, @dstaddrv4={0x18, 0x84, 0x7, @local}, @dstaddrv6={0x20, 0x84, 0x8, @private2}], 0x58}, {&(0x7f0000003380)=@in={0x2, 0x4e22, @multicast2}, 0x10, &(0x7f0000004400)=[{&(0x7f00000033c0)="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", 0x1000}, {&(0x7f00000043c0)='90', 0x2}], 0x2, 0x0, 0x0, 0x4}], 0x6, 0x80d0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_int(r1, 0x6, 0x7, &(0x7f0000000080)=0x1, 0x4) 11:00:25 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x17, &(0x7f0000000000)=0xb1a2, 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r1, 0x3, 0x0) getdents64(r1, 0xfffffffffffffffe, 0x29) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) socket$inet6_mptcp(0xa, 0x1, 0x106) (async) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) (async) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) (async) setsockopt$inet6_int(r0, 0x29, 0x17, &(0x7f0000000000)=0xb1a2, 0x4) (async) openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) (async) lseek(r1, 0x3, 0x0) (async) getdents64(r1, 0xfffffffffffffffe, 0x29) (async) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f}, 0x1c) (async) 11:00:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045", 0x1c, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) [ 567.783125][T16058] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 567.783145][T16058] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (11 blocks) [ 567.800046][T16064] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 567.800801][T16064] EXT4-fs (loop3): mount failed 11:00:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f0007ffffffffffff00000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:25 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r1, 0x3, 0x0) getdents64(r1, 0xfffffffffffffffe, 0x29) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x7fff, @remote, 0x41}, 0x1c) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000000)='\x00', 0x0, r0) 11:00:25 executing program 4: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000045c0)={0x0, 0x4, 0x7ff, 0x6, 0x5, 0x2, 0xdbf, 0x2, {0x0, @in={{0x2, 0x4e23, @multicast2}}, 0x0, 0x6, 0x7fffffff, 0x3, 0x9}}, &(0x7f0000003080)=0xb0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000004680)={r0, 0x8}, 0x8) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000004440)=[{&(0x7f0000000000)=@in={0x2, 0x4e22, @empty}, 0x10, &(0x7f0000000040)=[{&(0x7f0000000100)="3aec5a420a46e31231af3678ca0aa555aa55441bb0c1eb8f79aff7e5c2cb92f9fca1b1f81cbe100dfba0be035ca9b31066ab8670eedd44889f01fc2217f25f69ba08efa6491340686f79bb298a80e551de8c3caa819043bda14acda11ca79b8bf6060bfd6e3dac5e05c3f333170ca451163723f498a0c470428ecfb7f3003523f8caf302a8ad3238d34127e09a7467d60a46294620688430874bcf8b1ca155fa6c7f26a0f6ca7ae2a6ff4c501ea7065bdb63ddd52da76b2354", 0xb9}, {&(0x7f00000001c0)="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", 0x1000}], 0x2, &(0x7f00000011c0)=ANY=[@ANYBLOB="1800000000000000840000000000000000012000dfe694c800bbf1903700000084a5710008000000fe8000000000000000000000000000aa180071d6cf6400008400000006000000008000000000000018000000000000008400000000000000050000040101060020000000000000008400000008000000fc02000000000000000000000000000018000000000000008455e5b3795149341fd98d3600000000"], 0xa0, 0xc890}, {&(0x7f0000001280)=@in6={0xa, 0x4e23, 0x1, @mcast2, 0xff}, 0x1c, &(0x7f0000002700)=[{&(0x7f00000012c0)="ff4306a810c52f44800d8a6151216244c24fcf4a29e6b0b5ad48dffa9f783dfc8c1a4527722d52aa996b1fd5a75fe42d48dd85ff5a107caaacc3e0103aa758b87fc240f2b1c3f3f525877cbff70b9be05a74118ef5617ef137dda39078567b8426b51ee6dd0c915aec47396d7435933497b42f1acb4c8e60e3e29d02f243af4139565ded7ae6276fe77470a89c5db25858363c8c9b36a1bf700c519daeb130cebbbb77225085a64bf6d268efaeaa2cfbe0e53481b78c3ceeb05b6bf03e6583d4af4418246d90503338cbb63ee5e2a61d5e36c247922549db668733bb6d2f31b3c45f21413505b145abf06a50e7e295aa0bffcf0cc979ea44547344b436720ea5f06c1fcafa4a689ddd2fb4ef3298bc1b8a14839ee7f8eefe3b015830ed9b85bcb3d7466ee58a588edddfd505a4f2e551779a357a6e29b78ab672d0198198ff3b3c3e21d62d33c3e08643243318a99a6482e4a2264a99739982bd15da1134bb4a30e0c5de40b0c57d933af576142e4f789980788313436c9e61af94e014e657c665058acf797dcefafd9f628995839197891b821ddd83d1ca58eaeb41ba7c55b638c5b947ce000a9b74721454a7d94bc50a887eb725ca8de5c6252de6126d5c9bbd7e3763519a5fd918e1dc94f7aef09691752b6817b2c55ba63bbaa12a73cad5857bf07e64cab3af7fe0d0e1f60b59adca97ea29ea0c7e2d6b63eaea211b37a78f63f9e67cc983ef18d8c3a31b01ce396f712fbc9a7a403527ef1468baed1419956705c510b91a6edf4a85cfa8decdeb16b73cf4b75600972edef134618e0a04c2e3a64726401afcf0665e3fe926eff53f3edaf2a8372c314511a0d33b72b19aa7888cb3ec79def4a70d1f66fc74797d9a002befc5f16573c5733494ef512adc92dfa7ebb065ed060a80843c3ff9139fa4eb04e5e0f5277abeddb09d30ed3c115ac90e33e1d179f652d4a9e34d555caf2a4953afa94df1427918028cab225e727a296e5cc4b724792dff93a21ca5a2f450ed9903b0dffa43bcb6e3ced7a7f02aecef62a64e3f21add016e356ffdccc230cc1078cb5068924bbd17e7e9227d9156841ba3aae905775ffd35398944e17178dc4e4b072b9b7344b83c901089fd67e7d87959d4ceaae7900de2ef94a600b725057af98ea5a9580f61206f3ffd991924b38f971fa699bac87992fd817f738150491ef70c010856f6f351b95b2f7cbe0625f08d43d11d40a60f901d26cf88e3cae2a2773acda7819f5ff3d0d0282302c55e16e117a1d7f43529b78d987d5a3a176c859161567efa478da9a06d53e3550dec5c13218a3d5adbee310c846cb51bef5fdf058cd546afcb467afba1808a08d90f02794606fca857c6e8f17bbfb9bf7f2f3ac829f30568629c2dfa788746b08f9dbbc12807edaf8e21f3f7952683f7a456e0c40291f0a7a97bc589dd3549304e8c609d68dbfa1fe97d0262558deece39de7f9df043b761e9a2dba6506f1e9d496c427354bd292d0152718c1b0f93568f3a8efad4f124654b5bb80596d153690ed41d614629e091461c6f4fcfe58865c293561e37e7897070f728450f44e9ec879fd776c3a44009d4832d9369681303a51911ba34f7d46fcfa7561bbc0801123a4b4f0372dc74957647bcfe5eccf6e47e491d526677bb5ae2143d0da6891d965851d0f80562f63e00bd61a832cc534748eb8b86a6945d41abf5eb64c3af765f94681b1dcd2ab481209d4ceac2f91863b8dbbe0ed85c5e390f8b1037f69e5d72dd799de5ce88d376006adfe1fa09c1310f3fec09c07a8f899d592bc70668e7a994454a1ed11a3155c4e41a0a5f33004be4e3b76b3237f011b179a5cd148b650670c0c44bd9729b5a31d2dcfd60aa9e53ac12fc7d71546154e87f9f6ef69a1232157564f3eed71bf176a981180353a384252f5ce8b1aecc2c5e6e0458623d76eef9de3700f74d5ed97da620b199e0b662c8d5daeea25f1794b211234e2d66dffaec1e62e688efdf746da296eac1ccbf3627b534cda92c248406a6a6ecebe7d61b97fde03cf9003273d48501ce7d1a0a7def6758ed091db9fd316266bcc7bf8a596d3978cf67b3e503513c0302344c83414246df45db74ac53e1246e1d02f60bedb1cfccc5b0b0409352c718b8b540c874df631aff3c3d831af3aa1b4d45ed5ecf2d5b531d83fdc55b77ce65a023bb84c6f9734ad6f427c9fcac4fefbb9ad93bd94af76cfd623ee047e8aa7b118cde3ae435ab88ee3eeedafde65fdd5584a76b1df157d424856f03ef76dc7734858a81b698f6396795df7eb57d3c236e5d4c93e20095bcb5b4bbbea5a950c069d6410bb0bd697c3754beaf388c494c8110a88dffcf0b593f9bcb7c28f7339d4e5db0bd5f357b1947e7bd451ac025a82dcc1535be1a35168af789cd7aa065e676c2744d98aefe0c18148270a37afcca11036706920db6de1c8149179e806ef5d024dac33f628ef3adc74c13a4baa757cf0a456ecd8c814a5222400a229b9e12ccd9f9da7a36df12233d6c0b32a79fc4bf31c2e710d6b05b1062327b83c855425e09992497baa8e209a1e14f71415333295faa1b193f04811801a8a8ea89e92ab2b4a34ce4b4f9063549c067ffc308d261afea41185dd39157671254eb68c641c75f45e86a5ded51a49f04f89148a2937d9d6d2425fbe3151a71c73543a9873682a15d9888c5b7f0fefda4cd702f4f2de4e53b577c8181b545a9f008e11b6946bd2baefc3a12cb88ca93fd206498869293d86ff2d2d49a6ef81f03bebbc4514dbb816fa96add671dd829b3b61bd8a4be58b449533776d60f0355736bfe59abae5401c9c9df67d8a5806ba8ddd9afb3ad1336f4c5af4dd5758c8d96b081474192299bc97b8672c14ee37e46d410d9428b0ea4b0157268171c1b337fefefb7b95e31d94c40c6882f9d543e2c3fbcf63f121a0d93e291d1237849bd86e490bd54656775d2eb5d501e5a6c8cae0c8a0ef7f63da8b090fea471ceb6e59a53bab6dbb197a2785f208b68d2dd84fa2d4885740387b4be1505c5b0fae5a26460606fae52c73922341d9946ba09324bb3d1939942d15bdd26d37032b5532dedfcb61a9a50aab3201f9d281a6ff43484fdff30e8becb5486ccfd81f6e01e3997dca7411fcb182e5a269bc91df1f4d78db92bf7f7bf9af81551a9f09a2cc283e8695f6ca90e94a9b00a10a0e30d53c204abf837962ccf0c9fb998dab118315be7c1c51d4cf20ad3f453fb1a671d5d39d2b170a6ff6f6e4ec17785bb994c467d3bc17486cfb94d72e258b470742f20ada4136aec81da6198efee4e8d663c1ead55bab01bec1f36e4c0c35520c4d13f85d13b9f4805137fbcd4a067deaa607cbc96d0a82821b4d027832ac7ddc6950c12f0dcfb5a7b9af36a999935d0d6893500007df5add7c21d20e955cfbea7baacc6e1e5b1c392d7a261444b73222a5ebbb1eb264dbabe4bf78498c1dbdc76680f1385ddcfbefcfc008504486d60b961d706996056c582b01e114cf11adae39b8f1322391549e48d68854270127eee2873bc0cd162b33e7a60e890ae2761e1892a77515898ae9a9df3c0013c8b925638b753dae5c7518e53487df8c9dc54638bac2e7c4c6a5bafd0ca6ad6c72885895f3c50e88e75c1f4bae0cde82c54fcd97165fa3357aa1935286d96d629df9a7f8784a409a26d069ae5dc2b62bf462722e6a7b78b3f6a73c90f563baa70112a96416ed6466282e0ea3eaf39286b13292d8deec380a7a9faa32069804d0592dee9e1c87c02d084b4b8bd643fab5011557e3ab7514fbd6434bfe1dfb1037b26f326f17823bb829306390a4d854c919b817c96db69ce753545b0ebe4a81597765dab2d4da96740849b7084ae88e424c3d63386e6c123e1f5dac91a64cc2652b6dbc5c93df3839298c39cabb68ac960195938f76abf7fee64fbf60fd64e1f642e5a1734a70864176322ff354123df9e5496024a7d3c41ca26a01049b7df3ae64bc34471c5440b139d7a26c7ff1491629046877e26ca1a14867d818fa3062f822cef199bf55e6392c44327c9c22d90f6cac297d349995ff1da033359e27be4fb9a073f54328f89504ca765c3e34a9fa59a7847e37b3187b7098240487d70b0be26bc65640b2a85052e79a3f0a35be90176170e1a8f7c9f6dbd168f1a46441de9ed77918ce80d0c0fc95043f6c6a074589bfbc46687496f5adaa829a8b72225a47045f1e943723a669d570a911377d2dd754cf2a7404e76629af03663ef38121a05aa5f7896f74f298fcdace63b4e21f6015e8662902fd945562b9b4f0cfac63c8233a7f4b945e5cda92337fd846f0ffb40a4b216582cd623d6502f0fca556c4d0f1df7e941069c989fa9602e6af4c055b13f6ed394e77d105d72078f5d4194a3d17e6efb2a339b7cc7b4e7e27843a446e40e78341356a6fc315ed11b99c35a2c89210b5f27247f175368667bd7db35b14ffd92eb82aedbf3bbec88203eba01b83b13c7744463c00d890e3d210655ad15aaf02ddb6e3e722f1e639211877975b89be59e82be992f0c6447fc6b45b8f36401106e3944733c7673926f9a3271109583224d233ccdabe23bb4d6c8e1ef9d48dd9dc3d0acd419e45130776421507d65bc5f2ecb23431f0b1743bd9aa38a98237f73e516c9d6a4b35e4fbf7c973ec958e938500e965bb26c4b9f25e8c4599c61be0eda835e77bb1b036a0f2ca59a068648ebc20fbfbf7d5acf46e4dd88be8a302332a4eeba74e8827358b3d4fa9157873186f8acc7287a15d3fa2dce0a16b1ae0d0a65c9baaa120078cdb4be2087a7c2910b431f3c776e1a2f2084223f6961beb29b7b788b68fea5b763b21e5b12c18184947f582f8dc2697dd2b48744c01c91fec281fe3e6e78467b0a8de03735e7ca04c49c2339c1c13662363d544f2870407b33b8e81c0e9b091f97a1ded73aa49d7b3074a0b8ddc3892dd95642d4c226bb0dcb15c854c484b5648bfd5449a29db3f542f1df0b21d9485e05311ab00a51f37cba79be47c2a0dc11966e03eeb16475ab0100cd23d5e67e13a246862d0b976544adaed747f5a68d146547ed1aea0e0ca7afe81df598de48620dfb22a478777bc33b93125e3612085af5bac4059ad88fda72bb3bd609ae7850104eef231c8758e5c7e998cc906dd0417f392ac8d04343e1b4ff1f0f9067bb23a0cb392d3082f86753219b4c12ab347a4e305e77abb660ccba74cc7f28018e4f27821d132b6882b0e368144facae2fdb755201d8d973ee106dbdbc21d9db3ffb52fcf623eb7ccbc87d08af79d0ce02854351c7279944f9617682e00c9b15ee61761389ba0cfbf49b0e1bf74f94c18f75a60994fce68a61ced54f6a2c24c20db391bd03b9e6b848a4132e501d7d50f7abe026b89425c2fdd91b4d284766cf15241df1b3bce2256586193a5530604c5a00733c78f73da12a9781d0eb94f3d7e231eb3e29cca822db9a7b8094f21f8d3f88e9621c8311ee33dae1f6c6656d31295c08905e5eadce4803cf9975128abd0cc80f9cd62dec65609135c68fe47f0cb96f7767fd845531f142bc385d86caab7b2532dd60d333b6dbd43962e15ab97d7a8b5f2bb90cf1dbd9a361a92f3167ba74d702fc8cae6aa2aa09b9902f4cb9b2821a09436c188a8770e87637685633da440db0112d8ddbae1dd71b9c4526d7faed331965813099580794ecff1e48fb30dd5213947e9c8b9e70890a664b7511fe4f522a3d4e650988892450c38dc8946b3d184171e43991a0bd0d30365821eeb3c33de94465e104763e2191f36936e26fdebcc5ecc8ee517f90a5f", 0x1000}, {&(0x7f00000022c0)="303e96a3366b6113b2df8aee5bd4a25a019b94c6e3f4f77dc5a6c281e9c4a8bb6db57db44ba042226e5055aee54a03e89063", 0x32}, {&(0x7f0000002300)="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", 0xfb}, {&(0x7f0000002400)="3cb6b729847e9d2ee663b7cf7a5482b5d60b16dc9613528a9828369cd2da752f943db778cf782efe94bef1ba2025d7d3", 0x30}, {&(0x7f0000002440)="1113b1a6e0c6521bfcc3d63a49bf6fb3ce893c78e8a6c0e3db12e58961de1009471df222d9585f5d3c009e5eca81a21fc200c0e9654ce287336dbdc53f96b6940b8517e5d11156e352c01a4491430d229cc6214eca85ed3da0191c54c97d4572c74df08d0bd966b38ead5e0cf5082f160df124caf1808f4206b5f9aa54bd308204490af59e01f2e4a632931f7d216a132c5717dc43484c65b068823dd14627c10f105574d92c4a3c2cafb352a22d4e94eec22645adf14f50d771b8633e5795d7b60bc804ea41847b2e00ac5af3", 0xcd}, {&(0x7f0000002540)="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", 0xff}, {&(0x7f0000002640)="9a4193586253d1a93ef2c4f34f605cf22e8787bb63031ce0e27f5d1a0ad8bc099aa95dcb902699900aad67bb872f4502650eb64a", 0x34}, {&(0x7f0000002680)="e71545621b35bbcf4783aa7a60abe0c6f3de32887f6a03533421ea77db98517a68e7a991a44b893653da08788a85c03e20ef2b50c1735b6e0d95d9c3dfa03dfc0c60bfc0a671e3cd360c5470493b07d49463f15f9cf81d1174298cfcd2ffbbbc99", 0x61}], 0x8, 0x0, 0x0, 0x20004005}, {&(0x7f0000002780)=@in={0x2, 0x4e23, @empty}, 0x10, &(0x7f0000002b00)=[{&(0x7f00000027c0)="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", 0xff}, {&(0x7f00000028c0)="ae56a397c4cf6ae4a5dee9057c61ebce70e2304b552408a7ad15fcf5e60675404b9dc93a9ec27fa29430bac1d7a28617", 0x30}, {&(0x7f0000002900)="11712c7d35344b70d9c9df8bb8425c1fa74f824a9a925e5d946454703bdd5295bcd3161e988fa914407f3d0b4e41ed63849f5269a434b135becc923c97e9c885c42c008a1ccc01c5a48d0c41f6e8ae3a432b70f86b093e6e9c8a274d2e98369c4b105e04047682ff04404a3a7af04add384d2d2061d9dfc74d52ae841f6512c57dcedb53fb8bb0f8528311c9176594b3c23b5d6b5dab9327e0a5bc61098cda1836b5de1b822bd03dcf6b0af01f52e0945b7c14859226b38a59b9717aa1c3d6801138ad7715b5", 0xc6}, {&(0x7f0000002a00)="d947400edf7f873af475fe30d0865aad72b210325cff1717f233dd00be68be8a43796e4c8e3189a22e225b15fc1d5e37fcba9ad931ab3ac258af37a92e9103ba7d943b7a72c7229c2a5fa8278ff5fb96af84132bfe5a48f4cee4fc7119f6af8c94a399ebb1bea9fce625e7a84c38dcab29a209d2ed708d618095b01a7b378f158bd202b43ab1d57110f01be64bab2155186014c349af8534881ef563f7da651cf01aa6ea7becb8a3c95a905d07024d2d0e2ff23e738479e9d7eb71499a1c650456d7144dda7941ccf9864e216d5b851966efafe7ca2b198fdb256fe9d2813c2f9d7b0845b6679168aca64a6395", 0xed}], 0x4, &(0x7f0000002b40)=[@sndinfo={0x20, 0x84, 0x2, {0x9, 0x8, 0x3, 0x101}}], 0x20, 0xc080}, {&(0x7f0000002b80)=@in={0x2, 0x4e24, @broadcast}, 0x10, &(0x7f00000030c0)=[{&(0x7f0000002bc0)="838f0b84b0300f50f7f4836f67934d86ebc5b4f2cedf3c9d943faaf709bfc04be8dbd8df94064c7a1ffa8319d091a3ca295d613361487f28b6f8b7a76f86f3b4c281a2f10cc439c9a15003fc2cee7f720acee10aff21eecd94bd482ec2b29ee2546fb7ab2b24ff37454a36f867b712eabe4901c3479d8e264f32bb84ea35a31956206856d4b6d2b888c2556eca70615683", 0x91}, {&(0x7f0000002c80)="8cb9e7f320071c42cd6a1a7e342bd609193c4190a6fbcfda3197926efe165f3d6ecc83a31b2333001325a7e59895056e44ffd3907828401ec656eaaaa07b53b2a1c6b1abc1e695301622ebbb1585502825b567a484b0c75f0516b8b949db376e12dac6003b514af66333a026930a5a591e86081523c8b202aa3adf7a1e5da7413a8f4c927bc83152db71836cd9cc590f6ee264cec447ca03b07a39610ebe5bea18417e622f802871", 0xa8}, {&(0x7f0000002d40)="b1a9a9e49b27d647aff93d52641921972511c199bae43fa23a880a0e8d3fa55ccb003b578338217c03c9b21c802a7d4d7814ffaa7a03db5ba966d64ef075fbf38c5c866c9eeda746b6b5442d51346e49cf18b0685d25b9b344d27e72e2026d0a4c0742e60c8eb2a0903f58e3c76c7074ec6ca4b83889afec5b0cdd8be465049947a9b0ecd14d5ee76aeec6448919743a6a2e471a3af663f53788528d5d0ee1fdd5258d34f67cfc560fb2c333c23f46152a2f9aff3aff1126b13ea016ccb6dc2a0594c21d04679929e86d97d7635d52e387", 0xd1}, {&(0x7f0000002e40)="e93444f5f2e8a504e19f2643253085ee0feee0d9af27a79e09031d97bee0c9a4e156b1", 0x23}, {&(0x7f0000002e80)="d5fa31374b5e03d400035b5d1cf21fb4d4604a4800464758408c0d38df4d7b3b1a42d0e28ab31ab41d464aebf38f992e0b7a75208c2c4890b42d256375bf104274a9253feac83553ecdf3f8050567aa3eaef1e8219c51de9beb9cde66dcffdae6ceb9cd827230b51baa274215e825594d67a9ed082e0141ae94ce62e7c80354e8886a57a0b53c85c2450e45c89e731a642d6f29b77ee5890ab73346edc84369caa4a2fbebd8d908a969eeff1c91c7df9ddc157ce6f3780123635c0af64ef7616cf06012d59c5495506a3187641a2cd", 0xcf}, {&(0x7f0000002f80)="4763484b281cf4ff8bd0eb3c440ba198ea8904377b1df72e68e808d46d1a28c3cb388ad0e4a083388fd5a08b9b95bdd7b42cefd9ad4430f2ca96be5513e69735ff47ef05a7de0c6e1536231d2e71fecbc37ee926d952b29aaa9341f57143ed1dec0bc205d1785c5f80d937850b61605d55e7a4f90514eac49c08c7", 0x7b}, {&(0x7f0000003000)="0c775a9f794cd7f4afd7f781ffb286facc5be13654ca6fc6ce5ae1a32d1cc93a01d005be704c35cdea7586b4c4990a5fa364ba432c4de150716d8507aa8049e76a09b123c78367c8079f53c0b8324d08f4334ced8e044bde", 0x58}, {&(0x7f0000003080)}], 0x8, 0x0, 0x0, 0x800}, {&(0x7f0000003140)=@in6={0xa, 0x4e24, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x1c, &(0x7f00000032c0)=[{&(0x7f0000003180)="31ed0e3f2dc8639daeaa37f1e14bfd8ff5d808c54deab8562b0b4f2ab15ec36f66c3383125cbde405cc0a885d1ac3560f671d479b48c2caf3e5ec97f16fb41190847436bf2db", 0x46}, {&(0x7f0000003200)="b4fc64ebdc71f59a69fc10d6af600b8bc54862281561711899759bcfef8833dd1648cfbd134ee73557676b4d61b3e6adb2006961737e62d9cfb9cb1b4d96fd1359523eafa5fd7c20d7f70b3414731e665a5b16a4e27d9c23b052db92c0f1a957e37cd1b390728a015213356079445dc716d91984467075de957e97d0fac7bac2bd908f499cebfdd754a84620a31633d637f713b6", 0x94}], 0x2, &(0x7f0000003300)=[@dstaddrv6={0x20, 0x84, 0x8, @dev={0xfe, 0x80, '\x00', 0x44}}, @dstaddrv4={0x18, 0x84, 0x7, @local}, @dstaddrv6={0x20, 0x84, 0x8, @private2}], 0x58}, {&(0x7f0000003380)=@in={0x2, 0x4e22, @multicast2}, 0x10, &(0x7f0000004400)=[{&(0x7f00000033c0)="b7559f107dc46aa2563df39cb7af9544f181298d583a5620a14c3c342a6feff2d5557ee96eeb54fafc622723eee75b393a82005441e4b6722ca69529187ba2c50d64caad70c08a6e0eeb5be2337d8a1ba12f43c834279a118e6987e1c2eca5162c5e32eb2d4ddc8f0fc7dd84d7c3f64e06d9130848e33287b98ff641eded4e7c6a8ab596504c2ca60ac18361d9a3a9e4ab8e52859faba55b2c450d415831a18f65261e958e0957eed64afd6fd4b662ed450169dc759544035db1940e98fe4fbf28742f0029407589c85a1a9f983e4a13cf35ea2fc2e8c3f1862b9fc71f559c2da293d84a0a302172bd64796e5eeb74ed41776c2545f3f6e1c9d5691cd9bc365a4429314ebd94863e489795e71bc03c6dadc007c2d8012c32a9f591b354e9fd9d3824cd161c5d86351debad18e9bca96abdd1d41cf1fb9095edf026d0c8fbd658a5fa46c52cfd247a6b6e6a08790daa72bea4d73c4eb6f2787d4e182445d12c355293108fc5c41d721a54b672991817b066560f90af9cb3a0c740eca9621720b7f78cabc03da8d9a45c3343836d9c2cad45eaa1b0d7695473ea75b35e1f48375de00f7a2ef795450f583d1cbda264bc67d8c84e34f6ff21f0647219edf70893793515be7c2b5ccb9b6ac9fff5c27fac02bf91d5a27f8c194543937568369652a4660de5902d3f099ae99160b43b3ebcf689b937bbc7a654d1c599f73a6008435869132afc97cff449f5fe36e26037844c345dae78be32731cbcdf688faed683fafd3c09a3aed5d880dbf01534c987c034944cdb32c9c84c90cde81c7cc49cfd50d123a67bdd05d9f179560649fcc39d9ccfb08b8d6b1ad44e8a4bdfabfbff5062c75db55401b95949b570ead0d3da151db67c2169c91ce4bebf5789e1e1880bec05e53f7d7c0497b002ef64db91be515b39f7e0eda5f41a054bf15c5cfe106239111097117161d8635f4657e7dca964d98d24d7ae5692a7d478e01edea9477be8c50ab47c82d38e30b842f6f1b0ee569a53491d06605ee4842a610bede211fb168c742825efab322406c6f54e0bdf7afd33b893853bd29b36e0f7d3b8e5dccd221ca74ec5c41e952a1cc308cbf0c3f68859d3f0a091dcd352fa890dcee1b0f7acc0645ed7b833bc3b76d77e00cef9e95230e86ccc8c71c75fac7ab7358a65b563c76d96e563eb3b09f446567a6738893fc83d49ec6ed4e7a2c7e272e005321de1c501fe4821f2581ce52032fb6c386cfd22cf208d562dec033e47243eb9d0784e4283923dc64f5102a96c6f729d8bf2c8beda0230780d9a85a128bf2cd66717f7567fbd0deac96e8674b6fad66aa98320dee84ce5c863d956b1786a9db808deb76d9db49d727405c1282f52b7f6c0f7e13ed59b631936735671a5eb5908d1a54d26fe095bae390240b76ee4798a0ebe40002d25ff8f431f1d99ba251497423d5b0dade78b1a80e1f473fcb4751da244a6ea6bdc45c5e50ef99c35b000d3843c2b9d18501bfc5d773d1cfa7fcf4d8db2b63e9607de63d278ffcfec3fb497209d4f601679990c960bb0f00c2ef273475c3e1dff285d8cb7bd00a2eb80b683aa91f253f33ae1bb631ddda0fdc5d318897e523f7379bc7a940f14fc4db0e0d2ef336a3a2c72ce632eaec7f3547cedc57a050c9a1db65c0613df1eeac5e8330e9bdbc4eb6556e03652fe13dba871bbf07303e6a7e10c2927be18f9d15461f5d6bb0b4a7e943d4d9e21ac8fc69c483d78cd2595338e067db95732c419b210343f01adfdc77e531868b0e67645d5807c185a2dde4506ebae4fc93f4d3214cbe28aec48d050973f966067a77e63f1a101befb1cca7fe45c3e1dc1545ad491db5ebc988a0ab19ee75e185415c73b932761ee2a1e8f75ba1fb079e1e2a19e27e762e049a33e2b66bcf68a96f67fc5c53a4b94111ed008f39bb46ca8cceca8c4c514cf416a79e66bc5ec7b21e1d9c4aab6707a7933ebc64393ccbd8eb51867adcca6830f353fb69d4a32f037d085ec7a4e7ed9bb426453a7f8ff402a8d5a41ab8a06537adecd7a30031947411cd4654140506c98daa4023551c4b41ef4c6f54e8876ed0d55c9e8a5292e1b7fdbfd190450cd2e42b92e1a9e22937b8a25ebd6eada020ef01b6819c6cccdcd0a59dc308925aebf32c96cd8c9afcc250235889f040257e42f51835e0213d678be50b4032dea358c0d0d27b99d7d07f93abd59f7cd8e59099db389683382ceb222837d8a2748d11fb47ac9df4d0200948caa866c26ec30339478448e7e15ceea7c21991082a071719f8aa46c51654b3aa9b39039ead9d28dd26c2b7eef7fb5354e9c3fe95d39e2b614e755e5c2b18ad28a1b7d0f74ab8af5b6a5d003165f902934ccd113e67d1a3436c673d6bd7bae0469369f712b2fe59f770ba27acd4005954bdb7e67709efd4eafb9fbcca38d8fd00541bfbfe5f8c4fafe8a2d973c160d28d2fb95c3bb21a1006c5f943c6162a4c32a94d74bc9e522bd61adf45a8d6d85c22952184052d8a07c13fdb585cf22d2e1ad2944a219bd34499bf6b5d12ea9e51e2415113010c0f2cae816f9646b2b3b9591b722086423c0f197588bbcf7eb1c29a6c984f53f0b06272f32e6176fb13b26e4e69c309a5b88d3ccb1414732656ab17b02ef5ceca3058a6072bd4b7a2d659829c954aedb652a5eba6fda3babe7c6b3e1281682dbec98cdaa9dec10da2d9c778aa870d1c4bbf67a411e98f3cc21c9dee751561036d69ab413461a8b23c6d9710bd66af9fa485e63d874f2d992b30644fbe8fc64ac77c4f7be4814961582acad613883422c856d3eb9299f67918f09b1b2de066a7656723d2de951712b08d39cdeeb62439062a5b035ac1632879352db93b080529a48bfdeffc5019b538cadaf508494c4ca592b1b5ae077e588e96a13fd818e86e36a29cc243ff8ea23f35e0413ea0b5fb987ae0020b1fe9f8d9a47bb718ed02659325103aac5722ade8b66a74e919f6fd04219f742974cace33d7f4680c1172655491aba9d38890bf6fe8b6de703a1f35e438735dce3d1c05f51a623e8decc819810f1386be12978b8b2e100713b20e41135f6358033052092a9dfbffa0832981996daaaf40afde5f6cdb555886ebe7dfd66092e2c58d599a1f1b05593a5e6ec996cbafded7ce0433fddeeaff78b22e73e7e059664e9c60315cab7fa4aa121e17c0e3b82260e0e61181b6294cc30ee7a15004b29e2feed67d0bc320768b0fe49c0ab96db77a982d3ae3698bb123322ac8280e736e9a23fcedb5822f98bcfeb0462c8a7dbd456ad1a7318ba6f55bc41747fa765275751d73401301b31ffa8aec6815a871a60b5ee6001315d724f48da9a0b7befb3b19e20ff98634d90f966d2f24870be2df4f81d1bcfb51e2c70c46331e38992b5b1520ab7b5dc1db082f833b2b3510e6f4cd5473cec9ae737da0ae631a459018890f69d2063d5db88c9f6315ff0185c2568674a75d2cdcfc4a59738cdf3a169a75b3652304b617f315877cbaa2103f169a1eaa350c70689da1ee753c151c4cb746cc8b88c2b0591cfd80e0efdd3d74caf3451faa131b24141a3bb72e59c72897ca0bf02db82e1fa49e523412551afb55f70fd8a102ea92d3dddd2a9f9911f0e6e5069821487b47a93a40e98cf244677a67efd395550880684310f121789d007600573bd3eaa7dc96c4e5b27b7caf2e49211a8c3023dd4ccf91c62ec3f29270bbdc776e776f3530df122d09b74e2cb59ef79b339738b45139e148d2a9c4b748b190e6bdea60439c91baefe4b469b0d55b7f5a93d2daa14e0309a8e58ec3961512f214a75d5d6335558c6ab314064f65dac4e02217cabca7c291a696501a1090f9fbdb4142eb251144f85bdbd8d170d5c06e0e541492fd6ce6634fa6b2aeea838ce4d72aa03a16d2a72b8eb69ecd242fc36569541703e0d05020bf8f31f32c90ccde239728c4b11713c4ad6538c7b771d7e879ea4f8a8383782b8a4a13e8b5adde1b745962b02defec0e3c3bf43664c1cfceb31adc1f27564721fc6f6d74d29dddc9045014e1f0883502553f08e26c5522d6f13d5d55a0c11969c3cd63cb8161bc791fe0f93bf6fdb35aa1babadeabf0382664a4a96ac8b0f1f25457d1df4ca014391b98115ccae3f9f6dff928d64f34f5f6fbb8651bebea91ed8ef72caed0035ac09ccde3e5ec645e0d94955d947c17cb1e40faa760734a5a5a1a1453dbb54a90e4a6e01b9e0f95a7590ec5bae7160370397dbd0e3e4d07d8414e9eea116aac30d59ea9df7254c86515f68ac1f7bfd1884a494af979e89a5057c9f1d0e46d4cb8d2df4b5a4461a96cef93c58e3378fef75352dae445a1bd617d482a4462ee51e79b4d9cef059276a90fa844ec2427dc47ecc5b965d328cb91da83685110731c088c5a3bdd9c684453d812dc3caae9ad8112e8ae73301614a260c98398d01b041f2ec71ee57b75456f7b9dd6127eb6d758cc41b0f3e3decadb90853143dccf82e53ece85fd24a261fb32ebd14a1646c708041cb0ed29dd33270ae7f171c5d6c5455d22df931ce882bf77affa63dbcd2934654cccf1c132bc06242c5887e01527e4427cb859eca1426c8763c152808154323c184e18dfff3976e03bb89a722fc7a456f7581d51dadec2b8360308aae6c61b8b79718480b067d21dfb755e680cd2c39cf196a86caf4e16cb0aedf8105a380198f4e70616ec243b0385e3dfaed462ead29495b60956e6b5bd4920fbb548aecff5ef622fec6288e9f8a65ae3d6b7a4b11f1765e38cb5cfe7108122357540467171e0614fce7cc875036744df693bb68ba4ba0163244729d94fc5f24b4041e2ec99091699790efd70f9b5b1ced81c94f2dd25b47111d3bad907dc7967b89e8f519859aaa5248af993e79249562ca424900c643192dda202458c49f0e3de1b099c368a802543edf1ec734503c5e54d89a2445645f8e8bef606a7ded72723d04d5e58e7261322ad9344b0df35a0af20a58d5dc4399ae3c3e93056e9548ee9b725cea00f6c73f94c6ccc41bf62a1d8ae3186a8596d6770e50e6566a34919da8fd7e10497a8f71bb7099820df6eb9bd6afb1cb889108505ac938d49d940daf5b244ac588fa2c403113f37f45c3332665189845e9fbed484b4d79ed0737842a3a83ffefa5a10dfcc171627b112521692c1f91950bd4ab5a167e9a808d8e58848583309de8fae4704d1a897216a1a6529a2398e3a25f82c3bffa7fd193ea1d5f6b46481b8868b9799ed65856c702d89eac4971bbbd437471d68dec1a6b3dee43fca353778aad761b8f254730f0fd2c10ed23a2863457ffb9a895d7d8a5967828ccca645f4054a39d7b39a868be922a3f6b6c58c2ceed44ac58498c62082295be77638b9aa0ea1636816eaf418585b1a65aefc72f17fa2796c8bfbe47c4c134e7f01e296d3654b2e9a2cfb2281bf3b392f02641a6dcce195985e13910bf231ef4b01ad2734f6a1f0744f2373b8f263b2facd56ab93b09cf4aee1d3f76e0754de192c6d04fdd0243f94ec86e58a45d1d05f766bdcf080f27d8f0a2dd1229f1a7260cac3921e37c35191d5a2ed3dfca8945cbb3305ae6445b7adfb9765e04265cfadd8622f6dac55e48eb4d9a0936422788dab6573a92e6a085d69c486169eb5a2ca314608fc1d13f5c3d5dde228fb83482ff655d9f17a1e0ba8e2cb9438f15b2302f1cec33189eef90a880a47234c284faf11bf736bb8766c0d828c92630540db3276186de5d783f8c5bf18806869e846000c06351ddba18f157a5c673e093c29356f4b330d71a4e6576e787f298012088c08b436ed296e3", 0x1000}, {&(0x7f00000043c0)='90', 0x2}], 0x2, 0x0, 0x0, 0x4}], 0x6, 0x80d0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_int(r1, 0x6, 0x7, &(0x7f0000000080)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000045c0)={0x0, 0x4, 0x7ff, 0x6, 0x5, 0x2, 0xdbf, 0x2, {0x0, @in={{0x2, 0x4e23, @multicast2}}, 0x0, 0x6, 0x7fffffff, 0x3, 0x9}}, &(0x7f0000003080)=0xb0) (async) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000004680)={r0, 0x8}, 0x8) (async) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000004440)=[{&(0x7f0000000000)=@in={0x2, 0x4e22, @empty}, 0x10, &(0x7f0000000040)=[{&(0x7f0000000100)="3aec5a420a46e31231af3678ca0aa555aa55441bb0c1eb8f79aff7e5c2cb92f9fca1b1f81cbe100dfba0be035ca9b31066ab8670eedd44889f01fc2217f25f69ba08efa6491340686f79bb298a80e551de8c3caa819043bda14acda11ca79b8bf6060bfd6e3dac5e05c3f333170ca451163723f498a0c470428ecfb7f3003523f8caf302a8ad3238d34127e09a7467d60a46294620688430874bcf8b1ca155fa6c7f26a0f6ca7ae2a6ff4c501ea7065bdb63ddd52da76b2354", 0xb9}, {&(0x7f00000001c0)="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", 0x1000}], 0x2, &(0x7f00000011c0)=ANY=[@ANYBLOB="1800000000000000840000000000000000012000dfe694c800bbf1903700000084a5710008000000fe8000000000000000000000000000aa180071d6cf6400008400000006000000008000000000000018000000000000008400000000000000050000040101060020000000000000008400000008000000fc02000000000000000000000000000018000000000000008455e5b3795149341fd98d3600000000"], 0xa0, 0xc890}, {&(0x7f0000001280)=@in6={0xa, 0x4e23, 0x1, @mcast2, 0xff}, 0x1c, &(0x7f0000002700)=[{&(0x7f00000012c0)="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", 0x1000}, {&(0x7f00000022c0)="303e96a3366b6113b2df8aee5bd4a25a019b94c6e3f4f77dc5a6c281e9c4a8bb6db57db44ba042226e5055aee54a03e89063", 0x32}, {&(0x7f0000002300)="a1c8f1fb3237949148cbd5af8f8d0af0e85b9e1c551ba1e300d1e759afc111ea75482e78261e9a12ada2de665031d89106571d95aaf7a07775bb1176cc1d86036232153d581b65c5ead8f28efe00a9525f21f9935c38861f3525ccfaa99f3f153340c3c5bce6925e7954708cdff0df4c8e93e6e10c41560f8b6d857c21c753b6377ed2cf70a24c209a97e364a798ff4d420a79a050e4f63f12ea5e81331d9c4b42c0627d8f798e6d20ce557a3d466900547a5cfb66d793a15efb028efe149069fb07c0f360de7b4b4720ff45cd0c154d05fa6d5da460a9ec1f20997f4835f103cfba2f7c58fb7743517765a72276cee1b32f95e94a3104b3cec67f", 0xfb}, {&(0x7f0000002400)="3cb6b729847e9d2ee663b7cf7a5482b5d60b16dc9613528a9828369cd2da752f943db778cf782efe94bef1ba2025d7d3", 0x30}, {&(0x7f0000002440)="1113b1a6e0c6521bfcc3d63a49bf6fb3ce893c78e8a6c0e3db12e58961de1009471df222d9585f5d3c009e5eca81a21fc200c0e9654ce287336dbdc53f96b6940b8517e5d11156e352c01a4491430d229cc6214eca85ed3da0191c54c97d4572c74df08d0bd966b38ead5e0cf5082f160df124caf1808f4206b5f9aa54bd308204490af59e01f2e4a632931f7d216a132c5717dc43484c65b068823dd14627c10f105574d92c4a3c2cafb352a22d4e94eec22645adf14f50d771b8633e5795d7b60bc804ea41847b2e00ac5af3", 0xcd}, {&(0x7f0000002540)="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", 0xff}, {&(0x7f0000002640)="9a4193586253d1a93ef2c4f34f605cf22e8787bb63031ce0e27f5d1a0ad8bc099aa95dcb902699900aad67bb872f4502650eb64a", 0x34}, {&(0x7f0000002680)="e71545621b35bbcf4783aa7a60abe0c6f3de32887f6a03533421ea77db98517a68e7a991a44b893653da08788a85c03e20ef2b50c1735b6e0d95d9c3dfa03dfc0c60bfc0a671e3cd360c5470493b07d49463f15f9cf81d1174298cfcd2ffbbbc99", 0x61}], 0x8, 0x0, 0x0, 0x20004005}, {&(0x7f0000002780)=@in={0x2, 0x4e23, @empty}, 0x10, &(0x7f0000002b00)=[{&(0x7f00000027c0)="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", 0xff}, {&(0x7f00000028c0)="ae56a397c4cf6ae4a5dee9057c61ebce70e2304b552408a7ad15fcf5e60675404b9dc93a9ec27fa29430bac1d7a28617", 0x30}, {&(0x7f0000002900)="11712c7d35344b70d9c9df8bb8425c1fa74f824a9a925e5d946454703bdd5295bcd3161e988fa914407f3d0b4e41ed63849f5269a434b135becc923c97e9c885c42c008a1ccc01c5a48d0c41f6e8ae3a432b70f86b093e6e9c8a274d2e98369c4b105e04047682ff04404a3a7af04add384d2d2061d9dfc74d52ae841f6512c57dcedb53fb8bb0f8528311c9176594b3c23b5d6b5dab9327e0a5bc61098cda1836b5de1b822bd03dcf6b0af01f52e0945b7c14859226b38a59b9717aa1c3d6801138ad7715b5", 0xc6}, {&(0x7f0000002a00)="d947400edf7f873af475fe30d0865aad72b210325cff1717f233dd00be68be8a43796e4c8e3189a22e225b15fc1d5e37fcba9ad931ab3ac258af37a92e9103ba7d943b7a72c7229c2a5fa8278ff5fb96af84132bfe5a48f4cee4fc7119f6af8c94a399ebb1bea9fce625e7a84c38dcab29a209d2ed708d618095b01a7b378f158bd202b43ab1d57110f01be64bab2155186014c349af8534881ef563f7da651cf01aa6ea7becb8a3c95a905d07024d2d0e2ff23e738479e9d7eb71499a1c650456d7144dda7941ccf9864e216d5b851966efafe7ca2b198fdb256fe9d2813c2f9d7b0845b6679168aca64a6395", 0xed}], 0x4, &(0x7f0000002b40)=[@sndinfo={0x20, 0x84, 0x2, {0x9, 0x8, 0x3, 0x101}}], 0x20, 0xc080}, {&(0x7f0000002b80)=@in={0x2, 0x4e24, @broadcast}, 0x10, &(0x7f00000030c0)=[{&(0x7f0000002bc0)="838f0b84b0300f50f7f4836f67934d86ebc5b4f2cedf3c9d943faaf709bfc04be8dbd8df94064c7a1ffa8319d091a3ca295d613361487f28b6f8b7a76f86f3b4c281a2f10cc439c9a15003fc2cee7f720acee10aff21eecd94bd482ec2b29ee2546fb7ab2b24ff37454a36f867b712eabe4901c3479d8e264f32bb84ea35a31956206856d4b6d2b888c2556eca70615683", 0x91}, {&(0x7f0000002c80)="8cb9e7f320071c42cd6a1a7e342bd609193c4190a6fbcfda3197926efe165f3d6ecc83a31b2333001325a7e59895056e44ffd3907828401ec656eaaaa07b53b2a1c6b1abc1e695301622ebbb1585502825b567a484b0c75f0516b8b949db376e12dac6003b514af66333a026930a5a591e86081523c8b202aa3adf7a1e5da7413a8f4c927bc83152db71836cd9cc590f6ee264cec447ca03b07a39610ebe5bea18417e622f802871", 0xa8}, {&(0x7f0000002d40)="b1a9a9e49b27d647aff93d52641921972511c199bae43fa23a880a0e8d3fa55ccb003b578338217c03c9b21c802a7d4d7814ffaa7a03db5ba966d64ef075fbf38c5c866c9eeda746b6b5442d51346e49cf18b0685d25b9b344d27e72e2026d0a4c0742e60c8eb2a0903f58e3c76c7074ec6ca4b83889afec5b0cdd8be465049947a9b0ecd14d5ee76aeec6448919743a6a2e471a3af663f53788528d5d0ee1fdd5258d34f67cfc560fb2c333c23f46152a2f9aff3aff1126b13ea016ccb6dc2a0594c21d04679929e86d97d7635d52e387", 0xd1}, {&(0x7f0000002e40)="e93444f5f2e8a504e19f2643253085ee0feee0d9af27a79e09031d97bee0c9a4e156b1", 0x23}, {&(0x7f0000002e80)="d5fa31374b5e03d400035b5d1cf21fb4d4604a4800464758408c0d38df4d7b3b1a42d0e28ab31ab41d464aebf38f992e0b7a75208c2c4890b42d256375bf104274a9253feac83553ecdf3f8050567aa3eaef1e8219c51de9beb9cde66dcffdae6ceb9cd827230b51baa274215e825594d67a9ed082e0141ae94ce62e7c80354e8886a57a0b53c85c2450e45c89e731a642d6f29b77ee5890ab73346edc84369caa4a2fbebd8d908a969eeff1c91c7df9ddc157ce6f3780123635c0af64ef7616cf06012d59c5495506a3187641a2cd", 0xcf}, {&(0x7f0000002f80)="4763484b281cf4ff8bd0eb3c440ba198ea8904377b1df72e68e808d46d1a28c3cb388ad0e4a083388fd5a08b9b95bdd7b42cefd9ad4430f2ca96be5513e69735ff47ef05a7de0c6e1536231d2e71fecbc37ee926d952b29aaa9341f57143ed1dec0bc205d1785c5f80d937850b61605d55e7a4f90514eac49c08c7", 0x7b}, {&(0x7f0000003000)="0c775a9f794cd7f4afd7f781ffb286facc5be13654ca6fc6ce5ae1a32d1cc93a01d005be704c35cdea7586b4c4990a5fa364ba432c4de150716d8507aa8049e76a09b123c78367c8079f53c0b8324d08f4334ced8e044bde", 0x58}, {&(0x7f0000003080)}], 0x8, 0x0, 0x0, 0x800}, {&(0x7f0000003140)=@in6={0xa, 0x4e24, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x1c, &(0x7f00000032c0)=[{&(0x7f0000003180)="31ed0e3f2dc8639daeaa37f1e14bfd8ff5d808c54deab8562b0b4f2ab15ec36f66c3383125cbde405cc0a885d1ac3560f671d479b48c2caf3e5ec97f16fb41190847436bf2db", 0x46}, {&(0x7f0000003200)="b4fc64ebdc71f59a69fc10d6af600b8bc54862281561711899759bcfef8833dd1648cfbd134ee73557676b4d61b3e6adb2006961737e62d9cfb9cb1b4d96fd1359523eafa5fd7c20d7f70b3414731e665a5b16a4e27d9c23b052db92c0f1a957e37cd1b390728a015213356079445dc716d91984467075de957e97d0fac7bac2bd908f499cebfdd754a84620a31633d637f713b6", 0x94}], 0x2, &(0x7f0000003300)=[@dstaddrv6={0x20, 0x84, 0x8, @dev={0xfe, 0x80, '\x00', 0x44}}, @dstaddrv4={0x18, 0x84, 0x7, @local}, @dstaddrv6={0x20, 0x84, 0x8, @private2}], 0x58}, {&(0x7f0000003380)=@in={0x2, 0x4e22, @multicast2}, 0x10, &(0x7f0000004400)=[{&(0x7f00000033c0)="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", 0x1000}, {&(0x7f00000043c0)='90', 0x2}], 0x2, 0x0, 0x0, 0x4}], 0x6, 0x80d0) (async) socket$inet6_mptcp(0xa, 0x1, 0x106) (async) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) (async) setsockopt$inet6_tcp_int(r1, 0x6, 0x7, &(0x7f0000000080)=0x1, 0x4) (async) 11:00:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045", 0x1c, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000ffeffffffffffffff00000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) [ 567.825607][T16067] loop1: detected capacity change from 0 to 264192 [ 567.835682][T16067] EXT4-fs error (device loop1): ext4_lookup:1812: inode #2: comm syz-executor.1: deleted inode referenced: 12 11:00:25 executing program 4: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000045c0)={0x0, 0x4, 0x7ff, 0x6, 0x5, 0x2, 0xdbf, 0x2, {0x0, @in={{0x2, 0x4e23, @multicast2}}, 0x0, 0x6, 0x7fffffff, 0x3, 0x9}}, &(0x7f0000003080)=0xb0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000004680)={r0, 0x8}, 0x8) (async) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000004440)=[{&(0x7f0000000000)=@in={0x2, 0x4e22, @empty}, 0x10, &(0x7f0000000040)=[{&(0x7f0000000100)="3aec5a420a46e31231af3678ca0aa555aa55441bb0c1eb8f79aff7e5c2cb92f9fca1b1f81cbe100dfba0be035ca9b31066ab8670eedd44889f01fc2217f25f69ba08efa6491340686f79bb298a80e551de8c3caa819043bda14acda11ca79b8bf6060bfd6e3dac5e05c3f333170ca451163723f498a0c470428ecfb7f3003523f8caf302a8ad3238d34127e09a7467d60a46294620688430874bcf8b1ca155fa6c7f26a0f6ca7ae2a6ff4c501ea7065bdb63ddd52da76b2354", 0xb9}, {&(0x7f00000001c0)="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", 0x1000}], 0x2, &(0x7f00000011c0)=ANY=[@ANYBLOB="1800000000000000840000000000000000012000dfe694c800bbf1903700000084a5710008000000fe8000000000000000000000000000aa180071d6cf6400008400000006000000008000000000000018000000000000008400000000000000050000040101060020000000000000008400000008000000fc02000000000000000000000000000018000000000000008455e5b3795149341fd98d3600000000"], 0xa0, 0xc890}, {&(0x7f0000001280)=@in6={0xa, 0x4e23, 0x1, @mcast2, 0xff}, 0x1c, &(0x7f0000002700)=[{&(0x7f00000012c0)="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", 0x1000}, {&(0x7f00000022c0)="303e96a3366b6113b2df8aee5bd4a25a019b94c6e3f4f77dc5a6c281e9c4a8bb6db57db44ba042226e5055aee54a03e89063", 0x32}, {&(0x7f0000002300)="a1c8f1fb3237949148cbd5af8f8d0af0e85b9e1c551ba1e300d1e759afc111ea75482e78261e9a12ada2de665031d89106571d95aaf7a07775bb1176cc1d86036232153d581b65c5ead8f28efe00a9525f21f9935c38861f3525ccfaa99f3f153340c3c5bce6925e7954708cdff0df4c8e93e6e10c41560f8b6d857c21c753b6377ed2cf70a24c209a97e364a798ff4d420a79a050e4f63f12ea5e81331d9c4b42c0627d8f798e6d20ce557a3d466900547a5cfb66d793a15efb028efe149069fb07c0f360de7b4b4720ff45cd0c154d05fa6d5da460a9ec1f20997f4835f103cfba2f7c58fb7743517765a72276cee1b32f95e94a3104b3cec67f", 0xfb}, {&(0x7f0000002400)="3cb6b729847e9d2ee663b7cf7a5482b5d60b16dc9613528a9828369cd2da752f943db778cf782efe94bef1ba2025d7d3", 0x30}, {&(0x7f0000002440)="1113b1a6e0c6521bfcc3d63a49bf6fb3ce893c78e8a6c0e3db12e58961de1009471df222d9585f5d3c009e5eca81a21fc200c0e9654ce287336dbdc53f96b6940b8517e5d11156e352c01a4491430d229cc6214eca85ed3da0191c54c97d4572c74df08d0bd966b38ead5e0cf5082f160df124caf1808f4206b5f9aa54bd308204490af59e01f2e4a632931f7d216a132c5717dc43484c65b068823dd14627c10f105574d92c4a3c2cafb352a22d4e94eec22645adf14f50d771b8633e5795d7b60bc804ea41847b2e00ac5af3", 0xcd}, {&(0x7f0000002540)="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", 0xff}, {&(0x7f0000002640)="9a4193586253d1a93ef2c4f34f605cf22e8787bb63031ce0e27f5d1a0ad8bc099aa95dcb902699900aad67bb872f4502650eb64a", 0x34}, {&(0x7f0000002680)="e71545621b35bbcf4783aa7a60abe0c6f3de32887f6a03533421ea77db98517a68e7a991a44b893653da08788a85c03e20ef2b50c1735b6e0d95d9c3dfa03dfc0c60bfc0a671e3cd360c5470493b07d49463f15f9cf81d1174298cfcd2ffbbbc99", 0x61}], 0x8, 0x0, 0x0, 0x20004005}, {&(0x7f0000002780)=@in={0x2, 0x4e23, @empty}, 0x10, &(0x7f0000002b00)=[{&(0x7f00000027c0)="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", 0xff}, {&(0x7f00000028c0)="ae56a397c4cf6ae4a5dee9057c61ebce70e2304b552408a7ad15fcf5e60675404b9dc93a9ec27fa29430bac1d7a28617", 0x30}, {&(0x7f0000002900)="11712c7d35344b70d9c9df8bb8425c1fa74f824a9a925e5d946454703bdd5295bcd3161e988fa914407f3d0b4e41ed63849f5269a434b135becc923c97e9c885c42c008a1ccc01c5a48d0c41f6e8ae3a432b70f86b093e6e9c8a274d2e98369c4b105e04047682ff04404a3a7af04add384d2d2061d9dfc74d52ae841f6512c57dcedb53fb8bb0f8528311c9176594b3c23b5d6b5dab9327e0a5bc61098cda1836b5de1b822bd03dcf6b0af01f52e0945b7c14859226b38a59b9717aa1c3d6801138ad7715b5", 0xc6}, {&(0x7f0000002a00)="d947400edf7f873af475fe30d0865aad72b210325cff1717f233dd00be68be8a43796e4c8e3189a22e225b15fc1d5e37fcba9ad931ab3ac258af37a92e9103ba7d943b7a72c7229c2a5fa8278ff5fb96af84132bfe5a48f4cee4fc7119f6af8c94a399ebb1bea9fce625e7a84c38dcab29a209d2ed708d618095b01a7b378f158bd202b43ab1d57110f01be64bab2155186014c349af8534881ef563f7da651cf01aa6ea7becb8a3c95a905d07024d2d0e2ff23e738479e9d7eb71499a1c650456d7144dda7941ccf9864e216d5b851966efafe7ca2b198fdb256fe9d2813c2f9d7b0845b6679168aca64a6395", 0xed}], 0x4, &(0x7f0000002b40)=[@sndinfo={0x20, 0x84, 0x2, {0x9, 0x8, 0x3, 0x101}}], 0x20, 0xc080}, {&(0x7f0000002b80)=@in={0x2, 0x4e24, @broadcast}, 0x10, &(0x7f00000030c0)=[{&(0x7f0000002bc0)="838f0b84b0300f50f7f4836f67934d86ebc5b4f2cedf3c9d943faaf709bfc04be8dbd8df94064c7a1ffa8319d091a3ca295d613361487f28b6f8b7a76f86f3b4c281a2f10cc439c9a15003fc2cee7f720acee10aff21eecd94bd482ec2b29ee2546fb7ab2b24ff37454a36f867b712eabe4901c3479d8e264f32bb84ea35a31956206856d4b6d2b888c2556eca70615683", 0x91}, {&(0x7f0000002c80)="8cb9e7f320071c42cd6a1a7e342bd609193c4190a6fbcfda3197926efe165f3d6ecc83a31b2333001325a7e59895056e44ffd3907828401ec656eaaaa07b53b2a1c6b1abc1e695301622ebbb1585502825b567a484b0c75f0516b8b949db376e12dac6003b514af66333a026930a5a591e86081523c8b202aa3adf7a1e5da7413a8f4c927bc83152db71836cd9cc590f6ee264cec447ca03b07a39610ebe5bea18417e622f802871", 0xa8}, {&(0x7f0000002d40)="b1a9a9e49b27d647aff93d52641921972511c199bae43fa23a880a0e8d3fa55ccb003b578338217c03c9b21c802a7d4d7814ffaa7a03db5ba966d64ef075fbf38c5c866c9eeda746b6b5442d51346e49cf18b0685d25b9b344d27e72e2026d0a4c0742e60c8eb2a0903f58e3c76c7074ec6ca4b83889afec5b0cdd8be465049947a9b0ecd14d5ee76aeec6448919743a6a2e471a3af663f53788528d5d0ee1fdd5258d34f67cfc560fb2c333c23f46152a2f9aff3aff1126b13ea016ccb6dc2a0594c21d04679929e86d97d7635d52e387", 0xd1}, {&(0x7f0000002e40)="e93444f5f2e8a504e19f2643253085ee0feee0d9af27a79e09031d97bee0c9a4e156b1", 0x23}, {&(0x7f0000002e80)="d5fa31374b5e03d400035b5d1cf21fb4d4604a4800464758408c0d38df4d7b3b1a42d0e28ab31ab41d464aebf38f992e0b7a75208c2c4890b42d256375bf104274a9253feac83553ecdf3f8050567aa3eaef1e8219c51de9beb9cde66dcffdae6ceb9cd827230b51baa274215e825594d67a9ed082e0141ae94ce62e7c80354e8886a57a0b53c85c2450e45c89e731a642d6f29b77ee5890ab73346edc84369caa4a2fbebd8d908a969eeff1c91c7df9ddc157ce6f3780123635c0af64ef7616cf06012d59c5495506a3187641a2cd", 0xcf}, {&(0x7f0000002f80)="4763484b281cf4ff8bd0eb3c440ba198ea8904377b1df72e68e808d46d1a28c3cb388ad0e4a083388fd5a08b9b95bdd7b42cefd9ad4430f2ca96be5513e69735ff47ef05a7de0c6e1536231d2e71fecbc37ee926d952b29aaa9341f57143ed1dec0bc205d1785c5f80d937850b61605d55e7a4f90514eac49c08c7", 0x7b}, {&(0x7f0000003000)="0c775a9f794cd7f4afd7f781ffb286facc5be13654ca6fc6ce5ae1a32d1cc93a01d005be704c35cdea7586b4c4990a5fa364ba432c4de150716d8507aa8049e76a09b123c78367c8079f53c0b8324d08f4334ced8e044bde", 0x58}, {&(0x7f0000003080)}], 0x8, 0x0, 0x0, 0x800}, {&(0x7f0000003140)=@in6={0xa, 0x4e24, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x1c, &(0x7f00000032c0)=[{&(0x7f0000003180)="31ed0e3f2dc8639daeaa37f1e14bfd8ff5d808c54deab8562b0b4f2ab15ec36f66c3383125cbde405cc0a885d1ac3560f671d479b48c2caf3e5ec97f16fb41190847436bf2db", 0x46}, {&(0x7f0000003200)="b4fc64ebdc71f59a69fc10d6af600b8bc54862281561711899759bcfef8833dd1648cfbd134ee73557676b4d61b3e6adb2006961737e62d9cfb9cb1b4d96fd1359523eafa5fd7c20d7f70b3414731e665a5b16a4e27d9c23b052db92c0f1a957e37cd1b390728a015213356079445dc716d91984467075de957e97d0fac7bac2bd908f499cebfdd754a84620a31633d637f713b6", 0x94}], 0x2, &(0x7f0000003300)=[@dstaddrv6={0x20, 0x84, 0x8, @dev={0xfe, 0x80, '\x00', 0x44}}, @dstaddrv4={0x18, 0x84, 0x7, @local}, @dstaddrv6={0x20, 0x84, 0x8, @private2}], 0x58}, {&(0x7f0000003380)=@in={0x2, 0x4e22, @multicast2}, 0x10, &(0x7f0000004400)=[{&(0x7f00000033c0)="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", 0x1000}, {&(0x7f00000043c0)='90', 0x2}], 0x2, 0x0, 0x0, 0x4}], 0x6, 0x80d0) (async) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) (async) setsockopt$inet6_tcp_int(r1, 0x6, 0x7, &(0x7f0000000080)=0x1, 0x4) 11:00:25 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) (async, rerun: 64) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) (async, rerun: 64) r1 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r1, 0x3, 0x0) getdents64(r1, 0xfffffffffffffffe, 0x29) (async) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x7fff, @remote, 0x41}, 0x1c) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000000)='\x00', 0x0, r0) 11:00:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000200000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f2800450100", 0x1e, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) [ 567.835908][T16067] EXT4-fs error (device loop1): ext4_lookup:1812: inode #2: comm syz-executor.1: deleted inode referenced: 12 11:00:25 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x8, @private2}, 0x1c) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) getsockopt$inet6_tcp_int(r1, 0x6, 0x3a, &(0x7f0000000040), &(0x7f0000000100)=0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000080)=0x1, 0x4) 11:00:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580), 0x0, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) [ 567.836429][T16084] EXT4-fs error (device loop1): ext4_lookup:1812: inode #2: comm syz-executor.1: deleted inode referenced: 12 [ 567.846213][T16087] loop0: detected capacity change from 0 to 264192 [ 567.894773][T16093] loop3: detected capacity change from 0 to 264192 11:00:25 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x8, @private2}, 0x1c) (async) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) getsockopt$inet6_tcp_int(r1, 0x6, 0x3a, &(0x7f0000000040), &(0x7f0000000100)=0x4) (async) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000080)=0x1, 0x4) 11:00:25 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r1, 0x3, 0x0) getdents64(r1, 0xfffffffffffffffe, 0x29) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x7fff, @remote, 0x41}, 0x1c) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000000)='\x00', 0x0, r0) socket$inet6_mptcp(0xa, 0x1, 0x106) (async) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) (async) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) (async) openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) (async) lseek(r1, 0x3, 0x0) (async) getdents64(r1, 0xfffffffffffffffe, 0x29) (async) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x7fff, @remote, 0x41}, 0x1c) (async) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000000)='\x00', 0x0, r0) (async) 11:00:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000300000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f2800450100", 0x1e, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) [ 567.896349][T16093] EXT4-fs (loop3): corrupt root inode, run e2fsck 11:00:25 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x8, @private2}, 0x1c) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) getsockopt$inet6_tcp_int(r1, 0x6, 0x3a, &(0x7f0000000040), &(0x7f0000000100)=0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000080)=0x1, 0x4) socket$inet6_mptcp(0xa, 0x1, 0x106) (async) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x8, @private2}, 0x1c) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) (async) getsockopt$inet6_tcp_int(r1, 0x6, 0x3a, &(0x7f0000000040), &(0x7f0000000100)=0x4) (async) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000080)=0x1, 0x4) (async) 11:00:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a09", 0xb, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000400000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f2800450100", 0x1e, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) [ 567.896449][T16093] EXT4-fs (loop3): mount failed 11:00:25 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e24, 0xb6, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x5}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) 11:00:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000500000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) [ 567.922196][T16087] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 567.939984][ T7746] blk_print_req_error: 25 callbacks suppressed [ 567.940021][ T7746] I/O error, dev loop3, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 11:00:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000800000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a09", 0xb, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:26 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e24, 0xb6, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x5}, 0x1c) (async) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) [ 567.990017][T16111] loop3: detected capacity change from 0 to 264192 [ 568.044122][T16111] EXT4-fs error (device loop3): __ext4_fill_super:5226: inode #2: comm syz-executor.3: iget: root inode unallocated [ 568.044281][T16111] EXT4-fs (loop3): get root inode failed [ 568.044293][T16111] EXT4-fs (loop3): mount failed [ 568.057847][T16129] loop0: detected capacity change from 0 to 264192 11:00:26 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e24, 0xb6, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x5}, 0x1c) (async, rerun: 64) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) (rerun: 64) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) [ 568.064392][T16129] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 568.078230][T16137] loop1: detected capacity change from 0 to 264192 [ 568.078779][T16137] ext4: Unknown parameter 'P' [ 568.126646][T16146] loop4: detected capacity change from 0 to 264192 [ 568.149855][T16149] loop0: detected capacity change from 0 to 22 11:00:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:26 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r1, 0x3, 0x0) getdents64(r1, 0xfffffffffffffffe, 0x29) r2 = openat$urandom(0xffffffffffffff9c, &(0x7f00000022c0), 0x81, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000002300)='net/rt_acct\x00') sendfile(r2, r3, &(0x7f0000002340)=0x3, 0x7) recvmsg(r1, &(0x7f0000002200)={&(0x7f0000000000)=@alg, 0x80, &(0x7f0000002180)=[{&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/80, 0x50}, {&(0x7f0000001180)=""/4096, 0x1000}], 0x3, &(0x7f00000021c0)=""/57, 0x39}, 0x41) bind(r1, &(0x7f0000002240)=@caif=@rfm={0x25, 0xf685, "1810170715b13b3790d723815066a164"}, 0x80) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000080)=0x1, 0x4) 11:00:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f001800000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a09", 0xb, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:26 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r1, 0x3, 0x0) getdents64(r1, 0xfffffffffffffffe, 0x29) r2 = openat$urandom(0xffffffffffffff9c, &(0x7f00000022c0), 0x81, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000002300)='net/rt_acct\x00') sendfile(r2, r3, &(0x7f0000002340)=0x3, 0x7) recvmsg(r1, &(0x7f0000002200)={&(0x7f0000000000)=@alg, 0x80, &(0x7f0000002180)=[{&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/80, 0x50}, {&(0x7f0000001180)=""/4096, 0x1000}], 0x3, &(0x7f00000021c0)=""/57, 0x39}, 0x41) bind(r1, &(0x7f0000002240)=@caif=@rfm={0x25, 0xf685, "1810170715b13b3790d723815066a164"}, 0x80) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000080)=0x1, 0x4) [ 568.192953][T16157] loop3: detected capacity change from 0 to 264192 [ 568.194991][T16149] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 568.195009][T16149] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (11 blocks) 11:00:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f002600000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:26 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r1, 0x3, 0x0) getdents64(r1, 0xfffffffffffffffe, 0x29) r2 = openat$urandom(0xffffffffffffff9c, &(0x7f00000022c0), 0x81, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000002300)='net/rt_acct\x00') sendfile(r2, r3, &(0x7f0000002340)=0x3, 0x7) recvmsg(r1, &(0x7f0000002200)={&(0x7f0000000000)=@alg, 0x80, &(0x7f0000002180)=[{&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/80, 0x50}, {&(0x7f0000001180)=""/4096, 0x1000}], 0x3, &(0x7f00000021c0)=""/57, 0x39}, 0x41) bind(r1, &(0x7f0000002240)=@caif=@rfm={0x25, 0xf685, "1810170715b13b3790d723815066a164"}, 0x80) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000080)=0x1, 0x4) [ 568.200572][T16156] loop1: detected capacity change from 0 to 264192 [ 568.201047][T16156] ext4: Unknown parameter 'P' [ 568.223203][T16156] loop1: detected capacity change from 0 to 264192 11:00:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f005a00000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a0900", 0x10, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) [ 568.223272][T16156] ext4: Unknown parameter 'P' [ 568.223544][T16157] EXT4-fs error (device loop3): __ext4_fill_super:5226: inode #2: comm syz-executor.3: iget: root inode unallocated 11:00:26 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) socket$l2tp6(0xa, 0x2, 0x73) r1 = syz_open_dev$ptys(0xc, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @private0={0xfc, 0x0, '\x00', 0x1}, 0x800}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x6, @empty, 0x7}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) 11:00:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:26 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r1, 0x3, 0x0) getdents64(r1, 0xfffffffffffffffe, 0x29) r2 = openat$urandom(0xffffffffffffff9c, &(0x7f00000022c0), 0x81, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000002300)='net/rt_acct\x00') sendfile(r2, r3, &(0x7f0000002340)=0x3, 0x7) recvmsg(r1, &(0x7f0000002200)={&(0x7f0000000000)=@alg, 0x80, &(0x7f0000002180)=[{&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/80, 0x50}, {&(0x7f0000001180)=""/4096, 0x1000}], 0x3, &(0x7f00000021c0)=""/57, 0x39}, 0x41) bind(r1, &(0x7f0000002240)=@caif=@rfm={0x25, 0xf685, "1810170715b13b3790d723815066a164"}, 0x80) 11:00:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f007600000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a0900", 0x10, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f008300000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:26 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r1, 0x3, 0x0) getdents64(r1, 0xfffffffffffffffe, 0x29) r2 = openat$urandom(0xffffffffffffff9c, &(0x7f00000022c0), 0x81, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000002300)='net/rt_acct\x00') sendfile(r2, r3, &(0x7f0000002340)=0x3, 0x7) recvmsg(r1, &(0x7f0000002200)={&(0x7f0000000000)=@alg, 0x80, &(0x7f0000002180)=[{&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/80, 0x50}, {&(0x7f0000001180)=""/4096, 0x1000}], 0x3, &(0x7f00000021c0)=""/57, 0x39}, 0x41) 11:00:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) [ 568.223715][T16157] EXT4-fs (loop3): get root inode failed [ 568.223727][T16157] EXT4-fs (loop3): mount failed 11:00:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:26 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) socket$l2tp6(0xa, 0x2, 0x73) r1 = syz_open_dev$ptys(0xc, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @private0={0xfc, 0x0, '\x00', 0x1}, 0x800}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x6, @empty, 0x7}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) socket$inet6_mptcp(0xa, 0x1, 0x106) (async) socket$l2tp6(0xa, 0x2, 0x73) (async) syz_open_dev$ptys(0xc, 0x3, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) (async) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @private0={0xfc, 0x0, '\x00', 0x1}, 0x800}, 0x1c) (async) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x6, @empty, 0x7}, 0x1c) (async) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) (async) 11:00:26 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r1, 0x3, 0x0) getdents64(r1, 0xfffffffffffffffe, 0x29) r2 = openat$urandom(0xffffffffffffff9c, &(0x7f00000022c0), 0x81, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000002300)='net/rt_acct\x00') sendfile(r2, r3, &(0x7f0000002340)=0x3, 0x7) 11:00:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f00fe00000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) [ 568.254136][T16175] loop0: detected capacity change from 0 to 22 [ 568.255882][ T1443] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 568.255920][ T1443] loop1: unable to read partition table 11:00:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000402000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:26 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r1, 0x3, 0x0) getdents64(r1, 0xfffffffffffffffe, 0x29) r2 = openat$urandom(0xffffffffffffff9c, &(0x7f00000022c0), 0x81, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000002340)=0x3, 0x7) 11:00:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a0900", 0x10, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) [ 568.255934][ T1443] loop1: partition table beyond EOD, truncated 11:00:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000003000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:26 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) socket$l2tp6(0xa, 0x2, 0x73) r1 = syz_open_dev$ptys(0xc, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @private0={0xfc, 0x0, '\x00', 0x1}, 0x800}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x6, @empty, 0x7}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) socket$inet6_mptcp(0xa, 0x1, 0x106) (async) socket$l2tp6(0xa, 0x2, 0x73) (async) syz_open_dev$ptys(0xc, 0x3, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) (async) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @private0={0xfc, 0x0, '\x00', 0x1}, 0x800}, 0x1c) (async) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x6, @empty, 0x7}, 0x1c) (async) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) (async) 11:00:26 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r1, 0x3, 0x0) getdents64(r1, 0xfffffffffffffffe, 0x29) r2 = openat$urandom(0xffffffffffffff9c, &(0x7f00000022c0), 0x81, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000002340)=0x3, 0x7) 11:00:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000204000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) [ 568.256124][T16175] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 568.256205][T16175] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (11 blocks) 11:00:26 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r1, 0x3, 0x0) getdents64(r1, 0xfffffffffffffffe, 0x29) r2 = openat$urandom(0xffffffffffffff9c, &(0x7f00000022c0), 0x81, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000002340)=0x3, 0x7) 11:00:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a", 0x10, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000604000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) [ 568.278891][T16198] loop3: detected capacity change from 0 to 264192 [ 568.300995][T16198] EXT4-fs error (device loop3): __ext4_fill_super:5226: inode #2: comm syz-executor.3: iget: root inode unallocated 11:00:26 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r1, 0x3, 0x0) getdents64(r1, 0xfffffffffffffffe, 0x29) r2 = syz_open_procfs(0x0, &(0x7f0000002300)='net/rt_acct\x00') sendfile(0xffffffffffffffff, r2, &(0x7f0000002340)=0x3, 0x7) [ 568.301177][T16198] EXT4-fs (loop3): get root inode failed [ 568.301190][T16198] EXT4-fs (loop3): mount failed [ 568.314113][T16209] loop0: detected capacity change from 0 to 22 11:00:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000005000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a0900000000", 0x13, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:26 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r1, 0x3, 0x0) getdents64(r1, 0xfffffffffffffffe, 0x29) r2 = syz_open_procfs(0x0, &(0x7f0000002300)='net/rt_acct\x00') sendfile(0xffffffffffffffff, r2, &(0x7f0000002340)=0x3, 0x7) 11:00:26 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000000)) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @private2}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000080)=0x8) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000140)=ANY=[@ANYRES32=r1, @ANYBLOB="3e000000386282fca36f3e2773fbd11591d1d3878106c9a3b68d035e7d4fea6acb98497103a83a857cbd6fa03ab7bdd183c1367ce26adfcb31050000000000000000"], &(0x7f00000001c0)=0x46) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000200)={r3, 0x7f}, 0x8) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) 11:00:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a", 0x10, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000406000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) [ 568.314768][ T7754] I/O error, dev loop3, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 568.327604][T16209] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled 11:00:26 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r1, 0x3, 0x0) getdents64(r1, 0xfffffffffffffffe, 0x29) r2 = syz_open_procfs(0x0, &(0x7f0000002300)='net/rt_acct\x00') sendfile(0xffffffffffffffff, r2, &(0x7f0000002340)=0x3, 0x7) 11:00:26 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000000)) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @private2}, 0x1c) (async) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000080)=0x8) (async) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000140)=ANY=[@ANYRES32=r1, @ANYBLOB="3e000000386282fca36f3e2773fbd11591d1d3878106c9a3b68d035e7d4fea6acb98497103a83a857cbd6fa03ab7bdd183c1367ce26adfcb31050000000000000000"], &(0x7f00000001c0)=0x46) (async) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000200)={r3, 0x7f}, 0x8) (async) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) 11:00:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000018000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) [ 568.327621][T16209] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (11 blocks) [ 568.327844][T16213] loop1: detected capacity change from 0 to 264192 11:00:26 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r1, 0x3, 0x0) r2 = openat$urandom(0xffffffffffffff9c, &(0x7f00000022c0), 0x81, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000002300)='net/rt_acct\x00') sendfile(r2, r3, &(0x7f0000002340)=0x3, 0x7) 11:00:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a0900000000", 0x13, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000020000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) [ 568.328475][T16213] ext4: Unknown parameter 'P' 11:00:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a", 0x10, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:26 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000000)) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @private2}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000080)=0x8) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000140)=ANY=[@ANYRES32=r1, @ANYBLOB="3e000000386282fca36f3e2773fbd11591d1d3878106c9a3b68d035e7d4fea6acb98497103a83a857cbd6fa03ab7bdd183c1367ce26adfcb31050000000000000000"], &(0x7f00000001c0)=0x46) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000200)={r3, 0x7f}, 0x8) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) socket$inet6_mptcp(0xa, 0x1, 0x106) (async) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000000)) (async) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @private2}, 0x1c) (async) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000080)=0x8) (async) openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x40, 0x0) (async) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000140)=ANY=[@ANYRES32=r1, @ANYBLOB="3e000000386282fca36f3e2773fbd11591d1d3878106c9a3b68d035e7d4fea6acb98497103a83a857cbd6fa03ab7bdd183c1367ce26adfcb31050000000000000000"], &(0x7f00000001c0)=0x46) (async) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000200)={r3, 0x7f}, 0x8) (async) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) (async) 11:00:26 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000022c0), 0x81, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000002300)='net/rt_acct\x00') sendfile(r1, r2, &(0x7f0000002340)=0x3, 0x7) 11:00:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000026000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) [ 568.334034][T16215] loop3: detected capacity change from 0 to 264192 [ 568.339224][T16215] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) 11:00:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c89", 0x18, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:26 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x28c8, @loopback, 0x9}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x6b0e212e, @local}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) setsockopt(r1, 0x0, 0x3, &(0x7f0000000100)="0fcd75b09e5f8eab9618bd45290eff232acfbd73af7c9ac5171efaf9e4c433b6c81a8640b474f43d09776ee1434f1ddb9e31cd82bfedd8c3487d3757610997d5c5ac8493c0ac8cd181d20199d172150191f4b24966", 0x55) r2 = accept$nfc_llcp(r1, &(0x7f0000000180), &(0x7f0000000200)=0x60) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r2, 0x8983, &(0x7f0000000240)={0x1, 'veth0_virt_wifi\x00', {}, 0x400}) r3 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000000)) 11:00:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a0900000000", 0x13, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f00003f000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) [ 568.339265][T16215] EXT4-fs (loop3): group descriptors corrupted! [ 568.357331][ T7754] I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 11:00:26 executing program 4: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000022c0), 0x81, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000002300)='net/rt_acct\x00') sendfile(r1, r2, &(0x7f0000002340)=0x3, 0x7) 11:00:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000040000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:26 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x28c8, @loopback, 0x9}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x6b0e212e, @local}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) setsockopt(r1, 0x0, 0x3, &(0x7f0000000100)="0fcd75b09e5f8eab9618bd45290eff232acfbd73af7c9ac5171efaf9e4c433b6c81a8640b474f43d09776ee1434f1ddb9e31cd82bfedd8c3487d3757610997d5c5ac8493c0ac8cd181d20199d172150191f4b24966", 0x55) r2 = accept$nfc_llcp(r1, &(0x7f0000000180), &(0x7f0000000200)=0x60) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r2, 0x8983, &(0x7f0000000240)={0x1, 'veth0_virt_wifi\x00', {}, 0x400}) r3 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000000)) socket$inet6_mptcp(0xa, 0x1, 0x106) (async) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x28c8, @loopback, 0x9}, 0x1c) (async) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x6b0e212e, @local}, 0x1c) (async) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) (async) setsockopt(r1, 0x0, 0x3, &(0x7f0000000100)="0fcd75b09e5f8eab9618bd45290eff232acfbd73af7c9ac5171efaf9e4c433b6c81a8640b474f43d09776ee1434f1ddb9e31cd82bfedd8c3487d3757610997d5c5ac8493c0ac8cd181d20199d172150191f4b24966", 0x55) (async) accept$nfc_llcp(r1, &(0x7f0000000180), &(0x7f0000000200)=0x60) (async) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r2, 0x8983, &(0x7f0000000240)={0x1, 'veth0_virt_wifi\x00', {}, 0x400}) (async) socket$l2tp(0x2, 0x2, 0x73) (async) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000000)) (async) 11:00:26 executing program 4: socket$inet6_mptcp(0xa, 0x1, 0x106) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000022c0), 0x81, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000002300)='net/rt_acct\x00') sendfile(r0, r1, &(0x7f0000002340)=0x3, 0x7) [ 568.357375][ T7754] I/O error, dev loop0, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 568.357495][ T7754] I/O error, dev loop0, sector 6 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 568.372791][ T7746] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 11:00:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a090000000000", 0x14, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c89", 0x18, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:26 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x28c8, @loopback, 0x9}, 0x1c) (async) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x6b0e212e, @local}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) (async) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) setsockopt(r1, 0x0, 0x3, &(0x7f0000000100)="0fcd75b09e5f8eab9618bd45290eff232acfbd73af7c9ac5171efaf9e4c433b6c81a8640b474f43d09776ee1434f1ddb9e31cd82bfedd8c3487d3757610997d5c5ac8493c0ac8cd181d20199d172150191f4b24966", 0x55) (async) r2 = accept$nfc_llcp(r1, &(0x7f0000000180), &(0x7f0000000200)=0x60) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r2, 0x8983, &(0x7f0000000240)={0x1, 'veth0_virt_wifi\x00', {}, 0x400}) (async) r3 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000000)) 11:00:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f00005a000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) [ 568.372836][ T7746] loop1: unable to read partition table [ 568.372852][ T7746] loop1: partition table beyond EOD, truncated [ 568.373007][ T7359] I/O error, dev loop3, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 568.375097][T16213] loop1: detected capacity change from 0 to 264192 11:00:26 executing program 4: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000022c0), 0x81, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000002300)='net/rt_acct\x00') sendfile(r0, r1, &(0x7f0000002340)=0x3, 0x7) 11:00:26 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$int_out(r0, 0xa8c2, &(0x7f0000000080)) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x11, &(0x7f0000000000), &(0x7f0000000440)=0x4) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x311040, 0x0) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000140)) r2 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r2, 0x3, 0x0) getdents64(r2, 0xfffffffffffffffe, 0x29) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r2, &(0x7f0000000200)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="88000000031400022dbd7000fbdb01210000020073797a3000000000080041e5727865001400330070696d367265673100000000000000000900020073797a3200000000080041007278650014003300766c616e3000000000000000000000000900020073797a3200000000080041007369770014003300766574683100"/136], 0x88}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000000) syz_open_dev$vcsn(&(0x7f0000000100), 0x8, 0x244181) sendto$inet6(r1, &(0x7f0000000280)="1eb903888b95ebac1f3e676ce647b6be5fcdf3c38446751fcc5daf756afc5d1afe60c954ac43e78f47788f7223f4e2c1e8917c5a89dfbcce17bfeb6706eb8d8d75ac9ffa8cd034e783a2c6db4daf0fcb95459514e34e1e60ac65fa1cb1207e480308b3098b48a7256dc22c662729e80cfabcdeae79e61d9e86a78fe1c8c026affc4870d7d7878b37f64968302bce632764dae9576b9245ad75d3f5c786c70138a38d2cad660aa9bb1f589da04ae608869cfbef148e1607aa9f3fec47975297d451dc7aea618706fb", 0xc8, 0x8870, &(0x7f0000000240)={0xa, 0x4e20, 0x40000, @remote, 0xea}, 0x1c) 11:00:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000076000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:27 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c89", 0x18, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:27 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$int_out(r0, 0xa8c2, &(0x7f0000000080)) (async) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) (async) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) (async) getsockopt$inet6_tcp_int(r0, 0x6, 0x11, &(0x7f0000000000), &(0x7f0000000440)=0x4) (async) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x311040, 0x0) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000140)) (async) r2 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r2, 0x3, 0x0) (async) getdents64(r2, 0xfffffffffffffffe, 0x29) (async) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r2, &(0x7f0000000200)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="88000000031400022dbd7000fbdb01210000020073797a3000000000080041e5727865001400330070696d367265673100000000000000000900020073797a3200000000080041007278650014003300766c616e3000000000000000000000000900020073797a3200000000080041007369770014003300766574683100"/136], 0x88}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000000) (async) syz_open_dev$vcsn(&(0x7f0000000100), 0x8, 0x244181) (async) sendto$inet6(r1, &(0x7f0000000280)="1eb903888b95ebac1f3e676ce647b6be5fcdf3c38446751fcc5daf756afc5d1afe60c954ac43e78f47788f7223f4e2c1e8917c5a89dfbcce17bfeb6706eb8d8d75ac9ffa8cd034e783a2c6db4daf0fcb95459514e34e1e60ac65fa1cb1207e480308b3098b48a7256dc22c662729e80cfabcdeae79e61d9e86a78fe1c8c026affc4870d7d7878b37f64968302bce632764dae9576b9245ad75d3f5c786c70138a38d2cad660aa9bb1f589da04ae608869cfbef148e1607aa9f3fec47975297d451dc7aea618706fb", 0xc8, 0x8870, &(0x7f0000000240)={0xa, 0x4e20, 0x40000, @remote, 0xea}, 0x1c) [ 568.375180][T16213] ext4: Unknown parameter 'P' [ 568.397879][T16231] loop0: detected capacity change from 0 to 264192 [ 568.399352][T16233] loop3: detected capacity change from 0 to 264192 [ 568.400153][T16231] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 568.400575][T16233] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) 11:00:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a090000000000", 0x14, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:27 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$int_out(r0, 0xa8c2, &(0x7f0000000080)) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x11, &(0x7f0000000000), &(0x7f0000000440)=0x4) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x311040, 0x0) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000140)) r2 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r2, 0x3, 0x0) getdents64(r2, 0xfffffffffffffffe, 0x29) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r2, &(0x7f0000000200)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="88000000031400022dbd7000fbdb01210000020073797a3000000000080041e5727865001400330070696d367265673100000000000000000900020073797a3200000000080041007278650014003300766c616e3000000000000000000000000900020073797a3200000000080041007369770014003300766574683100"/136], 0x88}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000000) syz_open_dev$vcsn(&(0x7f0000000100), 0x8, 0x244181) sendto$inet6(r1, &(0x7f0000000280)="1eb903888b95ebac1f3e676ce647b6be5fcdf3c38446751fcc5daf756afc5d1afe60c954ac43e78f47788f7223f4e2c1e8917c5a89dfbcce17bfeb6706eb8d8d75ac9ffa8cd034e783a2c6db4daf0fcb95459514e34e1e60ac65fa1cb1207e480308b3098b48a7256dc22c662729e80cfabcdeae79e61d9e86a78fe1c8c026affc4870d7d7878b37f64968302bce632764dae9576b9245ad75d3f5c786c70138a38d2cad660aa9bb1f589da04ae608869cfbef148e1607aa9f3fec47975297d451dc7aea618706fb", 0xc8, 0x8870, &(0x7f0000000240)={0xa, 0x4e20, 0x40000, @remote, 0xea}, 0x1c) socket$inet6_mptcp(0xa, 0x1, 0x106) (async) ioctl$int_out(r0, 0xa8c2, &(0x7f0000000080)) (async) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) (async) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) (async) getsockopt$inet6_tcp_int(r0, 0x6, 0x11, &(0x7f0000000000), &(0x7f0000000440)=0x4) (async) openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x311040, 0x0) (async) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000140)) (async) openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) (async) lseek(r2, 0x3, 0x0) (async) getdents64(r2, 0xfffffffffffffffe, 0x29) (async) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r2, &(0x7f0000000200)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="88000000031400022dbd7000fbdb01210000020073797a3000000000080041e5727865001400330070696d367265673100000000000000000900020073797a3200000000080041007278650014003300766c616e3000000000000000000000000900020073797a3200000000080041007369770014003300766574683100"/136], 0x88}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000000) (async) syz_open_dev$vcsn(&(0x7f0000000100), 0x8, 0x244181) (async) sendto$inet6(r1, &(0x7f0000000280)="1eb903888b95ebac1f3e676ce647b6be5fcdf3c38446751fcc5daf756afc5d1afe60c954ac43e78f47788f7223f4e2c1e8917c5a89dfbcce17bfeb6706eb8d8d75ac9ffa8cd034e783a2c6db4daf0fcb95459514e34e1e60ac65fa1cb1207e480308b3098b48a7256dc22c662729e80cfabcdeae79e61d9e86a78fe1c8c026affc4870d7d7878b37f64968302bce632764dae9576b9245ad75d3f5c786c70138a38d2cad660aa9bb1f589da04ae608869cfbef148e1607aa9f3fec47975297d451dc7aea618706fb", 0xc8, 0x8870, &(0x7f0000000240)={0xa, 0x4e20, 0x40000, @remote, 0xea}, 0x1c) (async) 11:00:27 executing program 4: r0 = openat$urandom(0xffffffffffffff9c, 0x0, 0x81, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000002300)='net/rt_acct\x00') sendfile(r0, r1, &(0x7f0000002340)=0x3, 0x7) 11:00:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000083000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) [ 568.400598][T16233] EXT4-fs (loop3): group descriptors corrupted! [ 568.431615][T16238] loop1: detected capacity change from 0 to 264192 [ 568.432100][T16238] ext4: Unknown parameter 'bÛþÏVÓЉèŽþëÊàu9ˉ' [ 568.487373][T16250] loop3: detected capacity change from 0 to 264192 11:00:27 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045", 0x1c, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:27 executing program 4: r0 = openat$urandom(0xffffffffffffff9c, 0x0, 0x81, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000002300)='net/rt_acct\x00') sendfile(r0, r1, &(0x7f0000002340)=0x3, 0x7) 11:00:27 executing program 5: set_thread_area(&(0x7f0000000000)={0x2, 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1}) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) 11:00:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f00fffe000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:27 executing program 4: r0 = openat$urandom(0xffffffffffffff9c, 0x0, 0x81, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000002300)='net/rt_acct\x00') sendfile(r0, r1, &(0x7f0000002340)=0x3, 0x7) [ 568.490153][T16250] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 568.490194][T16250] EXT4-fs (loop3): group descriptors corrupted! 11:00:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f00feff000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a090000000000", 0x14, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:27 executing program 5: set_thread_area(&(0x7f0000000000)={0x2, 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1}) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) (async) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) 11:00:27 executing program 4: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000022c0), 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000002300)='net/rt_acct\x00') sendfile(r0, r1, &(0x7f0000002340)=0x3, 0x7) 11:00:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf465", 0x33, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:27 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045", 0x1c, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) [ 568.490264][ T7754] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 568.490302][ T7754] loop1: unable to read partition table [ 568.490325][ T7754] loop1: partition table beyond EOD, truncated [ 568.503284][T16252] loop0: detected capacity change from 0 to 21 11:00:27 executing program 4: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000022c0), 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000002300)='net/rt_acct\x00') sendfile(r0, r1, &(0x7f0000002340)=0x3, 0x7) 11:00:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000080000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:27 executing program 5: set_thread_area(&(0x7f0000000000)={0x2, 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1}) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) set_thread_area(&(0x7f0000000000)={0x2, 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1}) (async) socket$inet6_mptcp(0xa, 0x1, 0x106) (async) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) (async) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) (async) [ 568.505012][T16252] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 568.505030][T16252] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (10 blocks) 11:00:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f004000080000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:27 executing program 5: connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x40044, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="8ed290dfde5c20c82d5f1084b4dc693b6bd1445ae0f9f5557aaf17d68d20cc389ed2515d5280caf47ba707872d8255541c53ab8035fdd1fa74416f2be102f52a5d11f93d8fb366380f4062ff7d55cab8e608c0701e27225066a6ce990d0ec92f54f687a6d9a28556e1e17675294f19473832a98007daccb40eaf5627969a37036e07ce06b77271051d84b6081e0b3b8e102b1d2d4a90257cb4c40f17d41894cce2a13eb552b4", 0xa6, 0x40800, &(0x7f0000000100)={0xa, 0x4e20, 0xa833, @local, 0x2}, 0x1c) 11:00:27 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045", 0x1c, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:27 executing program 4: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000022c0), 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000002300)='net/rt_acct\x00') sendfile(r0, r1, &(0x7f0000002340)=0x3, 0x7) [ 568.548405][ T7745] I/O error, dev loop3, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 568.575208][T16264] loop1: detected capacity change from 0 to 264192 [ 568.575551][T16264] ext4: Unknown parameter 'bÛþÏVÓЉèŽþëÊàu9ˉ' 11:00:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:27 executing program 5: connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) (async, rerun: 32) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x40044, 0x0, 0x0) (async, rerun: 32) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="8ed290dfde5c20c82d5f1084b4dc693b6bd1445ae0f9f5557aaf17d68d20cc389ed2515d5280caf47ba707872d8255541c53ab8035fdd1fa74416f2be102f52a5d11f93d8fb366380f4062ff7d55cab8e608c0701e27225066a6ce990d0ec92f54f687a6d9a28556e1e17675294f19473832a98007daccb40eaf5627969a37036e07ce06b77271051d84b6081e0b3b8e102b1d2d4a90257cb4c40f17d41894cce2a13eb552b4", 0xa6, 0x40800, &(0x7f0000000100)={0xa, 0x4e20, 0xa833, @local, 0x2}, 0x1c) 11:00:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf465", 0x33, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000200000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:27 executing program 4: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000022c0), 0x81, 0x0) r1 = syz_open_procfs(0x0, 0x0) sendfile(r0, r1, &(0x7f0000002340)=0x3, 0x7) 11:00:27 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f2800450100", 0x1e, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:27 executing program 5: connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x40044, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="8ed290dfde5c20c82d5f1084b4dc693b6bd1445ae0f9f5557aaf17d68d20cc389ed2515d5280caf47ba707872d8255541c53ab8035fdd1fa74416f2be102f52a5d11f93d8fb366380f4062ff7d55cab8e608c0701e27225066a6ce990d0ec92f54f687a6d9a28556e1e17675294f19473832a98007daccb40eaf5627969a37036e07ce06b77271051d84b6081e0b3b8e102b1d2d4a90257cb4c40f17d41894cce2a13eb552b4", 0xa6, 0x40800, &(0x7f0000000100)={0xa, 0x4e20, 0xa833, @local, 0x2}, 0x1c) 11:00:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000100000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:27 executing program 4: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000022c0), 0x81, 0x0) r1 = syz_open_procfs(0x0, 0x0) sendfile(r0, r1, &(0x7f0000002340)=0x3, 0x7) [ 568.575601][T16261] loop3: detected capacity change from 0 to 264192 [ 568.578761][T16261] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) 11:00:27 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8084b578e85d6a4, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000000)="b8", 0x1}, {&(0x7f0000000100)="e2a95daceb538568a5ad34e5370b4f9c32d1c838ad75a152c47e70bcc9a57294989ddfe0d0d74e7975cc89ebaf4b569ea071009bd4669abd971c76a95402205105c8909326a0d85c39d8d1f3ad795df99047c6ea094dbe154e6f20819722ab0b70ff8fe879216b3a568e781f93159c9a9a0c56dd0fe2ad6725e937f7a1fdf50229a08d4f4b9ce080b1551e129b6e0c6f2d69c22cedf7321f58e6dbadc36b1aa38619", 0xa2}, {&(0x7f00000001c0)="7dbd42c3f57492b15b83870704b3643c7c260333b4fd3a3a50bb404fa46b336ebe9fe3e18d38255de158c584361456852c6896915e81c29b1d4ab25f1f0f9f29651ff78b24a6413317f200092e223944624d6071eb150c136dffa140efd900f52f7aa39bd1858882ffb359d371496aa1659687c23b4dcd9a26fa775a6808f461bade56963d4e2b628a5ab0085c9465ee4e45885ed08e828d0d19df54c030a57eec0c410cc3fd09836b2d71ea55b4f8a2640ab5dba183fc997f2fdfdbcfe73a8c0395809f41f8f22826f43ceb4e5bb0b1a6817bbf0a6be25affe6e1f57a054b338991c53db309043040cf46607b205743c744e808dfd7", 0xf6}, {&(0x7f00000002c0)="a546e9d6ffa92fe2d043430f2d53bf47b5f9275c774504aad9f50f3d5692a425f533ac20c62c4cce312bf69062c5cb6c69ae1e96eaa8b8cdfade524d811ad928d2e38a639b13392831048ee26826b2e2ae52dde25f72c3acd5068dc5b6c7740d0f1b47019f4c28cdb0630f87ba07e91b62b0a4079500"/128, 0xc8}], 0x4, &(0x7f00000002c0)}, 0x1) 11:00:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf465", 0x33, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000200000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) [ 568.578782][T16261] EXT4-fs (loop3): group descriptors corrupted! [ 568.590074][T16267] loop0: detected capacity change from 0 to 21 [ 568.590933][T16267] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled 11:00:27 executing program 4: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000022c0), 0x81, 0x0) r1 = syz_open_procfs(0x0, 0x0) sendfile(r0, r1, &(0x7f0000002340)=0x3, 0x7) 11:00:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:27 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8084b578e85d6a4, 0x0, 0x0) (async) sendmsg$inet6(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000000)="b8", 0x1}, {&(0x7f0000000100)="e2a95daceb538568a5ad34e5370b4f9c32d1c838ad75a152c47e70bcc9a57294989ddfe0d0d74e7975cc89ebaf4b569ea071009bd4669abd971c76a95402205105c8909326a0d85c39d8d1f3ad795df99047c6ea094dbe154e6f20819722ab0b70ff8fe879216b3a568e781f93159c9a9a0c56dd0fe2ad6725e937f7a1fdf50229a08d4f4b9ce080b1551e129b6e0c6f2d69c22cedf7321f58e6dbadc36b1aa38619", 0xa2}, {&(0x7f00000001c0)="7dbd42c3f57492b15b83870704b3643c7c260333b4fd3a3a50bb404fa46b336ebe9fe3e18d38255de158c584361456852c6896915e81c29b1d4ab25f1f0f9f29651ff78b24a6413317f200092e223944624d6071eb150c136dffa140efd900f52f7aa39bd1858882ffb359d371496aa1659687c23b4dcd9a26fa775a6808f461bade56963d4e2b628a5ab0085c9465ee4e45885ed08e828d0d19df54c030a57eec0c410cc3fd09836b2d71ea55b4f8a2640ab5dba183fc997f2fdfdbcfe73a8c0395809f41f8f22826f43ceb4e5bb0b1a6817bbf0a6be25affe6e1f57a054b338991c53db309043040cf46607b205743c744e808dfd7", 0xf6}, {&(0x7f00000002c0)="a546e9d6ffa92fe2d043430f2d53bf47b5f9275c774504aad9f50f3d5692a425f533ac20c62c4cce312bf69062c5cb6c69ae1e96eaa8b8cdfade524d811ad928d2e38a639b13392831048ee26826b2e2ae52dde25f72c3acd5068dc5b6c7740d0f1b47019f4c28cdb0630f87ba07e91b62b0a4079500"/128, 0xc8}], 0x4, &(0x7f00000002c0)}, 0x1) 11:00:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000040200000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:27 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f2800450100", 0x1e, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) [ 568.590985][T16267] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (10 blocks) [ 568.640380][T16285] loop0: detected capacity change from 0 to 21 [ 568.642325][T16283] loop1: detected capacity change from 0 to 264192 11:00:27 executing program 4: openat$urandom(0xffffffffffffff9c, &(0x7f00000022c0), 0x81, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000002300)='net/rt_acct\x00') sendfile(0xffffffffffffffff, r0, &(0x7f0000002340)=0x3, 0x7) 11:00:27 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8084b578e85d6a4, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000000)="b8", 0x1}, {&(0x7f0000000100)="e2a95daceb538568a5ad34e5370b4f9c32d1c838ad75a152c47e70bcc9a57294989ddfe0d0d74e7975cc89ebaf4b569ea071009bd4669abd971c76a95402205105c8909326a0d85c39d8d1f3ad795df99047c6ea094dbe154e6f20819722ab0b70ff8fe879216b3a568e781f93159c9a9a0c56dd0fe2ad6725e937f7a1fdf50229a08d4f4b9ce080b1551e129b6e0c6f2d69c22cedf7321f58e6dbadc36b1aa38619", 0xa2}, {&(0x7f00000001c0)="7dbd42c3f57492b15b83870704b3643c7c260333b4fd3a3a50bb404fa46b336ebe9fe3e18d38255de158c584361456852c6896915e81c29b1d4ab25f1f0f9f29651ff78b24a6413317f200092e223944624d6071eb150c136dffa140efd900f52f7aa39bd1858882ffb359d371496aa1659687c23b4dcd9a26fa775a6808f461bade56963d4e2b628a5ab0085c9465ee4e45885ed08e828d0d19df54c030a57eec0c410cc3fd09836b2d71ea55b4f8a2640ab5dba183fc997f2fdfdbcfe73a8c0395809f41f8f22826f43ceb4e5bb0b1a6817bbf0a6be25affe6e1f57a054b338991c53db309043040cf46607b205743c744e808dfd7", 0xf6}, {&(0x7f00000002c0)="a546e9d6ffa92fe2d043430f2d53bf47b5f9275c774504aad9f50f3d5692a425f533ac20c62c4cce312bf69062c5cb6c69ae1e96eaa8b8cdfade524d811ad928d2e38a639b13392831048ee26826b2e2ae52dde25f72c3acd5068dc5b6c7740d0f1b47019f4c28cdb0630f87ba07e91b62b0a4079500"/128, 0xc8}], 0x4, &(0x7f00000002c0)}, 0x1) socket$inet6_mptcp(0xa, 0x1, 0x106) (async) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) (async) sendto$inet6(r0, 0x0, 0x0, 0x8084b578e85d6a4, 0x0, 0x0) (async) sendmsg$inet6(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000000)="b8", 0x1}, {&(0x7f0000000100)="e2a95daceb538568a5ad34e5370b4f9c32d1c838ad75a152c47e70bcc9a57294989ddfe0d0d74e7975cc89ebaf4b569ea071009bd4669abd971c76a95402205105c8909326a0d85c39d8d1f3ad795df99047c6ea094dbe154e6f20819722ab0b70ff8fe879216b3a568e781f93159c9a9a0c56dd0fe2ad6725e937f7a1fdf50229a08d4f4b9ce080b1551e129b6e0c6f2d69c22cedf7321f58e6dbadc36b1aa38619", 0xa2}, {&(0x7f00000001c0)="7dbd42c3f57492b15b83870704b3643c7c260333b4fd3a3a50bb404fa46b336ebe9fe3e18d38255de158c584361456852c6896915e81c29b1d4ab25f1f0f9f29651ff78b24a6413317f200092e223944624d6071eb150c136dffa140efd900f52f7aa39bd1858882ffb359d371496aa1659687c23b4dcd9a26fa775a6808f461bade56963d4e2b628a5ab0085c9465ee4e45885ed08e828d0d19df54c030a57eec0c410cc3fd09836b2d71ea55b4f8a2640ab5dba183fc997f2fdfdbcfe73a8c0395809f41f8f22826f43ceb4e5bb0b1a6817bbf0a6be25affe6e1f57a054b338991c53db309043040cf46607b205743c744e808dfd7", 0xf6}, {&(0x7f00000002c0)="a546e9d6ffa92fe2d043430f2d53bf47b5f9275c774504aad9f50f3d5692a425f533ac20c62c4cce312bf69062c5cb6c69ae1e96eaa8b8cdfade524d811ad928d2e38a639b13392831048ee26826b2e2ae52dde25f72c3acd5068dc5b6c7740d0f1b47019f4c28cdb0630f87ba07e91b62b0a4079500"/128, 0xc8}], 0x4, &(0x7f00000002c0)}, 0x1) (async) 11:00:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000300000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:27 executing program 4: openat$urandom(0xffffffffffffff9c, &(0x7f00000022c0), 0x81, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000002300)='net/rt_acct\x00') sendfile(0xffffffffffffffff, r0, &(0x7f0000002340)=0x3, 0x7) [ 568.643053][T16283] ext4: Unknown parameter 'bÛþÏVÓЉèŽþëÊàu9ˉ' 11:00:27 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f2800450100", 0x1e, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000400000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:27 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0xfd5d, @dev={0xfe, 0x80, '\x00', 0xb}, 0x8ca7}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r1, 0x3, 0x0) getdents64(r1, 0xfffffffffffffffe, 0x29) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000100)={'syztnl2\x00', &(0x7f0000000040)={'syztnl1\x00', 0x0, 0x4, 0x8, 0x3f, 0x2, 0x2, @dev={0xfe, 0x80, '\x00', 0x26}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7, 0x20, 0x5, 0x80000000}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r1, 0x89f9, &(0x7f00000001c0)={'syztnl0\x00', &(0x7f0000000140)={'syztnl2\x00', r2, 0x2f, 0x86, 0x3f, 0xf8c0, 0xa, @loopback, @dev={0xfe, 0x80, '\x00', 0x29}, 0x1, 0x1, 0x3, 0x874}}) r3 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) getdents64(r3, 0xfffffffffffffffe, 0x29) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, &(0x7f0000000500)={@id={0x2, 0x0, @c}}) ftruncate(r3, 0x3) ioctl$VFAT_IOCTL_READDIR_BOTH(r3, 0x82307201, &(0x7f00000002c0)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66296c653002"]) getsockopt$MRT6(r4, 0x29, 0xcf, &(0x7f0000000240), &(0x7f0000000280)=0x4) 11:00:27 executing program 4: openat$urandom(0xffffffffffffff9c, &(0x7f00000022c0), 0x81, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000002300)='net/rt_acct\x00') sendfile(0xffffffffffffffff, r0, &(0x7f0000002340)=0x3, 0x7) 11:00:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) [ 568.651557][T16285] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 568.651574][T16285] EXT4-fs (loop0): bad geometry: block count 512 exceeds size of device (10 blocks) 11:00:27 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:27 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) (async, rerun: 32) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) (async, rerun: 32) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0xfd5d, @dev={0xfe, 0x80, '\x00', 0xb}, 0x8ca7}, 0x1c) (async, rerun: 64) r1 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) (rerun: 64) lseek(r1, 0x3, 0x0) (async) getdents64(r1, 0xfffffffffffffffe, 0x29) (async) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000100)={'syztnl2\x00', &(0x7f0000000040)={'syztnl1\x00', 0x0, 0x4, 0x8, 0x3f, 0x2, 0x2, @dev={0xfe, 0x80, '\x00', 0x26}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7, 0x20, 0x5, 0x80000000}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r1, 0x89f9, &(0x7f00000001c0)={'syztnl0\x00', &(0x7f0000000140)={'syztnl2\x00', r2, 0x2f, 0x86, 0x3f, 0xf8c0, 0xa, @loopback, @dev={0xfe, 0x80, '\x00', 0x29}, 0x1, 0x1, 0x3, 0x874}}) (async, rerun: 64) r3 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) (rerun: 64) getdents64(r3, 0xfffffffffffffffe, 0x29) (async, rerun: 64) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, &(0x7f0000000500)={@id={0x2, 0x0, @c}}) (rerun: 64) ftruncate(r3, 0x3) ioctl$VFAT_IOCTL_READDIR_BOTH(r3, 0x82307201, &(0x7f00000002c0)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66296c653002"]) getsockopt$MRT6(r4, 0x29, 0xcf, &(0x7f0000000240), &(0x7f0000000280)=0x4) 11:00:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000500000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:27 executing program 4: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000022c0), 0x81, 0x0) syz_open_procfs(0x0, &(0x7f0000002300)='net/rt_acct\x00') sendfile(r0, 0xffffffffffffffff, &(0x7f0000002340)=0x3, 0x7) 11:00:27 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) [ 568.673405][T16294] loop3: detected capacity change from 0 to 264192 [ 568.688413][T16294] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) 11:00:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000040600000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:27 executing program 4: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000022c0), 0x81, 0x0) syz_open_procfs(0x0, &(0x7f0000002300)='net/rt_acct\x00') sendfile(r0, 0xffffffffffffffff, &(0x7f0000002340)=0x3, 0x7) 11:00:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:27 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) (async) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) (async) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0xfd5d, @dev={0xfe, 0x80, '\x00', 0xb}, 0x8ca7}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r1, 0x3, 0x0) (async) getdents64(r1, 0xfffffffffffffffe, 0x29) (async) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000100)={'syztnl2\x00', &(0x7f0000000040)={'syztnl1\x00', 0x0, 0x4, 0x8, 0x3f, 0x2, 0x2, @dev={0xfe, 0x80, '\x00', 0x26}, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7, 0x20, 0x5, 0x80000000}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r1, 0x89f9, &(0x7f00000001c0)={'syztnl0\x00', &(0x7f0000000140)={'syztnl2\x00', r2, 0x2f, 0x86, 0x3f, 0xf8c0, 0xa, @loopback, @dev={0xfe, 0x80, '\x00', 0x29}, 0x1, 0x1, 0x3, 0x874}}) (async) r3 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) getdents64(r3, 0xfffffffffffffffe, 0x29) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, &(0x7f0000000500)={@id={0x2, 0x0, @c}}) (async) ftruncate(r3, 0x3) (async) ioctl$VFAT_IOCTL_READDIR_BOTH(r3, 0x82307201, &(0x7f00000002c0)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66296c653002"]) getsockopt$MRT6(r4, 0x29, 0xcf, &(0x7f0000000240), &(0x7f0000000280)=0x4) 11:00:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000800000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) [ 568.688435][T16294] EXT4-fs (loop3): group descriptors corrupted! [ 568.737338][T16305] loop1: detected capacity change from 0 to 264192 [ 568.741096][T16307] loop0: detected capacity change from 0 to 264192 11:00:27 executing program 4: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000022c0), 0x81, 0x0) syz_open_procfs(0x0, &(0x7f0000002300)='net/rt_acct\x00') sendfile(r0, 0xffffffffffffffff, &(0x7f0000002340)=0x3, 0x7) 11:00:27 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4001, 0x0, @empty}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r1, 0x3, 0x0) getdents64(r1, 0xfffffffffffffffe, 0x29) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000580)={0x0, @empty, @multicast1}, &(0x7f00000005c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000022c0)={'team0\x00', 0x0}) sendmmsg$inet6(r1, &(0x7f0000002400)=[{{&(0x7f0000000080)={0xa, 0x4e23, 0x7, @private0, 0x3}, 0x1c, &(0x7f00000000c0), 0x0, &(0x7f0000000100)=[@rthdr_2292={{0x68, 0x29, 0x39, {0x2f, 0xa, 0x0, 0x3, 0x0, [@private1, @private1, @dev={0xfe, 0x80, '\x00', 0xe}, @loopback, @remote]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x1}}], 0x80}}, {{&(0x7f0000000180)={0xa, 0x4e20, 0x4, @loopback, 0x6}, 0x1c, &(0x7f0000000500)=[{&(0x7f00000001c0)="dfebfd0a6029a5e97e71a1af3f98b000d47b467b950d7bbdacc1dec653bf2dc27e5300110a084b146301832400dbc266c2e99b022e8214c2d79b2147316fb6f1799594b6e14e455209bdfb87e05617e125dc5f6858328d1dadaa85c6fc590a654e89490d1f69bff7001e7a9db8892a3211a7897c", 0x74}, {&(0x7f0000000240)="aafb43648feddf485338f6387a42bf60edac289bc5421b87b8b4199dd6ffa9c899b9764867f630258c1bfc9f373a2091dccc4e81b6cadf3c7393e7810cb50a2a78607222567fe768aa7e891889106a4cd5cf390b506243262f864244c47afba5c8aaa9207ad5f616a2c6ac86362e9e2d3bbddb084f0b51a0ddc57fbcb03007459e0f518578289857c5e80fed49e4c2a8fd7e78f728ce2bd2fafa9ade212e599ccacb6f75ea16", 0xa6}, {&(0x7f0000000300)="d6f528fbc4daf3fab588a5109f251bc4af56c7fff611e35b40d260e9112a909e97145e6f2a50a07255d2439aa96981038cb4699c75b851adcf5fd7f701d99796d28fa86ef150c1abeed5f82ee9136afcdd5078e44b2d2ca1ebaf478091a219fd1310ca1768196e2b", 0x68}, {&(0x7f0000000380)="a5c5bc37def48cef871957c75765c06e4f11710c42f6330ac6eb85ee64db054fb84cca85e448ff95fd361d986e0e13d63bc2234499dbe6ba31532fc27bd94f0520a95c5d18c599cf999a80aa2d2c4253b2121cbd5251bda733ede5d6005124da85d77ae4a59f1084fcde1819823a7feb8c10d5895a902b5d7d915198566314c7995df276ca60cb41aa6797ab3b10e3446979764d9951147377a3ed277057fa192421b8d0b6013f81383dca4a3a93ab123c0f9fef15521ad977b09f4116635ab35fbcaa74ebb9c3f585ca484e6096a86f48e2", 0xd2}, {&(0x7f0000000480)="ef8abecac61aa2d01f700f178fb1d96b11190b3e7c6d0d6d6dcc9c4bee16d6e950de6182ec964290a36fd4485c5308dce7af12f89a7cdb45c7cb5604157badb1748943d1d65ea9d01461484fa52953321f559c63f879a29b0e61cb4b125730d3", 0x60}], 0x5, &(0x7f0000000600)=[@hoplimit={{0x14, 0x29, 0x34, 0x6}}, @dstopts_2292={{0xb0, 0x29, 0x4, {0x16, 0x12, '\x00', [@calipso={0x7, 0x30, {0x0, 0xa, 0x1, 0x4, [0x525d000000, 0x4, 0x2, 0x7, 0xf28]}}, @enc_lim={0x4, 0x1, 0x8}, @calipso={0x7, 0x10, {0x2, 0x2, 0x0, 0x5, [0x800]}}, @pad1, @generic={0x55, 0x47, "81c59df45479555215b46c7b741b33a6ac9fa6d4dc95d8ed7349b6d1197774ef1a385b97638776b0d66b0507159bfa1e8db07db4940fcb0a7ef53d5168e8d3dbf813705cfaa70c"}, @padn={0x1, 0x2, [0x0, 0x0]}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x7fff}}, @dstopts={{0x38, 0x29, 0x37, {0x62, 0x3, '\x00', [@calipso={0x7, 0x18, {0x1, 0x4, 0x3, 0x6, [0x81, 0x8]}}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@ipv4={'\x00', '\xff\xff', @broadcast}, r2}}}], 0x140}}, {{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000740)="f1461e3c483aef31180b66ff6d967e3a65de26b889280c792fec5849283cc026c2c8c48eb4b9249070078fb45f7c530e23e67658e294970048d40a4231deea69660b7ccbd1bc2583cc91e3a3af37d1a422fe852d691f51d317c4161907daddcca576b4802ccb1a5a94c651d89b3be14fff373c7eddb5de04f9a7f7f7d9afe62404fb438b424b36a348cea614a3dfdd628d2312efd2bfe299bdc8ce46c369f1f7", 0xa0}], 0x1, &(0x7f0000000840)=[@hoplimit_2292={{0x14, 0x29, 0x8, 0x1000}}, @tclass={{0x14, 0x29, 0x43, 0x2}}], 0x30}}, {{0x0, 0x0, &(0x7f0000001c40)=[{&(0x7f0000000880)="efee408701270bf3170a0ddff28d5d5b174ca166308230ce6eded1283c517471f2ae55b11df74bb4c14d45ec6e4550da4ad23c6859b87dde1ed51befe271539a62a9fb6d084fecdb5f1f2da0198f8ef6d5e755dd15621490e7d8ab63e6cbe985969b85da875348f94af66dc523a8ecd32bf92bea3f03e8fb01a8d140cd0640fbc127915d0d537dca3565a3ec846962ef25243b6f1c1d66963abad21978031648ad01ed4f2295f81f5de9452e66cf5c8c13f066346013bc435b0cfc2141daacf9ce6629bb6012632fcb0e4fe20ceca474f24d6b8daa36bce52f05278967b490861b09f5e027c2a7065475ed61a1356aea40163861c65d9de098db5de5262ba67c52d9c0a082c4b24970fe7f39eea7a1c5bed5befdbcb793583d354c1f1705161926101627d17704f56b63324a7d8e6728de6e2271e5c3a3ea5b9629dbc55cb999901cecb3dd48d2b53ab539a3659248bfa06abf976826dd9c5814b43d6c230d843427503eb1f15a280143d25370c1135ccb647513acc5c7fcee22f23b7111cb4fb89938bf4565510715b1090b559d1eb064831ca43a49c487a5bba4bbc9dcfc33e0a7873ec702905388daac1838b54c5137df19f8b522028e9e974e23541f5985988c20528ca93bf90381cec4e5cf8e661e5fd7304b1471e083da31365865cf380cf2954097ed679acf996b320532864dab9fd687c4cb71ded7f898ebe6ce9f8a3b132dfd78e06577bd6481d39aa6577296ac6e87f25b60ed2bc0feb6766c8557a4c3cf66f4b490423e61394862a3476150c959e4cee51be4d3cef1565d6c61260a772cea402b860ddc5328ada48b2f02e29813e0b029b1d192345d2127bb5b38ade0f1c1bf7319f4a766f3a7cac97f25d0d58d80c0e1bfc906d36c0fa5e432060a2115930af77a8949330f6181c1eb1622f5019278c2446fdc30a0ec7da837815960f124f4272424a7d35cbe4a58d2d21a36859da1dc93772b343e92e4213be2ecbdb9a14cfd1c4d850c5d72cb40f2847ec3775f5575a43da1d5c19cca26cb4f8dafbce483c9dfa74627c6b69fbb54f45d4762b15efe84a155a2b2e3351c7b344e99eef91cbdeacec71d26ffbb435ab27aa2478d103423c084b986c3ad46a026d9bf67ce99568b2cfc7ba30aa31ae077a410517a9cb199c04865eba0fcf329636b45aa80a775ec6f59c02f928cc757a23c43d8f248dd0b1fe839394ed84b0782dca33995a4637322d0126e4bc9c9811a0e6cddae7852cc5729f3850bace0e3a536e6fc5ef7c5d72b2c391de99e0c0d10742d93fa57aee2d51f730ed4be3a5a7c330ea9deda4b787e2516d4067fc568d8ec19f75a4ad1c47c385b10c8e258dc06f96a74368efc0494bbfe87ae53f77d064762d0666713fa0a707848ce839790ab1db783bdc4a67cbaeeabe11739e9d630d3aa54f72e48508463ebe290929cee359be4852ab4ee520d7b01bbea99816db3136891a31b1f4c886616417b1e14c8f33f9af4d4374c2d2741537e6c933badbe85b0f0b3e20b370e062eb1fb707253ed6a3a50e868034c6959b397f0d38340d50242cc6e4c1854c468f2ac16612b5293b66a4050d2ad55c884690dd3f530be9e2e4a2b2bf104519ee3cec9e5b84e2025ddddd2d26209950ab8633be8aef442336f8fcbcb4413a9aaf91d8f7a5600321787a018d325ddbbbe294720b360ee3d3d1546ee5a088c1c0ab38337fbc1dbfd15b9dddab6ce64c56be32c02db92627eaddc87ea35184ec50b67270e2c9386fd87285cf5db5de19c443d7fdac9906fadb2a11f49fb80081659ea8e985fbf716b3090c5ce481e526cf758bfa92de8656f086b2181270647657e42b9949f0bd4645a70cd09dda1386cd294c4880cbc119946b7b7fa4a4adb89cffc03ef49925e8b3a6d4295747cc1b37d35cce451b7c466b034ccecafe7eca5a10c0b97cd0d4eb78f6ef03be92c36e71be18ff16859bcdecc35fef75184f66dd9820b2cbb199556975e9618c4827c304d1986d96c0099c5c5362e586e84fcc9dd70a40338dcd857ae78191072403082036b28b01b42ada26f5b609360b131fda3f86296f9ff68701ae14edb93bd7baeec1d21ce00c543f50c81968c53099abbef5e6837afbc7508b494d9e6e2faef79f2448511ac38a09772b5bb564c893fb7bbb74c539804ebece0c14afe2346f8863c6fbf95172428495849871f1919e3cfa45368888b86c46c6873df5710230bdb217dc968e89789dbabbc403470f19b42dc4adc920ca44cbcb6fd3a74bef0c796787ade1a2933688e5fe5c23ac3bccd461668185c77eda5fa0295baf6a09d3afa21a3c7f6304f7a01cbf70094570878bf4e32220a107d22af1d6729d32e9db21daf2d0177bff7c753dc484e49fbd0b98b367bcb8249df538630008717c172d06623910895d6bb1dad5af045885c8b94f5eaf6183f1147954059d99bb0650e06fa820d05358c29bd069e640c79cd980f1a92bbe606874ee668d3e95369ef5d9fa574529a51e6a3fea9774460a42af5a49a730fd40067ad6bb81f12cd8f7c2a44fee003d8ffb48642290126b0a406af630339bfa7ba57f3223d0235243eee7edf4eb2d056431bed057248f05d14705fe81643498bf6fb6e95110308b21c91528de0805c24a6237b51ff5dd64636f4c707218106133dda9a9f981f24b30a591628c59ed6114644dc5cae652317e1fde703b83cda37670205b4d5719901de358f754a5312bb2fc621166966d461731d0a278119b31c4b091e8202c11fddc3c5bc8437c003601c390e4504bafcec36ffad1871722e28d5a22473ac1c4a2c2fb49372b0d679e88098cd25627557d0ed355b7ce07d8d3ac14f22805465347dd1fc49c95c34189452062014ac9e0242c2eeeb277c151855d22dbffbad219055d3e45b78a7069cc0f0431550da137fa62d41ad28e8f6429ad2fe1cf65c0a4f024462825e50205b8ea7809ae82ebf99c27848883aceac1a0805ff91f5b90621d6400f5fd9db5bc95a382f9b0607c6bf5efea5d1094998cdb0bdab0f6832c0a8d46a7ded4d4491409c2a6102e4f7e2a644cd243ce5cd18075f9dcd0948c521457b270508c32436054320fe8be15f92b2cd72cfd1d2529530a5c7d312decd67a0492064e5a19ffcf8ce457f72ade1e78359a17f92039a9fd95fd709df08489975f38dd339a73915392559241d263ea41cde83372c52c1e2f984f8fdbb7d42c99f2aff8ae7782c0d7e05fab816755c9cb47e78a2b5d400d8ff9bdd325aa645ac261a0335be514a0d1dad2c8d4a6d559e6718b15e7951639d1edbd137d855a9b3af300b3c47a8aaf5fc7827fcbc2295c117c9d0dc719cf10b066115f66702bc181303b1d5e72eaf21466cefa9fe3a6dfd67c50136b3fa4ceb30c9c1e69a53251a934fdb28ead0ea4d71cd6443ee386959714ddb1ae0f0870438fbf31d8440e72d07e5324c038a979d6f4b7b8bd27c91b57f5aec87ee1f066dc2fc3e8e949de56744ce5fc45db153aeb9d7c84325113ca3aed73ee76c0622a60f35a8e01e0bcc069b8eb2b7a857a271b120a4b4668d6d6cb057f174d6f2e4144da0275ed9f297d8a6fa1413ac77a6d39d284a1a1424e3172b12480ab26992df2aca0e183b18377b7a77433526ed9503381cd4eb785e6142995c19b14d30c37936f3505001f789a0ca96cd45d12927dc869f749f5c3acb00849c6567b828253830bec7497c1088ca3ee9c519a6ced10a9f5968350b13a1bf5ad5f19cfc6343c8771999aea4ac5cfd523aaa5dae5b00e8ab200dd6367567a5c0c1908950d3c72de843cb803a4b43b95cb5b05d783010e292e07b8d06b3ff81ef7f2dbb86d237b2a6744b0c818c83b28cbf694b60c97bd0c8fa2cda959b63a4c6427430cea649205e7682d8ab58d2e47718542b35b09762423a97abc515ed734a68b3ee9c7570a9d14feeadfc2bafb2e8d85cf937fb28e9576d9fb24039844aa518cae5e5fe0cd67865fc5df8e18b84614b772dab51658aad704981c61dffbbd41bf7d638c18c6f630f26b3f3c0f8d635262f53598745fd9e8f186d763f9ba67e4ecef997920c21617e9d2f1c9f046a2b84274ce0e435a43d2a76debfd8ad3c48b78b7beea6a6d1a57d8bc2dc50bfc7d95e0bb0ee47716176a3a6e41bf94ac416049923ae11f91ec47d57e52cdf2816d5ccfdd831fbc8c3a50f3f88a3cf0c5a822c9221fa693c1744a8d6e290c3cc1285a05414e935f47e1e951d4a46ee89ea788df61d45adb4ab9989e0c72dbab6f6f4a16b5f00b8f4bbedc2ba701015b143325232341bbcb4d05d35581bebad43f4587cb5b7793413dff44cdac0298de12e0dd45f4a193e69eae696fb334f25a1c91904dd279738adc6ad41a8216e3484395b9f32e333cdf875bf5651678c92239b4987d2a02eda333e9007c38c41612ca92e269a06453d9b929ec5edf15f0e1741a192627b713d66aa49ab98b15400b7307d738ed9b573c45f6e4c43b1f6f65427b38cecb16884aadeed796803203e925924f20f59e0b2c0a754c6f3a8dca599155ae4496b4dd6ee7fbe381cb420f8dfadb33a33b5005633f9816d58bb982b9a4b44484638f0cb73db70addde2f6328227e8773d51782cfe6b97b844c2f6a3ecdc2523eba47946965fcba660163c955f76b8842abb32c8e6ddfeb942f4bb53ce0ef9e2b0ab652c9f46b0d9c35fcfeb2f327485383b89b1e7b9543f585c4dad406dee7620c013940e31e5127091cfb3ca670c8e34accee1590b3c301954794119fc52afcb6893cb303aaf5702167d7a066e03fc766f159e84048d7eb4c0b8f01415818a20d2026d27f3ff3e772e2ae459bd5a6b7847797d14df0f45089192e084187bf4a13a2b1bfd72d0b8cd09cff6b12942ab632473f5f30dee132d5cc41915c87f534568e025af5e366d336ae7784b186429dde1fe59f74ffe5b68395425620b31da87149a36fb7123f84b17944567e202cfc434df969d1958fc6fba32b6fa5b85f3272b98e98e740e3e9d5fbc416703e1bf4699b672655adc238c8cf665ab3542b55c5cb7fb8b8bec3e41e5c4c8ae513a8b04aa15a143e4ee87bb53229bfdb4d2c89a21717d2f054f728a9f4ad797b9fae494656dc73fa8bbc6d99e4b85aabe0977ed3565c29c46cdf7a02a692b854b4f84e4e624479b8d700772eec4c06e5eebb8b3efa4297e7850683fde4e991f21e9e1d43a116c580d89fb72c753cbae72c1389210802643c220b86777c5171adfb8aed7d4082490bdc821205a9cf291fbb0154b91ffa6338414b2a06fbef1c243ef1a5a8ba57bb84e23245e9379ffb9ecabc6a44e1f640440fa970cbc390b55e07ec0b43c875e966abe66aa410ee86d1b6fee812cb88a758a93c1ff90f8c50f1e4e944c07dd5991e23a02e679045656c1e72b2a936fa4f22392f9d8ac84d5125e6f766b5db3ebf40df845f9da115e13f29980c4f476887db391cc69b186a4c2e52b101a124d6fe9c7be9334804237b3bcdce5890dac03270b4f1cdd1633abfc6242343320fd4b9f9a0010ec5c7d38397e2d00304913c48e4b66336642d9f3f3e3e423f43da18be3d2b8a9c48c8b8f070e9809a2e8ce209e3d20f98c427a1d33ba01f6e460f1da3280f33a0de1b9df136c8f83166ba0385e3f14ca379dd4a26095f72685613083aac002c9725860d20644cd10ed5cf8cc6eb78c9b528878d2bd1457240e1dcc3443138603289e9dbe23d1d51ffbe05884d066228c707938bf12afc6d213f422ac97639ec01ec4a90e8e8e7294fd2d2d8db7c74f6e6dcef1506ebbebc50c29ed67f3f17efb332cd1e7e043", 0x1000}, {&(0x7f0000001880)="0693ae5c1705435d8e1f784116c25db5a48b13a2d6b001879c67800048d9533bb3fcdbe4f7065cf3f0c1aa3a957c237f3f80115e042fdba9d37bdee03f189f90ea1b89d78cd841f6b0242c89740a31aa45eb56a87dd2228789ded7a8c6ac7f4466bbd091324442480f63234801f32d6f0fb00ec85903fa97d8c725dc3c31ee2c4a238d20ff779364770d", 0x8a}, {&(0x7f0000001940)}, {&(0x7f0000001980)="3bb33bc6cf4787b9fc5e43014b4eab16298aaefcfb2941a8c1f280f4f025a24afec850daf7b3ff63a65426457e4dea348e440ff764ccee7beeb5b79edb7fadf40304e842998742e60c6ccabac2c51164139b5530ac163e30dcb56b517ea9cc1fa3a8e5dcdbecae01e6ce", 0x6a}, {&(0x7f0000001a00)="818f142c8ef1a7ee888ab76d3727c85f04ee3311652a181a7eb0", 0x1a}, {&(0x7f0000001a40)="8d93b005438a6e2e019e3598af917f62779f4fdc265a190c8dbe1ef9edd6f846186c22c0a6b6efe47334f1fe08882ea98d3d50b583fd43d50f97cfd2d21b070f371f23f5ce2621ce690a3a4a3bd40e2ea0bdd4d6c69191d6a4984fc678c38b4617e025e77c3b1b13d71a1875e010ca84c4871f71650e2a", 0x77}, {&(0x7f0000001ac0)="211063f0e2af47bd576321bd7d0041872d03aeca92f05126e66e43e9b7b46d81b4a4edce3450f98e", 0x28}, {&(0x7f0000001b00)="8a191f668efbf14041dec487e14674314a25697690ea9fd9d034cdc9242d5f9618943c63285764bfe0bbafcc5fb2e94b72949646163375889790aebbb01e8e9629186f179d68763f377ab98bc0943f8fade060d2052ef2b128552b5bf89d7fffce8b9636903ba6ee29be2b893d5a831838ac1bc6653cf6b6733b8df00611e3da5387a6c4550e8c67bbc848b5d357e7cdcfa456d764b2ec31345a158ad17746408990f132279d132f613b80514ee181ab73b135703fba3bd1d83c8e2ee89627117a8e6dba9c9eacb9", 0xc8}, {&(0x7f0000001c00)="81ac5c4867bcbb2c71dc4af31eb48ba964039fbf014f29b46c4f01620614140e39bcc7890e66a9d4a8bf5a4f8b37a8699817d266b3", 0x35}], 0x9, &(0x7f0000001d00)=[@hopopts_2292={{0x20, 0x29, 0x36, {0x62, 0x0, '\x00', [@enc_lim={0x4, 0x1, 0x66}]}}}], 0x20}}, {{&(0x7f0000001d40)={0xa, 0x4e22, 0x4, @private2, 0x7}, 0x1c, &(0x7f0000002240)=[{&(0x7f0000001d80)="d2ccd002336fdf1dbb3efeb118ad5e0074fd4393413f751e4a8910a3abd5c1d995f2694a0f5068dae58ba0fe0a0d7e731ef1f05736d11d6d9fde0cca37784b7302d374d9cf187e8dfa9588e64c026be72cd4024c727b7a269229a7df6eafde027dfc6d829f41bd8e4d8a7385d055e6fbf95e95fec6ec3ca49f6c81dee9d5657a52eeba0a4ca54d999bd8c8140153240c19a1b2d3a5d76acc513ab32e7dc5bc822a861b2cd9968b82b1b09da1a36c03ff56a02e6162da537c4c5d19e7b5b923bc4525394b3c21d47e0e", 0xc9}, {&(0x7f0000001e80)="5db196b0303412dee3099624996549266ced99f74580492195663ebb79434837bee3fef584eb114200367305539c", 0x2e}, {&(0x7f0000001ec0)="357743cb1130dcab876c6de600242f4f90375f46d20e582f361da9afac90249787f147b8296ac448e62d43529a839f2fa59e4bf3b559f7450191a9b8aa1381457e3fc99987688041d5abeda26da730f7960e64083f379c3133d75f48aa62e798364dde7cc31a187fe80412b741e557fefd46071bed130aeb1581f408071634190fe593db5a309a2db99d65f9cac8797c69d43406e8244b46f3937757c761056e856c5db8356818109b8ede08df2aba3f619f100ad14a703b65fd474afa6671f8", 0xc0}, {&(0x7f0000001f80)="a3ac7892134f0b88d662e7ea5ffbfaac4c375760e84f5135ba8e759a0fde5d096165a452991eda6e61289431bd94ff1386b23ae5bf4120a840afc5f494074abab0b15dee8df4552791fd01d12a7f37c76d7f7d80de0e8d8082f53ae1f7d99f9d081a7bcdb27fc154511944a7f7fd3a9aec416f0b8a3fd42a74aa347e21e90e76851b9d198a3a8aa9b2bb4ad7947a1fbb374c11df88bfd9fccb1464d546995fe130d9426a0b1051939d465b7b95f636c2dbbf565c58f4074e9bc8e4912cbfd7dcfa8437235b53f06680a905204298820385ccb1", 0xd3}, {&(0x7f0000002080)="273d430594fff1c7dcd7087ac2f463c4808e0ddfadae08da6c9831bb81db938bc22007afbe99691e641d0c7754e9b2f8f44ad2be7f36c6df86333138ab3f7f50f3abf45841d1bfc5764c", 0x4a}, {&(0x7f0000002100)="a40636e8ed0e83a277ed34ea77ab14394a2a04eb2ca8155612f77a16299aa1df147b4bc4d258dd5168619706a15bdf12c0c8e070a285aae5b68a4d3b7ceca7caba", 0x41}, {&(0x7f0000002180)="9ca5ce2397928d89d0d21bf95ed748a35bba9b40b19590f57f1b36620571c9fb4e6dbce2f3611fdf9361975e9d50fd40dd4680460a0d0cbdebcd6829bc66f42dbffcf044b4667df8a6b43e3171a029ba013f2e6bf303863eefec46849e43853759e91f671436cb0aca91537c7d24ecfda810932b4b9f82611c8bed4cf33c1738c9aaeb368c96002ce5163f16", 0x8c}], 0x7, &(0x7f0000002300)=[@hopopts_2292={{0x48, 0x29, 0x36, {0x16, 0x5, '\x00', [@jumbo={0xc2, 0x4, 0xa7d}, @jumbo={0xc2, 0x4, 0x2}, @hao={0xc9, 0x10, @private0}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @ra={0x5, 0x2, 0x200}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@private0, r3}}}, @rthdr={{0x78, 0x29, 0x39, {0x4, 0xc, 0x1, 0x4, 0x0, [@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @remote]}}}], 0xe8}}], 0x5, 0x8080) socket$inet6_mptcp(0xa, 0x1, 0x106) r4 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000040)=0x2, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x20008cc4, 0x0, 0x0) 11:00:27 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000001800000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) [ 568.746503][T16307] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 568.758089][T16307] EXT4-fs error (device loop0): __ext4_fill_super:5226: inode #2: comm syz-executor.0: iget: root inode unallocated [ 568.758260][T16307] EXT4-fs (loop0): get root inode failed 11:00:27 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4001, 0x0, @empty}, 0x1c) (async) r1 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r1, 0x3, 0x0) (async) getdents64(r1, 0xfffffffffffffffe, 0x29) (async) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000580)={0x0, @empty, @multicast1}, &(0x7f00000005c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000022c0)={'team0\x00', 0x0}) sendmmsg$inet6(r1, &(0x7f0000002400)=[{{&(0x7f0000000080)={0xa, 0x4e23, 0x7, @private0, 0x3}, 0x1c, &(0x7f00000000c0), 0x0, &(0x7f0000000100)=[@rthdr_2292={{0x68, 0x29, 0x39, {0x2f, 0xa, 0x0, 0x3, 0x0, [@private1, @private1, @dev={0xfe, 0x80, '\x00', 0xe}, @loopback, @remote]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x1}}], 0x80}}, {{&(0x7f0000000180)={0xa, 0x4e20, 0x4, @loopback, 0x6}, 0x1c, &(0x7f0000000500)=[{&(0x7f00000001c0)="dfebfd0a6029a5e97e71a1af3f98b000d47b467b950d7bbdacc1dec653bf2dc27e5300110a084b146301832400dbc266c2e99b022e8214c2d79b2147316fb6f1799594b6e14e455209bdfb87e05617e125dc5f6858328d1dadaa85c6fc590a654e89490d1f69bff7001e7a9db8892a3211a7897c", 0x74}, {&(0x7f0000000240)="aafb43648feddf485338f6387a42bf60edac289bc5421b87b8b4199dd6ffa9c899b9764867f630258c1bfc9f373a2091dccc4e81b6cadf3c7393e7810cb50a2a78607222567fe768aa7e891889106a4cd5cf390b506243262f864244c47afba5c8aaa9207ad5f616a2c6ac86362e9e2d3bbddb084f0b51a0ddc57fbcb03007459e0f518578289857c5e80fed49e4c2a8fd7e78f728ce2bd2fafa9ade212e599ccacb6f75ea16", 0xa6}, {&(0x7f0000000300)="d6f528fbc4daf3fab588a5109f251bc4af56c7fff611e35b40d260e9112a909e97145e6f2a50a07255d2439aa96981038cb4699c75b851adcf5fd7f701d99796d28fa86ef150c1abeed5f82ee9136afcdd5078e44b2d2ca1ebaf478091a219fd1310ca1768196e2b", 0x68}, {&(0x7f0000000380)="a5c5bc37def48cef871957c75765c06e4f11710c42f6330ac6eb85ee64db054fb84cca85e448ff95fd361d986e0e13d63bc2234499dbe6ba31532fc27bd94f0520a95c5d18c599cf999a80aa2d2c4253b2121cbd5251bda733ede5d6005124da85d77ae4a59f1084fcde1819823a7feb8c10d5895a902b5d7d915198566314c7995df276ca60cb41aa6797ab3b10e3446979764d9951147377a3ed277057fa192421b8d0b6013f81383dca4a3a93ab123c0f9fef15521ad977b09f4116635ab35fbcaa74ebb9c3f585ca484e6096a86f48e2", 0xd2}, {&(0x7f0000000480)="ef8abecac61aa2d01f700f178fb1d96b11190b3e7c6d0d6d6dcc9c4bee16d6e950de6182ec964290a36fd4485c5308dce7af12f89a7cdb45c7cb5604157badb1748943d1d65ea9d01461484fa52953321f559c63f879a29b0e61cb4b125730d3", 0x60}], 0x5, &(0x7f0000000600)=[@hoplimit={{0x14, 0x29, 0x34, 0x6}}, @dstopts_2292={{0xb0, 0x29, 0x4, {0x16, 0x12, '\x00', [@calipso={0x7, 0x30, {0x0, 0xa, 0x1, 0x4, [0x525d000000, 0x4, 0x2, 0x7, 0xf28]}}, @enc_lim={0x4, 0x1, 0x8}, @calipso={0x7, 0x10, {0x2, 0x2, 0x0, 0x5, [0x800]}}, @pad1, @generic={0x55, 0x47, "81c59df45479555215b46c7b741b33a6ac9fa6d4dc95d8ed7349b6d1197774ef1a385b97638776b0d66b0507159bfa1e8db07db4940fcb0a7ef53d5168e8d3dbf813705cfaa70c"}, @padn={0x1, 0x2, [0x0, 0x0]}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x7fff}}, @dstopts={{0x38, 0x29, 0x37, {0x62, 0x3, '\x00', [@calipso={0x7, 0x18, {0x1, 0x4, 0x3, 0x6, [0x81, 0x8]}}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@ipv4={'\x00', '\xff\xff', @broadcast}, r2}}}], 0x140}}, {{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000740)="f1461e3c483aef31180b66ff6d967e3a65de26b889280c792fec5849283cc026c2c8c48eb4b9249070078fb45f7c530e23e67658e294970048d40a4231deea69660b7ccbd1bc2583cc91e3a3af37d1a422fe852d691f51d317c4161907daddcca576b4802ccb1a5a94c651d89b3be14fff373c7eddb5de04f9a7f7f7d9afe62404fb438b424b36a348cea614a3dfdd628d2312efd2bfe299bdc8ce46c369f1f7", 0xa0}], 0x1, &(0x7f0000000840)=[@hoplimit_2292={{0x14, 0x29, 0x8, 0x1000}}, @tclass={{0x14, 0x29, 0x43, 0x2}}], 0x30}}, {{0x0, 0x0, &(0x7f0000001c40)=[{&(0x7f0000000880)="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", 0x1000}, {&(0x7f0000001880)="0693ae5c1705435d8e1f784116c25db5a48b13a2d6b001879c67800048d9533bb3fcdbe4f7065cf3f0c1aa3a957c237f3f80115e042fdba9d37bdee03f189f90ea1b89d78cd841f6b0242c89740a31aa45eb56a87dd2228789ded7a8c6ac7f4466bbd091324442480f63234801f32d6f0fb00ec85903fa97d8c725dc3c31ee2c4a238d20ff779364770d", 0x8a}, {&(0x7f0000001940)}, {&(0x7f0000001980)="3bb33bc6cf4787b9fc5e43014b4eab16298aaefcfb2941a8c1f280f4f025a24afec850daf7b3ff63a65426457e4dea348e440ff764ccee7beeb5b79edb7fadf40304e842998742e60c6ccabac2c51164139b5530ac163e30dcb56b517ea9cc1fa3a8e5dcdbecae01e6ce", 0x6a}, {&(0x7f0000001a00)="818f142c8ef1a7ee888ab76d3727c85f04ee3311652a181a7eb0", 0x1a}, {&(0x7f0000001a40)="8d93b005438a6e2e019e3598af917f62779f4fdc265a190c8dbe1ef9edd6f846186c22c0a6b6efe47334f1fe08882ea98d3d50b583fd43d50f97cfd2d21b070f371f23f5ce2621ce690a3a4a3bd40e2ea0bdd4d6c69191d6a4984fc678c38b4617e025e77c3b1b13d71a1875e010ca84c4871f71650e2a", 0x77}, {&(0x7f0000001ac0)="211063f0e2af47bd576321bd7d0041872d03aeca92f05126e66e43e9b7b46d81b4a4edce3450f98e", 0x28}, {&(0x7f0000001b00)="8a191f668efbf14041dec487e14674314a25697690ea9fd9d034cdc9242d5f9618943c63285764bfe0bbafcc5fb2e94b72949646163375889790aebbb01e8e9629186f179d68763f377ab98bc0943f8fade060d2052ef2b128552b5bf89d7fffce8b9636903ba6ee29be2b893d5a831838ac1bc6653cf6b6733b8df00611e3da5387a6c4550e8c67bbc848b5d357e7cdcfa456d764b2ec31345a158ad17746408990f132279d132f613b80514ee181ab73b135703fba3bd1d83c8e2ee89627117a8e6dba9c9eacb9", 0xc8}, {&(0x7f0000001c00)="81ac5c4867bcbb2c71dc4af31eb48ba964039fbf014f29b46c4f01620614140e39bcc7890e66a9d4a8bf5a4f8b37a8699817d266b3", 0x35}], 0x9, &(0x7f0000001d00)=[@hopopts_2292={{0x20, 0x29, 0x36, {0x62, 0x0, '\x00', [@enc_lim={0x4, 0x1, 0x66}]}}}], 0x20}}, {{&(0x7f0000001d40)={0xa, 0x4e22, 0x4, @private2, 0x7}, 0x1c, &(0x7f0000002240)=[{&(0x7f0000001d80)="d2ccd002336fdf1dbb3efeb118ad5e0074fd4393413f751e4a8910a3abd5c1d995f2694a0f5068dae58ba0fe0a0d7e731ef1f05736d11d6d9fde0cca37784b7302d374d9cf187e8dfa9588e64c026be72cd4024c727b7a269229a7df6eafde027dfc6d829f41bd8e4d8a7385d055e6fbf95e95fec6ec3ca49f6c81dee9d5657a52eeba0a4ca54d999bd8c8140153240c19a1b2d3a5d76acc513ab32e7dc5bc822a861b2cd9968b82b1b09da1a36c03ff56a02e6162da537c4c5d19e7b5b923bc4525394b3c21d47e0e", 0xc9}, {&(0x7f0000001e80)="5db196b0303412dee3099624996549266ced99f74580492195663ebb79434837bee3fef584eb114200367305539c", 0x2e}, {&(0x7f0000001ec0)="357743cb1130dcab876c6de600242f4f90375f46d20e582f361da9afac90249787f147b8296ac448e62d43529a839f2fa59e4bf3b559f7450191a9b8aa1381457e3fc99987688041d5abeda26da730f7960e64083f379c3133d75f48aa62e798364dde7cc31a187fe80412b741e557fefd46071bed130aeb1581f408071634190fe593db5a309a2db99d65f9cac8797c69d43406e8244b46f3937757c761056e856c5db8356818109b8ede08df2aba3f619f100ad14a703b65fd474afa6671f8", 0xc0}, {&(0x7f0000001f80)="a3ac7892134f0b88d662e7ea5ffbfaac4c375760e84f5135ba8e759a0fde5d096165a452991eda6e61289431bd94ff1386b23ae5bf4120a840afc5f494074abab0b15dee8df4552791fd01d12a7f37c76d7f7d80de0e8d8082f53ae1f7d99f9d081a7bcdb27fc154511944a7f7fd3a9aec416f0b8a3fd42a74aa347e21e90e76851b9d198a3a8aa9b2bb4ad7947a1fbb374c11df88bfd9fccb1464d546995fe130d9426a0b1051939d465b7b95f636c2dbbf565c58f4074e9bc8e4912cbfd7dcfa8437235b53f06680a905204298820385ccb1", 0xd3}, {&(0x7f0000002080)="273d430594fff1c7dcd7087ac2f463c4808e0ddfadae08da6c9831bb81db938bc22007afbe99691e641d0c7754e9b2f8f44ad2be7f36c6df86333138ab3f7f50f3abf45841d1bfc5764c", 0x4a}, {&(0x7f0000002100)="a40636e8ed0e83a277ed34ea77ab14394a2a04eb2ca8155612f77a16299aa1df147b4bc4d258dd5168619706a15bdf12c0c8e070a285aae5b68a4d3b7ceca7caba", 0x41}, {&(0x7f0000002180)="9ca5ce2397928d89d0d21bf95ed748a35bba9b40b19590f57f1b36620571c9fb4e6dbce2f3611fdf9361975e9d50fd40dd4680460a0d0cbdebcd6829bc66f42dbffcf044b4667df8a6b43e3171a029ba013f2e6bf303863eefec46849e43853759e91f671436cb0aca91537c7d24ecfda810932b4b9f82611c8bed4cf33c1738c9aaeb368c96002ce5163f16", 0x8c}], 0x7, &(0x7f0000002300)=[@hopopts_2292={{0x48, 0x29, 0x36, {0x16, 0x5, '\x00', [@jumbo={0xc2, 0x4, 0xa7d}, @jumbo={0xc2, 0x4, 0x2}, @hao={0xc9, 0x10, @private0}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @ra={0x5, 0x2, 0x200}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@private0, r3}}}, @rthdr={{0x78, 0x29, 0x39, {0x4, 0xc, 0x1, 0x4, 0x0, [@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @remote]}}}], 0xe8}}], 0x5, 0x8080) (async) socket$inet6_mptcp(0xa, 0x1, 0x106) (async) r4 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000040)=0x2, 0x4) (async) sendto$inet6(r0, 0x0, 0x0, 0x20008cc4, 0x0, 0x0) 11:00:27 executing program 4: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000022c0), 0x81, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000002300)='net/rt_acct\x00') sendfile(r0, r1, 0x0, 0x7) [ 568.758271][T16307] EXT4-fs (loop0): mount failed 11:00:27 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000002600000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) [ 568.767163][T16314] loop3: detected capacity change from 0 to 264192 [ 568.771013][T16314] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 568.771051][T16314] EXT4-fs (loop3): group descriptors corrupted! [ 568.825821][T16329] loop3: detected capacity change from 0 to 264192 [ 568.829289][T16329] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) 11:00:27 executing program 4: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000022c0), 0x81, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000002300)='net/rt_acct\x00') sendfile(r0, r1, 0x0, 0x0) 11:00:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:27 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4001, 0x0, @empty}, 0x1c) (async) r1 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r1, 0x3, 0x0) (async) getdents64(r1, 0xfffffffffffffffe, 0x29) (async) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000580)={0x0, @empty, @multicast1}, &(0x7f00000005c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000022c0)={'team0\x00', 0x0}) sendmmsg$inet6(r1, &(0x7f0000002400)=[{{&(0x7f0000000080)={0xa, 0x4e23, 0x7, @private0, 0x3}, 0x1c, &(0x7f00000000c0), 0x0, &(0x7f0000000100)=[@rthdr_2292={{0x68, 0x29, 0x39, {0x2f, 0xa, 0x0, 0x3, 0x0, [@private1, @private1, @dev={0xfe, 0x80, '\x00', 0xe}, @loopback, @remote]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x1}}], 0x80}}, {{&(0x7f0000000180)={0xa, 0x4e20, 0x4, @loopback, 0x6}, 0x1c, &(0x7f0000000500)=[{&(0x7f00000001c0)="dfebfd0a6029a5e97e71a1af3f98b000d47b467b950d7bbdacc1dec653bf2dc27e5300110a084b146301832400dbc266c2e99b022e8214c2d79b2147316fb6f1799594b6e14e455209bdfb87e05617e125dc5f6858328d1dadaa85c6fc590a654e89490d1f69bff7001e7a9db8892a3211a7897c", 0x74}, {&(0x7f0000000240)="aafb43648feddf485338f6387a42bf60edac289bc5421b87b8b4199dd6ffa9c899b9764867f630258c1bfc9f373a2091dccc4e81b6cadf3c7393e7810cb50a2a78607222567fe768aa7e891889106a4cd5cf390b506243262f864244c47afba5c8aaa9207ad5f616a2c6ac86362e9e2d3bbddb084f0b51a0ddc57fbcb03007459e0f518578289857c5e80fed49e4c2a8fd7e78f728ce2bd2fafa9ade212e599ccacb6f75ea16", 0xa6}, {&(0x7f0000000300)="d6f528fbc4daf3fab588a5109f251bc4af56c7fff611e35b40d260e9112a909e97145e6f2a50a07255d2439aa96981038cb4699c75b851adcf5fd7f701d99796d28fa86ef150c1abeed5f82ee9136afcdd5078e44b2d2ca1ebaf478091a219fd1310ca1768196e2b", 0x68}, {&(0x7f0000000380)="a5c5bc37def48cef871957c75765c06e4f11710c42f6330ac6eb85ee64db054fb84cca85e448ff95fd361d986e0e13d63bc2234499dbe6ba31532fc27bd94f0520a95c5d18c599cf999a80aa2d2c4253b2121cbd5251bda733ede5d6005124da85d77ae4a59f1084fcde1819823a7feb8c10d5895a902b5d7d915198566314c7995df276ca60cb41aa6797ab3b10e3446979764d9951147377a3ed277057fa192421b8d0b6013f81383dca4a3a93ab123c0f9fef15521ad977b09f4116635ab35fbcaa74ebb9c3f585ca484e6096a86f48e2", 0xd2}, {&(0x7f0000000480)="ef8abecac61aa2d01f700f178fb1d96b11190b3e7c6d0d6d6dcc9c4bee16d6e950de6182ec964290a36fd4485c5308dce7af12f89a7cdb45c7cb5604157badb1748943d1d65ea9d01461484fa52953321f559c63f879a29b0e61cb4b125730d3", 0x60}], 0x5, &(0x7f0000000600)=[@hoplimit={{0x14, 0x29, 0x34, 0x6}}, @dstopts_2292={{0xb0, 0x29, 0x4, {0x16, 0x12, '\x00', [@calipso={0x7, 0x30, {0x0, 0xa, 0x1, 0x4, [0x525d000000, 0x4, 0x2, 0x7, 0xf28]}}, @enc_lim={0x4, 0x1, 0x8}, @calipso={0x7, 0x10, {0x2, 0x2, 0x0, 0x5, [0x800]}}, @pad1, @generic={0x55, 0x47, "81c59df45479555215b46c7b741b33a6ac9fa6d4dc95d8ed7349b6d1197774ef1a385b97638776b0d66b0507159bfa1e8db07db4940fcb0a7ef53d5168e8d3dbf813705cfaa70c"}, @padn={0x1, 0x2, [0x0, 0x0]}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x7fff}}, @dstopts={{0x38, 0x29, 0x37, {0x62, 0x3, '\x00', [@calipso={0x7, 0x18, {0x1, 0x4, 0x3, 0x6, [0x81, 0x8]}}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@ipv4={'\x00', '\xff\xff', @broadcast}, r2}}}], 0x140}}, {{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000740)="f1461e3c483aef31180b66ff6d967e3a65de26b889280c792fec5849283cc026c2c8c48eb4b9249070078fb45f7c530e23e67658e294970048d40a4231deea69660b7ccbd1bc2583cc91e3a3af37d1a422fe852d691f51d317c4161907daddcca576b4802ccb1a5a94c651d89b3be14fff373c7eddb5de04f9a7f7f7d9afe62404fb438b424b36a348cea614a3dfdd628d2312efd2bfe299bdc8ce46c369f1f7", 0xa0}], 0x1, &(0x7f0000000840)=[@hoplimit_2292={{0x14, 0x29, 0x8, 0x1000}}, @tclass={{0x14, 0x29, 0x43, 0x2}}], 0x30}}, {{0x0, 0x0, &(0x7f0000001c40)=[{&(0x7f0000000880)="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", 0x1000}, {&(0x7f0000001880)="0693ae5c1705435d8e1f784116c25db5a48b13a2d6b001879c67800048d9533bb3fcdbe4f7065cf3f0c1aa3a957c237f3f80115e042fdba9d37bdee03f189f90ea1b89d78cd841f6b0242c89740a31aa45eb56a87dd2228789ded7a8c6ac7f4466bbd091324442480f63234801f32d6f0fb00ec85903fa97d8c725dc3c31ee2c4a238d20ff779364770d", 0x8a}, {&(0x7f0000001940)}, {&(0x7f0000001980)="3bb33bc6cf4787b9fc5e43014b4eab16298aaefcfb2941a8c1f280f4f025a24afec850daf7b3ff63a65426457e4dea348e440ff764ccee7beeb5b79edb7fadf40304e842998742e60c6ccabac2c51164139b5530ac163e30dcb56b517ea9cc1fa3a8e5dcdbecae01e6ce", 0x6a}, {&(0x7f0000001a00)="818f142c8ef1a7ee888ab76d3727c85f04ee3311652a181a7eb0", 0x1a}, {&(0x7f0000001a40)="8d93b005438a6e2e019e3598af917f62779f4fdc265a190c8dbe1ef9edd6f846186c22c0a6b6efe47334f1fe08882ea98d3d50b583fd43d50f97cfd2d21b070f371f23f5ce2621ce690a3a4a3bd40e2ea0bdd4d6c69191d6a4984fc678c38b4617e025e77c3b1b13d71a1875e010ca84c4871f71650e2a", 0x77}, {&(0x7f0000001ac0)="211063f0e2af47bd576321bd7d0041872d03aeca92f05126e66e43e9b7b46d81b4a4edce3450f98e", 0x28}, {&(0x7f0000001b00)="8a191f668efbf14041dec487e14674314a25697690ea9fd9d034cdc9242d5f9618943c63285764bfe0bbafcc5fb2e94b72949646163375889790aebbb01e8e9629186f179d68763f377ab98bc0943f8fade060d2052ef2b128552b5bf89d7fffce8b9636903ba6ee29be2b893d5a831838ac1bc6653cf6b6733b8df00611e3da5387a6c4550e8c67bbc848b5d357e7cdcfa456d764b2ec31345a158ad17746408990f132279d132f613b80514ee181ab73b135703fba3bd1d83c8e2ee89627117a8e6dba9c9eacb9", 0xc8}, {&(0x7f0000001c00)="81ac5c4867bcbb2c71dc4af31eb48ba964039fbf014f29b46c4f01620614140e39bcc7890e66a9d4a8bf5a4f8b37a8699817d266b3", 0x35}], 0x9, &(0x7f0000001d00)=[@hopopts_2292={{0x20, 0x29, 0x36, {0x62, 0x0, '\x00', [@enc_lim={0x4, 0x1, 0x66}]}}}], 0x20}}, {{&(0x7f0000001d40)={0xa, 0x4e22, 0x4, @private2, 0x7}, 0x1c, &(0x7f0000002240)=[{&(0x7f0000001d80)="d2ccd002336fdf1dbb3efeb118ad5e0074fd4393413f751e4a8910a3abd5c1d995f2694a0f5068dae58ba0fe0a0d7e731ef1f05736d11d6d9fde0cca37784b7302d374d9cf187e8dfa9588e64c026be72cd4024c727b7a269229a7df6eafde027dfc6d829f41bd8e4d8a7385d055e6fbf95e95fec6ec3ca49f6c81dee9d5657a52eeba0a4ca54d999bd8c8140153240c19a1b2d3a5d76acc513ab32e7dc5bc822a861b2cd9968b82b1b09da1a36c03ff56a02e6162da537c4c5d19e7b5b923bc4525394b3c21d47e0e", 0xc9}, {&(0x7f0000001e80)="5db196b0303412dee3099624996549266ced99f74580492195663ebb79434837bee3fef584eb114200367305539c", 0x2e}, {&(0x7f0000001ec0)="357743cb1130dcab876c6de600242f4f90375f46d20e582f361da9afac90249787f147b8296ac448e62d43529a839f2fa59e4bf3b559f7450191a9b8aa1381457e3fc99987688041d5abeda26da730f7960e64083f379c3133d75f48aa62e798364dde7cc31a187fe80412b741e557fefd46071bed130aeb1581f408071634190fe593db5a309a2db99d65f9cac8797c69d43406e8244b46f3937757c761056e856c5db8356818109b8ede08df2aba3f619f100ad14a703b65fd474afa6671f8", 0xc0}, {&(0x7f0000001f80)="a3ac7892134f0b88d662e7ea5ffbfaac4c375760e84f5135ba8e759a0fde5d096165a452991eda6e61289431bd94ff1386b23ae5bf4120a840afc5f494074abab0b15dee8df4552791fd01d12a7f37c76d7f7d80de0e8d8082f53ae1f7d99f9d081a7bcdb27fc154511944a7f7fd3a9aec416f0b8a3fd42a74aa347e21e90e76851b9d198a3a8aa9b2bb4ad7947a1fbb374c11df88bfd9fccb1464d546995fe130d9426a0b1051939d465b7b95f636c2dbbf565c58f4074e9bc8e4912cbfd7dcfa8437235b53f06680a905204298820385ccb1", 0xd3}, {&(0x7f0000002080)="273d430594fff1c7dcd7087ac2f463c4808e0ddfadae08da6c9831bb81db938bc22007afbe99691e641d0c7754e9b2f8f44ad2be7f36c6df86333138ab3f7f50f3abf45841d1bfc5764c", 0x4a}, {&(0x7f0000002100)="a40636e8ed0e83a277ed34ea77ab14394a2a04eb2ca8155612f77a16299aa1df147b4bc4d258dd5168619706a15bdf12c0c8e070a285aae5b68a4d3b7ceca7caba", 0x41}, {&(0x7f0000002180)="9ca5ce2397928d89d0d21bf95ed748a35bba9b40b19590f57f1b36620571c9fb4e6dbce2f3611fdf9361975e9d50fd40dd4680460a0d0cbdebcd6829bc66f42dbffcf044b4667df8a6b43e3171a029ba013f2e6bf303863eefec46849e43853759e91f671436cb0aca91537c7d24ecfda810932b4b9f82611c8bed4cf33c1738c9aaeb368c96002ce5163f16", 0x8c}], 0x7, &(0x7f0000002300)=[@hopopts_2292={{0x48, 0x29, 0x36, {0x16, 0x5, '\x00', [@jumbo={0xc2, 0x4, 0xa7d}, @jumbo={0xc2, 0x4, 0x2}, @hao={0xc9, 0x10, @private0}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @ra={0x5, 0x2, 0x200}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@private0, r3}}}, @rthdr={{0x78, 0x29, 0x39, {0x4, 0xc, 0x1, 0x4, 0x0, [@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @remote]}}}], 0xe8}}], 0x5, 0x8080) socket$inet6_mptcp(0xa, 0x1, 0x106) (async) r4 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000040)=0x2, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x20008cc4, 0x0, 0x0) [ 568.829312][T16329] EXT4-fs (loop3): group descriptors corrupted! 11:00:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000003f00000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:27 executing program 4: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000022c0), 0x81, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000002300)='net/rt_acct\x00') sendfile(r0, r1, 0x0, 0x0) 11:00:27 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000004000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000008004000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) [ 568.839525][T16332] loop0: detected capacity change from 0 to 264192 [ 568.844403][T16332] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 568.860697][T16335] loop1: detected capacity change from 0 to 264192 11:00:28 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x2, @empty}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) 11:00:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000005a00000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:28 executing program 4: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000022c0), 0x81, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000002300)='net/rt_acct\x00') sendfile(r0, r1, 0x0, 0x0) 11:00:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000007600000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:28 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x2, @empty}, 0x1c) (async) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) 11:00:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000", 0x60, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) [ 568.863087][T16332] EXT4-fs error (device loop0): __ext4_fill_super:5226: inode #2: comm syz-executor.0: iget: root inode unallocated [ 568.863356][T16332] EXT4-fs (loop0): get root inode failed [ 568.863369][T16332] EXT4-fs (loop0): mount failed [ 569.563715][T16345] loop1: detected capacity change from 0 to 264192 11:00:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:28 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0xffffffffffffffff}, {&(0x7f0000000140)="373fd0ba24003f0afd25dc7a087363af0000000c1d0100000b00000014e40a026c6f73742b666f756e6400fa0fef0f000000000266696c6530", 0x39, 0x4000}, {&(0x7f0000000080)="111fc0d90104d6106c32a72d5d15005f3c000000803a090080", 0x19, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r1 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) mknodat$loop(r1, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000003c0)="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"/318, 0x13e, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010500)="ff030000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0xc00}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000011700)="ed8100000a000000ddf4655fddf4655fddf4655f00000000000001", 0x1b, 0x2203}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531", 0x49, 0x4000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a090000000000060000000000000005", 0x1d, 0x10000}, {&(0x7f0000000380)="01b1f9dabb375fc30523", 0xa, 0x11400}], 0x0, &(0x7f0000000180)) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchownat(r2, &(0x7f0000000080)='./file1\x00', 0x0, r4, 0x0) fchown(r0, 0x0, r4) 11:00:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000008300000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:28 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x2, @empty}, 0x1c) (async, rerun: 32) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) (rerun: 32) 11:00:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f00fffffff600000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) [ 569.564261][T16343] loop3: detected capacity change from 0 to 264192 [ 569.570594][T16346] loop0: detected capacity change from 0 to 264192 [ 569.587716][T16343] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) 11:00:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000", 0x60, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081e1ff00180000ddf465000000000100200000001000080000feffffffffffff0400000000000000000000000200000040000000020000000400000042", 0x3e, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x4000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="271911e079a5b7d5cab01dede5c0d90d000000803a", 0x15, 0x10000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f00fffffffe00000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) [ 569.587745][T16343] EXT4-fs (loop3): group descriptors corrupted! [ 569.596376][T16346] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled 11:00:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f00f6ffffff00000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000", 0x60, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f00feffffff00000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:28 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) r1 = socket$inet6_icmp(0xa, 0x2, 0x3a) recvfrom$inet6(r1, &(0x7f0000000100)=""/209, 0xd1, 0x40000042, &(0x7f0000000000)={0xa, 0x4e21, 0x7, @empty, 0xff}, 0x1c) [ 569.630277][T16346] EXT4-fs error (device loop0): __ext4_fill_super:5226: inode #2: comm syz-executor.0: iget: root inode unallocated [ 569.641191][T16346] EXT4-fs (loop0): get root inode failed [ 569.641206][T16346] EXT4-fs (loop0): mount failed [ 569.706701][T16363] loop1: detected capacity change from 0 to 264192 [ 569.716416][T16368] loop0: detected capacity change from 0 to 264192 11:00:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) [ 569.717328][T16368] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 569.737131][T16368] EXT4-fs error (device loop0): __ext4_fill_super:5226: inode #2: comm syz-executor.0: iget: root inode unallocated [ 569.737748][T16368] EXT4-fs (loop0): get root inode failed 11:00:28 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) (async) r1 = socket$inet6_icmp(0xa, 0x2, 0x3a) recvfrom$inet6(r1, &(0x7f0000000100)=""/209, 0xd1, 0x40000042, &(0x7f0000000000)={0xa, 0x4e21, 0x7, @empty, 0xff}, 0x1c) [ 569.737761][T16368] EXT4-fs (loop0): mount failed [ 569.756201][T16379] loop3: detected capacity change from 0 to 264192 [ 569.761002][T16379] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 569.761028][T16379] EXT4-fs (loop3): group descriptors corrupted! [ 569.779473][T16384] loop0: detected capacity change from 0 to 264192 [ 569.785881][T16384] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled 11:00:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000080000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) [ 569.803690][T16384] EXT4-fs error (device loop0): __ext4_fill_super:5226: inode #2: comm syz-executor.0: iget: root inode unallocated [ 569.803892][T16384] EXT4-fs (loop0): get root inode failed [ 569.803904][T16384] EXT4-fs (loop0): mount failed [ 569.805271][T16387] loop1: detected capacity change from 0 to 264192 [ 569.846969][T16401] loop3: detected capacity change from 0 to 264192 11:00:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400200000", 0x1f, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:28 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) r1 = socket$inet6_icmp(0xa, 0x2, 0x3a) recvfrom$inet6(r1, &(0x7f0000000100)=""/209, 0xd1, 0x40000042, &(0x7f0000000000)={0xa, 0x4e21, 0x7, @empty, 0xff}, 0x1c) socket$inet6_mptcp(0xa, 0x1, 0x106) (async) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) (async) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) (async) socket$inet6_icmp(0xa, 0x2, 0x3a) (async) recvfrom$inet6(r1, &(0x7f0000000100)=""/209, 0xd1, 0x40000042, &(0x7f0000000000)={0xa, 0x4e21, 0x7, @empty, 0xff}, 0x1c) (async) 11:00:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200", 0x63, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) [ 569.858325][T16401] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (5596!=0) [ 569.858349][T16401] EXT4-fs (loop3): group descriptors corrupted! [ 569.885479][T16407] loop0: detected capacity change from 0 to 264192 [ 569.905513][T16407] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 569.908607][T16416] loop1: detected capacity change from 0 to 264192 [ 569.912904][T16417] loop3: detected capacity change from 0 to 264192 11:00:28 executing program 5: r0 = socket$inet6(0xa, 0x2, 0xc1) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000000)=0x2, 0x4) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x40044, 0x0, 0x0) 11:00:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f00ffffffffffff0700000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) [ 569.914905][T16417] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (5596!=0) 11:00:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400200000", 0x1f, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200", 0x63, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) [ 569.914926][T16417] EXT4-fs (loop3): group descriptors corrupted! [ 569.968756][T16407] EXT4-fs error (device loop0): __ext4_fill_super:5226: inode #2: comm syz-executor.0: iget: root inode unallocated [ 569.969156][T16407] EXT4-fs (loop0): get root inode failed [ 569.969224][T16407] EXT4-fs (loop0): mount failed 11:00:28 executing program 5: r0 = socket$inet6(0xa, 0x2, 0xc1) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000000)=0x2, 0x4) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x40044, 0x0, 0x0) socket$inet6(0xa, 0x2, 0xc1) (async) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000000)=0x2, 0x4) (async) socket$inet6_mptcp(0xa, 0x1, 0x106) (async) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) (async) sendto$inet6(r1, 0x0, 0x0, 0x40044, 0x0, 0x0) (async) 11:00:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000800000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000002000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) [ 570.031372][T16437] loop3: detected capacity change from 0 to 264192 [ 570.033996][T16433] loop1: detected capacity change from 0 to 264192 11:00:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200", 0x63, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400200000", 0x1f, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf465", 0x33, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {0x0, 0x0, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) [ 570.035892][T16437] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (5596!=0) [ 570.035915][T16437] EXT4-fs (loop3): group descriptors corrupted! [ 570.045835][T16451] loop0: detected capacity change from 0 to 264192 11:00:28 executing program 5: r0 = socket$inet6(0xa, 0x2, 0xc1) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000000)=0x2, 0x4) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x40044, 0x0, 0x0) socket$inet6(0xa, 0x2, 0xc1) (async) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000000)=0x2, 0x4) (async) socket$inet6_mptcp(0xa, 0x1, 0x106) (async) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) (async) sendto$inet6(r1, 0x0, 0x0, 0x40044, 0x0, 0x0) (async) 11:00:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000001000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d242000012", 0x65, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf465", 0x33, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) [ 570.048475][T16451] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 570.072610][T16451] EXT4-fs error (device loop0): __ext4_fill_super:5226: inode #2: comm syz-executor.0: iget: root inode unallocated 11:00:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf465", 0x33, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000002000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) [ 570.072789][T16451] EXT4-fs (loop0): get root inode failed [ 570.072800][T16451] EXT4-fs (loop0): mount failed [ 570.143481][T16466] loop0: detected capacity change from 0 to 264192 [ 570.149222][T16466] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 570.154945][T16466] EXT4-fs error (device loop0): __ext4_fill_super:5226: inode #2: comm syz-executor.0: iget: root inode unallocated 11:00:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {0x0, 0x0, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000402000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d242000012", 0x65, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) [ 570.155265][T16466] EXT4-fs (loop0): get root inode failed [ 570.155277][T16466] EXT4-fs (loop0): mount failed [ 570.162379][T16473] loop3: detected capacity change from 0 to 264192 11:00:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400200000", 0x1f, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400200000", 0x1f, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) [ 570.164645][T16473] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (26474!=0) [ 570.164668][T16473] EXT4-fs (loop3): group descriptors corrupted! [ 570.187828][T16476] loop1: detected capacity change from 0 to 264192 [ 570.218180][T16485] loop0: detected capacity change from 0 to 264192 [ 570.229033][T16484] loop5: detected capacity change from 0 to 264192 [ 570.231844][T16486] loop3: detected capacity change from 0 to 264192 11:00:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d242000012", 0x65, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {0x0, 0x0, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000003000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) [ 570.275714][T16484] EXT4-fs error (device loop5): __ext4_iget:4972: inode #2: block 268563395: comm syz-executor.5: invalid block [ 570.275879][T16484] EXT4-fs (loop5): get root inode failed [ 570.275937][T16484] EXT4-fs (loop5): mount failed [ 570.286173][T16486] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (26474!=0) [ 570.286196][T16486] EXT4-fs (loop3): group descriptors corrupted! 11:00:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) [ 570.301792][T16485] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 570.309114][T16485] EXT4-fs error (device loop0): __ext4_fill_super:5226: inode #2: comm syz-executor.0: iget: root inode unallocated [ 570.309315][T16485] EXT4-fs (loop0): get root inode failed [ 570.309327][T16485] EXT4-fs (loop0): mount failed [ 570.318333][T16501] loop1: detected capacity change from 0 to 264192 [ 570.423232][T16520] loop3: detected capacity change from 0 to 264192 [ 570.431359][T16523] loop0: detected capacity change from 0 to 264192 [ 570.440363][T16523] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 570.442012][T16520] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (26474!=0) [ 570.442033][T16520] EXT4-fs (loop3): group descriptors corrupted! [ 570.476257][T16532] loop1: detected capacity change from 0 to 264192 [ 570.493902][T16531] loop5: detected capacity change from 0 to 264192 [ 570.510971][T16531] EXT4-fs error (device loop5): __ext4_iget:4972: inode #2: block 268563395: comm syz-executor.5: invalid block 11:00:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000004000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) [ 570.511185][T16531] EXT4-fs (loop5): get root inode failed [ 570.511197][T16531] EXT4-fs (loop5): mount failed [ 570.513581][T16537] loop0: detected capacity change from 0 to 264192 [ 570.520595][T16539] loop3: detected capacity change from 0 to 264192 [ 570.528024][T16539] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (26474!=0) [ 570.528048][T16539] EXT4-fs (loop3): group descriptors corrupted! [ 570.532030][T16537] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled 11:00:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400200000", 0x1f, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:29 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100), 0x0, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) [ 570.558702][T16537] EXT4-fs error (device loop0): __ext4_fill_super:5226: inode #2: comm syz-executor.0: iget: root inode unallocated [ 570.559710][T16537] EXT4-fs (loop0): get root inode failed [ 570.559770][T16537] EXT4-fs (loop0): mount failed [ 570.587937][T16555] loop3: detected capacity change from 0 to 264192 [ 570.607155][T16555] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (26474!=0) [ 570.607248][T16555] EXT4-fs (loop3): group descriptors corrupted! [ 570.646265][T16583] loop0: detected capacity change from 0 to 264192 [ 570.649581][T16583] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 570.664219][T16583] EXT4-fs error (device loop0): __ext4_fill_super:5226: inode #2: comm syz-executor.0: iget: root inode unallocated [ 570.670913][T16583] EXT4-fs (loop0): get root inode failed [ 570.670927][T16583] EXT4-fs (loop0): mount failed [ 570.697757][T16606] loop3: detected capacity change from 0 to 264192 [ 570.698913][T16606] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (26474!=0) 11:00:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400200000", 0x1f, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000005000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) [ 570.698935][T16606] EXT4-fs (loop3): group descriptors corrupted! [ 570.755278][T16616] loop0: detected capacity change from 0 to 264192 [ 570.755935][T16616] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 570.761948][T16622] loop1: detected capacity change from 0 to 264192 [ 570.766964][T16616] EXT4-fs error (device loop0): __ext4_fill_super:5226: inode #2: comm syz-executor.0: iget: root inode unallocated [ 570.767170][T16616] EXT4-fs (loop0): get root inode failed 11:00:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000406000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:29 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) [ 570.767183][T16616] EXT4-fs (loop0): mount failed [ 570.773497][T16626] loop3: detected capacity change from 0 to 264192 [ 570.778196][T16626] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (35945!=0) [ 570.778218][T16626] EXT4-fs (loop3): group descriptors corrupted! [ 570.818995][T16635] loop1: detected capacity change from 0 to 264192 [ 570.827711][T16643] loop3: detected capacity change from 0 to 264192 [ 570.835507][T16644] loop0: detected capacity change from 0 to 264192 [ 570.839677][T16644] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 570.844626][T16644] EXT4-fs error (device loop0): __ext4_fill_super:5226: inode #2: comm syz-executor.0: iget: root inode unallocated [ 570.844904][T16644] EXT4-fs (loop0): get root inode failed [ 570.844916][T16644] EXT4-fs (loop0): mount failed 11:00:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100), 0x0, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) [ 570.857786][T16643] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (35945!=0) [ 570.857810][T16643] EXT4-fs (loop3): group descriptors corrupted! 11:00:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000008000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) [ 570.954020][T16669] loop1: detected capacity change from 0 to 264192 11:00:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081e1ff00180000ddf465000000000100200000001000080000feffffffffffff0400000000000000000000000200000040000000020000000400000042", 0x3e, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x4000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="271911e079a5b7d5cab01dede5c0d90d000000803a", 0x15, 0x10000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 11:00:29 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400200000", 0x1f, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000018000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100), 0x0, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:29 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) [ 570.965212][T16672] loop0: detected capacity change from 0 to 264192 [ 570.966179][T16672] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 570.971610][T16672] EXT4-fs error (device loop0): __ext4_fill_super:5226: inode #2: comm syz-executor.0: iget: root inode unallocated 11:00:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000026000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:29 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000", 0x60, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081e1ff00180000ddf465000000000100200000001000080000feffffffffffff0400000000000000000000000200000040000000020000000400000042", 0x3e, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x4000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="271911e079a5b7d5cab01dede5c0d90d000000803a", 0x15, 0x10000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 570.972313][T16672] EXT4-fs (loop0): get root inode failed [ 570.972325][T16672] EXT4-fs (loop0): mount failed [ 571.025305][T16688] loop0: detected capacity change from 0 to 264192 11:00:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400200000", 0x1f, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) socket(0x10, 0x2, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 11:00:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f00000000000000003f000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f0000000000000100200000001000080000", 0x25, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) [ 571.026609][T16689] loop3: detected capacity change from 0 to 264192 [ 571.033654][T16688] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled 11:00:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:29 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000", 0x60, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081e1ff00180000ddf465000000000100200000001000080000feffffffffffff0400000000000000000000000200000040000000020000000400000042", 0x3e, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x4000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="271911e079a5b7d5cab01dede5c0d90d000000803a", 0x15, 0x10000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 571.051329][T16689] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (35945!=0) [ 571.051396][T16689] EXT4-fs (loop3): group descriptors corrupted! [ 571.051869][T16688] EXT4-fs error (device loop0): __ext4_fill_super:5226: inode #2: comm syz-executor.0: iget: root inode unallocated [ 571.052417][T16688] EXT4-fs (loop0): get root inode failed [ 571.052429][T16688] EXT4-fs (loop0): mount failed 11:00:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000040000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400200000", 0x1f, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) socket(0x10, 0x2, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 11:00:29 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000", 0x60, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) [ 571.059186][T16693] loop1: detected capacity change from 0 to 264192 [ 571.105205][T16704] loop0: detected capacity change from 0 to 264192 11:00:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000080040000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:29 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200", 0x63, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) [ 571.110173][T16704] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 571.113580][T16705] loop3: detected capacity change from 0 to 264192 11:00:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f0000000000000100200000001000080000", 0x25, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081e1ff00180000ddf465000000000100200000001000080000feffffffffffff0400000000000000000000000200000040000000020000000400000042", 0x3e, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x4000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="271911e079a5b7d5cab01dede5c0d90d000000803a", 0x15, 0x10000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) [ 571.123844][T16704] EXT4-fs error (device loop0): __ext4_fill_super:5226: inode #2: comm syz-executor.0: iget: root inode unallocated 11:00:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f00000000000000005a000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:29 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200", 0x63, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400200000", 0x1f, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) socket(0x10, 0x2, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) [ 571.123987][T16704] EXT4-fs (loop0): get root inode failed 11:00:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f0000000000000100200000001000080000", 0x25, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081e1ff00180000ddf465000000000100200000001000080000feffffffffffff0400000000000000000000000200000040000000020000000400000042", 0x3e, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x4000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="271911e079a5b7d5cab01dede5c0d90d000000803a", 0x15, 0x10000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) [ 571.124000][T16704] EXT4-fs (loop0): mount failed 11:00:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000076000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:29 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200", 0x63, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400"/55, 0x37, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400200000", 0x1f, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r0) [ 571.124845][T16708] loop1: detected capacity change from 0 to 264192 11:00:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000083000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d242000012", 0x65, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) [ 571.132192][T16705] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (35945!=105) 11:00:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400"/55, 0x37, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:30 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081e1ff00180000ddf465000000000100200000001000080000feffffffffffff0400000000000000000000000200000040000000020000000400000042", 0x3e, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x4000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="271911e079a5b7d5cab01dede5c0d90d000000803a", 0x15, 0x10000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) [ 571.132214][T16705] EXT4-fs (loop3): group descriptors corrupted! [ 571.180853][T16719] loop0: detected capacity change from 0 to 264192 [ 571.186269][T16719] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 571.201148][T16726] loop1: detected capacity change from 0 to 264192 [ 571.202744][T16719] EXT4-fs error (device loop0): __ext4_fill_super:5226: inode #2: comm syz-executor.0: iget: root inode unallocated [ 571.202970][T16719] EXT4-fs (loop0): get root inode failed 11:00:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f0000000000fffffff6000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) [ 571.202982][T16719] EXT4-fs (loop0): mount failed [ 571.221067][T16729] loop3: detected capacity change from 0 to 264192 [ 571.223755][T16729] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (35945!=105) [ 571.223780][T16729] EXT4-fs (loop3): group descriptors corrupted! [ 571.247733][ T7746] buffer_io_error: 23 callbacks suppressed [ 571.247748][ T7746] Buffer I/O error on dev loop1, logical block 0, async page read [ 571.247772][ T7746] loop1: unable to read partition table [ 571.247825][ T7746] loop1: partition table beyond EOD, truncated [ 571.277318][T16748] No source specified [ 571.293168][T16751] loop3: detected capacity change from 0 to 264192 [ 571.295658][T16751] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (35945!=105) [ 571.295680][T16751] EXT4-fs (loop3): group descriptors corrupted! [ 571.315676][T16758] loop0: detected capacity change from 0 to 264192 [ 571.331958][T16758] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled 11:00:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d242000012", 0x65, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400200000", 0x1f, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r0) [ 571.339153][T16771] No source specified [ 571.354004][T16758] EXT4-fs (loop0): corrupt root inode, run e2fsck [ 571.354027][T16758] EXT4-fs (loop0): mount failed [ 571.377244][T16776] loop3: detected capacity change from 0 to 264192 [ 571.393149][T16776] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 571.393176][T16776] EXT4-fs (loop3): group descriptors corrupted! 11:00:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400"/55, 0x37, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:30 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081e1ff00180000ddf465000000000100200000001000080000feffffffffffff0400000000000000000000000200000040000000020000000400000042", 0x3e, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x4000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="271911e079a5b7d5cab01dede5c0d90d000000803a", 0x15, 0x10000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f0000000000fffffffe000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) [ 571.404917][T16780] loop0: detected capacity change from 0 to 264192 [ 571.411658][T16780] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 571.428688][T16785] No source specified [ 571.430095][T16780] EXT4-fs (loop0): corrupt root inode, run e2fsck [ 571.430117][T16780] EXT4-fs (loop0): mount failed [ 571.437989][T16787] loop3: detected capacity change from 0 to 264192 [ 571.461633][T16787] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 571.461657][T16787] EXT4-fs (loop3): group descriptors corrupted! [ 571.506281][T16796] loop1: detected capacity change from 0 to 264192 [ 571.525658][T16802] loop0: detected capacity change from 0 to 264192 [ 571.526472][T16802] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 571.541370][T16796] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-22). Please run e2fsck to fix. [ 571.541887][T16796] EXT4-fs (loop1): mount failed 11:00:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d242000012", 0x65, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) [ 571.542518][T16806] loop3: detected capacity change from 0 to 264192 [ 571.556595][T16806] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 571.556694][T16806] EXT4-fs (loop3): group descriptors corrupted! [ 571.627715][T16818] loop3: detected capacity change from 0 to 264192 [ 571.634396][T16819] loop1: detected capacity change from 0 to 264192 11:00:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f00fffffffffffffffe000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:30 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081e1ff00180000ddf465000000000100200000001000080000feffffffffffff0400000000000000000000000200000040000000020000000400000042", 0x3e, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x4000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="271911e079a5b7d5cab01dede5c0d90d000000803a", 0x15, 0x10000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) [ 571.659987][T16819] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-22). Please run e2fsck to fix. [ 571.660364][T16819] EXT4-fs (loop1): mount failed [ 571.714429][T16836] loop0: detected capacity change from 0 to 264192 [ 571.722344][T16836] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 571.730706][T16839] loop3: detected capacity change from 0 to 264192 [ 571.763459][T16844] loop1: detected capacity change from 0 to 264192 11:00:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400200000", 0x1f, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r0) 11:00:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f0000000000ffffffff000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081e1ff00180000ddf465000000000100200000001000080000feffffffffffff0400000000000000000000000200000040000000020000000400000042", 0x3e, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x4000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="271911e079a5b7d5cab01dede5c0d90d000000803a", 0x15, 0x10000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) [ 571.784194][T16853] loop0: detected capacity change from 0 to 264192 [ 571.796952][T16853] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 571.797376][T16852] loop3: detected capacity change from 0 to 264192 11:00:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000", 0x40, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:30 executing program 4: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000007ffffffffffff000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) [ 571.799462][T16853] EXT4-fs (loop0): corrupt root inode, run e2fsck [ 571.799518][T16853] EXT4-fs (loop0): mount failed [ 571.803572][T16844] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-22). Please run e2fsck to fix. [ 571.804053][T16844] EXT4-fs (loop1): mount failed 11:00:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081e1ff00180000ddf465000000000100200000001000080000feffffffffffff0400000000000000000000000200000040000000020000000400000042", 0x3e, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x4000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="271911e079a5b7d5cab01dede5c0d90d000000803a", 0x15, 0x10000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:30 executing program 4: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f00feffffffffffffff000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) [ 571.899109][T16866] loop0: detected capacity change from 0 to 264192 [ 571.900002][T16866] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 571.904161][T16866] EXT4-fs (loop0): corrupt root inode, run e2fsck [ 571.904181][T16866] EXT4-fs (loop0): mount failed [ 572.564991][T16871] loop3: detected capacity change from 0 to 264192 11:00:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000", 0x40, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081e1ff00180000ddf465000000000100200000001000080000feffffffffffff0400000000000000000000000200000040000000020000000400000042", 0x3e, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x4000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="271911e079a5b7d5cab01dede5c0d90d000000803a", 0x15, 0x10000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r0) [ 572.570275][T16877] loop1: detected capacity change from 0 to 264192 [ 572.571186][T16875] loop0: detected capacity change from 0 to 264192 [ 572.574121][T16875] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 572.582452][T16877] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-22). Please run e2fsck to fix. 11:00:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000002000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:30 executing program 4: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) [ 572.582750][T16877] EXT4-fs (loop1): mount failed [ 572.584573][T16875] EXT4-fs (loop0): corrupt root inode, run e2fsck [ 572.584639][T16875] EXT4-fs (loop0): mount failed [ 572.678904][T16896] loop0: detected capacity change from 0 to 264192 [ 572.680131][T16896] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled 11:00:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000003000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r0) 11:00:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000", 0x40, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000004000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, 0x0) [ 572.693921][T16896] EXT4-fs error (device loop0): __ext4_fill_super:5226: inode #2: comm syz-executor.0: iget: root inode unallocated 11:00:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000005000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:30 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400200000", 0x1f, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af3020004000000000000000000000002000000400000000200000004", 0x45, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r0) 11:00:30 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400200000", 0x1f, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000cab000)) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 11:00:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081e1ff00180000ddf465000000000100200000001000080000feffffffffffff0400000000000000000000000200000040000000020000000400000042", 0x3e, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x4000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, 0x0) 11:00:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000008000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) [ 572.694063][T16896] EXT4-fs (loop0): get root inode failed [ 572.694076][T16896] EXT4-fs (loop0): mount failed [ 572.729144][T16913] loop1: detected capacity change from 0 to 264192 11:00:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000018000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:30 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400200000", 0x1f, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000026000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) [ 572.730184][T16915] loop3: detected capacity change from 0 to 264192 [ 572.746407][T16913] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-22). Please run e2fsck to fix. 11:00:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af3020004000000000000000000000002000000400000000200000004", 0x45, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f00005a000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000076000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000cab000)) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) [ 572.760370][T16913] EXT4-fs (loop1): mount failed [ 572.832403][T16941] loop0: detected capacity change from 0 to 264192 [ 572.841802][T16957] loop1: detected capacity change from 0 to 264192 [ 572.843914][T16941] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled 11:00:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400200000", 0x1f, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081e1ff00180000ddf465000000000100200000001000080000feffffffffffff0400000000000000000000000200000040000000020000000400000042", 0x3e, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x4000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, 0x0) [ 572.878550][T16941] EXT4-fs error (device loop0): __ext4_fill_super:5226: inode #2: comm syz-executor.0: iget: root inode unallocated [ 572.878873][T16941] EXT4-fs (loop0): get root inode failed [ 572.878887][T16941] EXT4-fs (loop0): mount failed [ 572.884109][T16957] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-22). Please run e2fsck to fix. [ 572.885109][T16957] EXT4-fs (loop1): mount failed 11:00:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000083000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) [ 572.898525][T16967] loop3: detected capacity change from 0 to 264192 [ 572.913148][T16972] loop5: detected capacity change from 0 to 264192 [ 572.961285][T16977] loop0: detected capacity change from 0 to 264192 [ 572.962729][T16979] loop4: detected capacity change from 0 to 128 [ 572.974945][T16977] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 572.975522][T16977] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) 11:00:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af3020004000000000000000000000002000000400000000200000004", 0x45, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f0000fe000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000cab000)) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 11:00:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400200000", 0x1f, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) [ 572.975543][T16977] EXT4-fs (loop0): group descriptors corrupted! [ 573.045856][T16984] loop1: detected capacity change from 0 to 264192 [ 573.061286][T16984] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-22). Please run e2fsck to fix. [ 573.062730][T16984] EXT4-fs (loop1): mount failed [ 573.070110][T16990] loop0: detected capacity change from 0 to 264192 [ 573.075853][T16988] loop3: detected capacity change from 0 to 264192 11:00:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)) 11:00:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081e1ff00180000ddf465000000000100200000001000080000feffffffffffff0400000000000000000000000200000040000000020000000400000042", 0x3e, 0x1700}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000004020000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) [ 573.076553][T16990] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 573.076690][T16990] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 573.076711][T16990] EXT4-fs (loop0): group descriptors corrupted! 11:00:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)) 11:00:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000030000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400200000", 0x1f, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081e1ff00180000ddf465000000000100200000001000080000feffffffffffff0400000000000000000000000200000040000000020000000400000042", 0x3e, 0x1700}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) [ 573.083853][T16997] loop5: detected capacity change from 0 to 264192 [ 573.093630][T16997] EXT4-fs: failed to create workqueue [ 573.093637][T16997] EXT4-fs (loop5): mount failed [ 573.103003][T16996] loop4: detected capacity change from 0 to 128 11:00:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af30200040000000000000000000000020000004000000002000000040000", 0x47, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) [ 573.138745][T17009] loop1: detected capacity change from 0 to 264192 [ 573.158189][T17015] loop3: detected capacity change from 0 to 264192 [ 573.163050][T17010] loop5: detected capacity change from 0 to 264192 11:00:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000002040000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)) 11:00:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000006040000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081e1ff00180000ddf465000000000100200000001000080000feffffffffffff0400000000000000000000000200000040000000020000000400000042", 0x3e, 0x1700}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) [ 573.169225][T17009] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-22). Please run e2fsck to fix. [ 573.169550][T17009] EXT4-fs (loop1): mount failed 11:00:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af30200040000000000000000000000020000004000000002000000040000", 0x47, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) [ 573.176113][T17019] loop0: detected capacity change from 0 to 264192 [ 573.184768][T17019] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled 11:00:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af30200040000000000000000000000020000004000000002000000040000", 0x47, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081e1ff00180000ddf465000000000100200000001000080000feffffffffffff0400000000000000000000000200000040000000020000000400000042", 0x3e, 0x1700}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) [ 573.185075][T17019] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 573.185099][T17019] EXT4-fs (loop0): group descriptors corrupted! [ 573.194990][T17021] loop4: detected capacity change from 0 to 128 [ 573.207230][T17031] loop1: detected capacity change from 0 to 264192 [ 573.244063][ T7746] blk_print_req_error: 18 callbacks suppressed 11:00:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000050000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400200000", 0x1f, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) socket(0x10, 0x2, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) [ 573.244078][ T7746] I/O error, dev loop0, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 573.264818][T17035] loop0: detected capacity change from 0 to 264192 [ 573.265790][T17035] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 573.265993][T17035] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 573.266014][T17035] EXT4-fs (loop0): group descriptors corrupted! 11:00:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081e1ff00180000ddf465000000000100200000001000080000feffffffffffff0400000000000000000000000200000040000000020000000400000042", 0x3e, 0x1700}, {0x0}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400200000", 0x1f, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af3020004000000000000000000000002000000400000000200000004000000", 0x48, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) [ 573.266906][T17031] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-22). Please run e2fsck to fix. [ 573.270430][T17031] EXT4-fs (loop1): mount failed [ 573.343232][T17047] loop1: detected capacity change from 0 to 264192 11:00:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000004060000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) [ 573.347934][T17049] loop0: detected capacity change from 0 to 264192 [ 573.356657][T17049] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 573.356935][T17049] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 573.356957][T17049] EXT4-fs (loop0): group descriptors corrupted! [ 573.359060][T17047] Quota error (device loop1): v2_read_file_info: Free block number too big (0 >= 0). [ 573.359099][T17047] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 573.359372][T17047] EXT4-fs (loop1): mount failed [ 573.374948][T17058] loop3: detected capacity change from 0 to 264192 [ 573.423662][T17063] loop1: detected capacity change from 0 to 264192 [ 573.481862][T17063] Quota error (device loop1): v2_read_file_info: Free block number too big (0 >= 0). 11:00:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000180000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081e1ff00180000ddf465000000000100200000001000080000feffffffffffff0400000000000000000000000200000040000000020000000400000042", 0x3e, 0x1700}, {0x0}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400200000", 0x1f, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(0x0, &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) [ 573.481893][T17063] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. 11:00:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af3020004000000000000000000000002000000400000000200000004000000", 0x48, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(0x0, &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) [ 573.483285][T17063] EXT4-fs (loop1): mount failed [ 573.497539][T17082] loop3: detected capacity change from 0 to 264192 [ 573.506669][T17083] loop0: detected capacity change from 0 to 264192 [ 573.507563][T17083] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 573.507618][T17083] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) 11:00:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00), 0x0, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400200000", 0x1f, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000200000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081e1ff00180000ddf465000000000100200000001000080000feffffffffffff0400000000000000000000000200000040000000020000000400000042", 0x3e, 0x1700}, {0x0}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) [ 573.507637][T17083] EXT4-fs (loop0): group descriptors corrupted! [ 573.535237][ T7746] I/O error, dev loop0, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 573.611752][T17095] loop1: detected capacity change from 0 to 264192 11:00:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000260000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af3020004000000000000000000000002000000400000000200000004000000", 0x48, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) [ 573.629200][T17100] loop0: detected capacity change from 0 to 264192 [ 573.630202][T17100] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 573.630790][T17100] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 573.630812][T17100] EXT4-fs (loop0): group descriptors corrupted! [ 573.637348][T17095] Quota error (device loop1): v2_read_file_info: Free block number too big (0 >= 0). 11:00:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) [ 573.637379][T17095] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 573.637942][T17095] EXT4-fs (loop1): mount failed [ 573.693796][T17112] loop1: detected capacity change from 0 to 264192 [ 573.695831][T17121] loop3: detected capacity change from 0 to 264192 [ 573.710321][T17127] loop0: detected capacity change from 0 to 264192 [ 573.713745][T17112] Quota error (device loop1): v2_read_file_info: Free block number too big (0 >= 0). 11:00:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f0000003f0000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) [ 573.713776][T17112] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 573.716169][T17112] EXT4-fs (loop1): mount failed [ 573.732980][T17127] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 573.737062][T17127] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) 11:00:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {0x0}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(0x0, &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) [ 573.737085][T17127] EXT4-fs (loop0): group descriptors corrupted! [ 573.767174][T17135] loop1: detected capacity change from 0 to 264192 [ 573.823053][T17135] Quota error (device loop1): v2_read_file_info: Free block number too big (0 >= 0). [ 573.823086][T17135] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. 11:00:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000400000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) [ 573.824282][T17135] EXT4-fs (loop1): mount failed [ 573.884405][T17145] loop3: detected capacity change from 0 to 264192 [ 573.893001][T17149] loop0: detected capacity change from 0 to 264192 [ 573.894064][T17149] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 573.894123][T17149] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 573.894184][T17149] EXT4-fs (loop0): group descriptors corrupted! [ 573.900825][T17152] loop1: detected capacity change from 0 to 264192 [ 573.980723][T17152] Quota error (device loop1): v2_read_file_info: Free block number too big (0 >= 0). 11:00:32 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000100000000000000010200850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r4, @ANYBLOB=',wffno=', @ANYRESHEX=r3, @ANYBLOB=',\x00']) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000080)=0x1, 0x4) r5 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) lseek(r5, 0x3, 0x0) getdents64(r5, 0xfffffffffffffffe, 0x29) r6 = fspick(r4, &(0x7f00000001c0)='./file0\x00', 0x1) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r8) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x80009, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{@access_user}, {@afid={'afid', 0x3d, 0x3}}, {@cache_none}], [{@euid_gt={'euid>', r8}}, {@euid_gt}, {@smackfsfloor={'smackfsfloor', 0x3d, ')!{,-'}}, {@smackfsdef={'smackfsdef', 0x3d, 'GPL\x00'}}, {@appraise}, {@uid_gt={'uid>', 0xffffffffffffffff}}, {@dont_measure}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x38, 0x64, 0x36, 0x65, 0x32, 0x0, 0x33], 0x2d, [0x66, 0x33, 0x65, 0x38], 0x2d, [0x39, 0x61, 0x61, 0x62], 0x2d, [0x54, 0x32, 0x62, 0x4c], 0x2d, [0x66, 0x64, 0x38, 0x32, 0x3d, 0x4, 0x65, 0x34]}}}]}}) 11:00:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400200000", 0x1f, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f0000005a0000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', 0x0, &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {0x0}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) [ 573.980773][T17152] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 573.981139][T17152] EXT4-fs (loop1): mount failed [ 574.025717][T17169] loop3: detected capacity change from 0 to 264192 [ 574.070712][T17175] loop0: detected capacity change from 0 to 264192 11:00:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000760000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', 0x0, &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) [ 574.071354][T17175] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 574.071741][T17175] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (5596!=0) [ 574.071762][T17175] EXT4-fs (loop0): group descriptors corrupted! [ 574.074909][T17178] loop1: detected capacity change from 0 to 264192 [ 574.086950][T17181] loop3: detected capacity change from 0 to 264192 11:00:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {0x0}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000830000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) [ 574.104808][T17178] Quota error (device loop1): v2_read_file_info: Free block number too big (0 >= 0). [ 574.104841][T17178] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 574.106263][T17178] EXT4-fs (loop1): mount failed [ 574.160452][T17196] loop3: detected capacity change from 0 to 264192 11:00:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) [ 574.162183][T17196] EXT4-fs (loop3): unsupported descriptor size 0 [ 574.163189][T17193] loop0: detected capacity change from 0 to 264192 [ 574.163909][T17195] loop1: detected capacity change from 0 to 264192 [ 574.173683][T17193] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 574.173777][T17193] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (5596!=0) [ 574.173797][T17193] EXT4-fs (loop0): group descriptors corrupted! [ 574.219480][T17195] Quota error (device loop1): v2_read_file_info: Free block number too big (0 >= 0). [ 574.219514][T17195] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 574.219927][T17195] EXT4-fs (loop1): mount failed [ 574.239282][T17211] loop3: detected capacity change from 0 to 264192 [ 574.240172][T17211] EXT4-fs (loop3): unsupported descriptor size 0 [ 574.257830][T17214] loop0: detected capacity change from 0 to 264192 [ 574.260698][T17214] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 574.261495][T17214] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (5596!=0) [ 574.261521][T17214] EXT4-fs (loop0): group descriptors corrupted! [ 574.285528][T17216] loop1: detected capacity change from 0 to 264192 [ 574.294956][T17222] loop3: detected capacity change from 0 to 264192 [ 574.296385][T17222] EXT4-fs (loop3): unsupported descriptor size 0 [ 574.300583][T17216] Quota error (device loop1): v2_read_file_info: Free block number too big (0 >= 0). [ 574.300613][T17216] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 574.300920][T17216] EXT4-fs (loop1): mount failed [ 574.321151][T17227] loop0: detected capacity change from 0 to 264192 [ 574.323968][T17227] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled 11:00:32 executing program 0: getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x4000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x54d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r1 = fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x3, 0x3f, 0x7, 0xff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x85, 0xe59037d86f603066, 0x0, 0x40004, 0x5, 0x3, 0x5, 0x0, 0xfffffbff, 0xfff, 0x0, @perf_config_ext={0x691e, 0x8}, 0x6010}, r1, 0xe, r0, 0x9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000001c0)=0x0) r3 = syz_open_procfs$userns(r2, &(0x7f0000000140)) lseek(r3, 0x8, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000180)={0x0, 0x3, r3, 0x7}) mknodat$loop(r4, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 11:00:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', 0x0, &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400200000", 0x1f, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f0000fffe0000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x1500}, {0x0}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f0000feff0000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) [ 574.324127][T17227] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (26474!=0) [ 574.324156][T17227] EXT4-fs (loop0): group descriptors corrupted! [ 574.377274][T17235] loop0: detected capacity change from 0 to 264192 [ 574.382292][T17239] loop1: detected capacity change from 0 to 264192 [ 574.383724][T17235] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 574.383883][T17235] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (26474!=0) [ 574.383941][T17235] EXT4-fs (loop0): group descriptors corrupted! 11:00:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0, 0x0, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000800000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) [ 574.398104][T17239] Quota error (device loop1): v2_read_file_info: Free block number too big (0 >= 0). [ 574.398147][T17239] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 574.398605][T17239] EXT4-fs (loop1): mount failed [ 574.411668][T17243] loop3: detected capacity change from 0 to 264192 11:00:32 executing program 0: getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x4000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x54d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r1 = fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x3, 0x3f, 0x7, 0xff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x85, 0xe59037d86f603066, 0x0, 0x40004, 0x5, 0x3, 0x5, 0x0, 0xfffffbff, 0xfff, 0x0, @perf_config_ext={0x691e, 0x8}, 0x6010}, r1, 0xe, r0, 0x9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000001c0)=0x0) r3 = syz_open_procfs$userns(r2, &(0x7f0000000140)) lseek(r3, 0x8, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000180)={0x0, 0x3, r3, 0x7}) mknodat$loop(r4, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 11:00:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0, 0x0, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000040000800000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x1500}, {0x0}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400200000", 0x1f, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) [ 574.412400][T17243] EXT4-fs (loop3): unsupported descriptor size 0 [ 574.440120][T17252] loop0: detected capacity change from 0 to 264192 11:00:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000002000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:32 executing program 0: getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x4000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x54d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r1 = fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x3, 0x3f, 0x7, 0xff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x85, 0xe59037d86f603066, 0x0, 0x40004, 0x5, 0x3, 0x5, 0x0, 0xfffffbff, 0xfff, 0x0, @perf_config_ext={0x691e, 0x8}, 0x6010}, r1, 0xe, r0, 0x9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000001c0)=0x0) r3 = syz_open_procfs$userns(r2, &(0x7f0000000140)) lseek(r3, 0x8, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000180)={0x0, 0x3, r3, 0x7}) mknodat$loop(r4, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 11:00:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0, 0x0, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000001000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x1500}, {0x0}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) [ 574.451745][T17252] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 574.451879][T17252] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (26474!=0) 11:00:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400200000", 0x1f, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00), 0x0, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:32 executing program 0: getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x4000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x54d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r1 = fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x3, 0x3f, 0x7, 0xff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x85, 0xe59037d86f603066, 0x0, 0x40004, 0x5, 0x3, 0x5, 0x0, 0xfffffbff, 0xfff, 0x0, @perf_config_ext={0x691e, 0x8}, 0x6010}, r1, 0xe, r0, 0x9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000001c0)=0x0) r3 = syz_open_procfs$userns(r2, &(0x7f0000000140)) lseek(r3, 0x8, 0x4) openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000180)={0x0, 0x3, r3, 0x7}) [ 574.451899][T17252] EXT4-fs (loop0): group descriptors corrupted! [ 574.471734][T17257] loop1: detected capacity change from 0 to 264192 [ 574.477471][T17264] loop3: detected capacity change from 0 to 264192 [ 574.480394][T17264] EXT4-fs (loop3): unsupported descriptor size 0 [ 574.488876][T17257] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 574.489263][T17257] EXT4-fs (loop1): mount failed 11:00:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000002000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0, 0x0, 0x0) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) [ 574.548682][T17276] loop3: detected capacity change from 0 to 264192 [ 574.554996][T17276] EXT4-fs (loop3): unsupported descriptor size 0 [ 574.555513][T17277] loop1: detected capacity change from 0 to 264192 [ 574.559260][T17278] loop0: detected capacity change from 0 to 264192 [ 574.572129][T17278] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled 11:00:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:33 executing program 0: getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x4000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x54d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r1 = fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x3, 0x3f, 0x7, 0xff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x85, 0xe59037d86f603066, 0x0, 0x40004, 0x5, 0x3, 0x5, 0x0, 0xfffffbff, 0xfff, 0x0, @perf_config_ext={0x691e, 0x8}, 0x6010}, r1, 0xe, r0, 0x9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000001c0)=0x0) r3 = syz_open_procfs$userns(r2, &(0x7f0000000140)) lseek(r3, 0x8, 0x4) openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) 11:00:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000402000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) [ 574.572273][T17277] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 574.572455][T17278] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (26474!=0) [ 574.572477][T17278] EXT4-fs (loop0): group descriptors corrupted! [ 574.572854][T17277] EXT4-fs (loop1): mount failed 11:00:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000003000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0, 0x0, 0x0) chown(0x0, 0x0, r1) 11:00:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400200000", 0x1f, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00), 0x0, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:33 executing program 0: getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x4000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x54d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r1 = fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x3, 0x3f, 0x7, 0xff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x85, 0xe59037d86f603066, 0x0, 0x40004, 0x5, 0x3, 0x5, 0x0, 0xfffffbff, 0xfff, 0x0, @perf_config_ext={0x691e, 0x8}, 0x6010}, r1, 0xe, r0, 0x9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000001c0)=0x0) r3 = syz_open_procfs$userns(r2, &(0x7f0000000140)) lseek(r3, 0x8, 0x4) [ 574.624940][T17295] loop3: detected capacity change from 0 to 264192 [ 574.630492][T17295] EXT4-fs (loop3): unsupported descriptor size 0 [ 574.648185][T17301] loop0: detected capacity change from 0 to 264192 11:00:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000004000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) [ 574.655820][T17301] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 574.655882][T17301] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (26474!=0) [ 574.655901][T17301] EXT4-fs (loop0): group descriptors corrupted! [ 574.656818][ T7754] I/O error, dev loop3, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 11:00:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000005000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:33 executing program 0: getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x4000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x54d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r1 = fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x3, 0x3f, 0x7, 0xff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x85, 0xe59037d86f603066, 0x0, 0x40004, 0x5, 0x3, 0x5, 0x0, 0xfffffbff, 0xfff, 0x0, @perf_config_ext={0x691e, 0x8}, 0x6010}, r1, 0xe, r0, 0x9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000001c0)) lseek(0xffffffffffffffff, 0x8, 0x4) 11:00:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0, 0x0, 0x0) chown(0x0, 0x0, r1) 11:00:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400200000", 0x1f, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00), 0x0, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) [ 574.658198][T17302] loop1: detected capacity change from 0 to 264192 [ 574.693397][T17302] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-22). Please run e2fsck to fix. [ 574.697741][T17302] EXT4-fs (loop1): mount failed [ 574.716264][T17311] loop3: detected capacity change from 0 to 264192 [ 574.718777][T17311] EXT4-fs (loop3): unsupported descriptor size 0 11:00:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000406000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) [ 574.753816][T17319] loop0: detected capacity change from 0 to 264192 [ 574.761173][T17317] loop1: detected capacity change from 0 to 264192 [ 574.763814][T17319] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 574.763964][T17319] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (26474!=0) 11:00:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000008000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400200000", 0x1f, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a09", 0xb, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) [ 574.764041][T17319] EXT4-fs (loop0): group descriptors corrupted! [ 574.775157][T17332] loop3: detected capacity change from 0 to 264192 [ 574.776332][T17332] EXT4-fs (loop3): unsupported descriptor size 0 [ 574.792700][T17317] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-22). Please run e2fsck to fix. [ 574.794558][T17317] EXT4-fs (loop1): mount failed [ 574.838812][T17344] loop0: detected capacity change from 0 to 264192 11:00:33 executing program 0: getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x4000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x54d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r1 = fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x3, 0x3f, 0x7, 0xff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x85, 0xe59037d86f603066, 0x0, 0x40004, 0x5, 0x3, 0x5, 0x0, 0xfffffbff, 0xfff, 0x0, @perf_config_ext={0x691e, 0x8}, 0x6010}, r1, 0xe, r0, 0x9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000001c0)) lseek(0xffffffffffffffff, 0x8, 0x4) 11:00:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {0x0, 0x0, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0, 0x0, 0x0) chown(0x0, 0x0, r1) [ 574.839714][T17344] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 574.840571][T17344] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (35945!=0) [ 574.840595][T17344] EXT4-fs (loop0): group descriptors corrupted! [ 574.843493][T17346] loop3: detected capacity change from 0 to 264192 [ 574.851847][T17346] EXT4-fs (loop3): unsupported descriptor size 0 [ 574.853017][T17351] loop1: detected capacity change from 0 to 264192 11:00:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000018000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:33 executing program 0: getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x4000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x54d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r1 = fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x3, 0x3f, 0x7, 0xff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x85, 0xe59037d86f603066, 0x0, 0x40004, 0x5, 0x3, 0x5, 0x0, 0xfffffbff, 0xfff, 0x0, @perf_config_ext={0x691e, 0x8}, 0x6010}, r1, 0xe, r0, 0x9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000001c0)) lseek(0xffffffffffffffff, 0x8, 0x4) 11:00:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000026000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400200000", 0x1f, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a09", 0xb, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) [ 574.877289][T17351] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-22). Please run e2fsck to fix. [ 574.893623][T17376] loop0: detected capacity change from 0 to 264192 [ 574.904353][T17376] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled 11:00:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f00000000003f000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) [ 574.905270][T17376] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (35945!=0) [ 574.905364][T17376] EXT4-fs (loop0): group descriptors corrupted! [ 574.937610][T17351] EXT4-fs (loop1): mount failed 11:00:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000), 0x0, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0, 0x0, 0x0) chown(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 11:00:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000040000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {0x0, 0x0, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400200000", 0x1f, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a09", 0xb, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:33 executing program 0: getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x4000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x54d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r1 = fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x3, 0x3f, 0x7, 0xff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x85, 0xe59037d86f603066, 0x0, 0x40004, 0x5, 0x3, 0x5, 0x0, 0xfffffbff, 0xfff, 0x0, @perf_config_ext={0x691e, 0x8}, 0x6010}, r1, 0xe, r0, 0x9) r2 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) lseek(r2, 0x8, 0x4) [ 574.983556][ T7754] I/O error, dev loop1, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 574.991557][T17390] loop3: detected capacity change from 0 to 264192 [ 574.992567][T17390] EXT4-fs (loop3): unsupported descriptor size 0 [ 575.018168][T17393] loop0: detected capacity change from 0 to 264192 [ 575.020056][T17399] loop1: detected capacity change from 0 to 264192 [ 575.021788][T17393] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled 11:00:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000080040000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:33 executing program 0: getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x4000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x54d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r0 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) lseek(r0, 0x8, 0x4) [ 575.021893][T17393] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (35945!=0) [ 575.021912][T17393] EXT4-fs (loop0): group descriptors corrupted! 11:00:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0, 0x0, 0x0) chown(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) [ 575.035116][ T7746] I/O error, dev loop3, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 575.041128][T17399] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 575.041469][T17399] EXT4-fs (loop1): mount failed [ 575.053242][ T7745] I/O error, dev loop0, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 575.103544][T17412] loop1: detected capacity change from 0 to 264192 11:00:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f00000000005a000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000), 0x0, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400200000", 0x1f, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a0900", 0x10, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {0x0, 0x0, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) [ 575.113177][T17414] loop0: detected capacity change from 0 to 264192 [ 575.116215][T17416] loop3: detected capacity change from 0 to 264192 [ 575.117146][T17416] EXT4-fs (loop3): unsupported descriptor size 0 [ 575.117473][T17414] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 575.117574][T17414] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (35945!=105) [ 575.117595][T17414] EXT4-fs (loop0): group descriptors corrupted! [ 575.125491][T17412] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 575.125731][T17412] EXT4-fs (loop1): mount failed [ 575.181371][T17442] loop0: detected capacity change from 0 to 264192 11:00:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000076000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00), 0x0, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) [ 575.197168][T17442] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 575.197275][T17442] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (35945!=105) [ 575.197296][T17442] EXT4-fs (loop0): group descriptors corrupted! [ 575.201977][T17450] loop1: detected capacity change from 0 to 264192 11:00:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000083000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400200000", 0x1f, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a0900", 0x10, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00), 0x0, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:33 executing program 0: getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x4000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x54d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) lseek(r0, 0x8, 0x4) 11:00:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00), 0x0, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) [ 575.202775][T17449] loop3: detected capacity change from 0 to 264192 11:00:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0, 0x0, 0x0) chown(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 11:00:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400200000", 0x1f, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a0900", 0x10, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000), 0x0, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400200000", 0x1f, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400200000", 0x1f, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) [ 575.207213][T17449] EXT4-fs (loop3): unsupported descriptor size 0 [ 575.231364][T17450] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. 11:00:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f0000fffffff6000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400200000", 0x1f, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400200000", 0x1f, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f0000fffffffe000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000000100200000001000080000", 0x25, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) [ 575.231939][ T7754] I/O error, dev loop3, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 575.241045][T17450] EXT4-fs (loop1): mount failed [ 575.281064][T17467] loop0: detected capacity change from 0 to 264192 [ 575.283735][T17467] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled 11:00:34 executing program 0: getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x4000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) lseek(r0, 0x8, 0x4) [ 575.283832][T17467] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (35945!=105) [ 575.283924][T17467] EXT4-fs (loop0): group descriptors corrupted! [ 575.292994][T17472] loop3: detected capacity change from 0 to 264192 [ 575.293873][T17473] loop1: detected capacity change from 0 to 264192 [ 575.298435][T17472] EXT4-fs (loop3): unsupported descriptor size 0 11:00:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f0000f6ffffff000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) [ 575.303795][T17473] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 575.304446][T17473] EXT4-fs (loop1): mount failed [ 575.324152][ T7746] I/O error, dev loop0, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 575.336949][ T7360] I/O error, dev loop3, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 575.355961][T17486] loop0: detected capacity change from 0 to 264192 11:00:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed", 0x1, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f0000feffffff000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400200000", 0x1f, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000000100200000001000080000", 0x25, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:34 executing program 0: getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x6) r0 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) lseek(r0, 0x8, 0x4) 11:00:34 executing program 0: r0 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) lseek(r0, 0x8, 0x4) [ 575.367504][T17486] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 575.367890][T17483] loop1: detected capacity change from 0 to 264192 11:00:34 executing program 3: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) write$binfmt_misc(r1, &(0x7f0000000040)={'syz0', "8d9b878a060048e6bdd80176a9fbb3e9514d6d206c3259ae5f8c2aeac5ba9c1590eb03d0ded237f8fd6f5ec3e53c3356c1bb302c5a50663683c656ea39df00a069e6b06aa9eba282aa62d63a"}, 0x50) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x5, @private2={0xfc, 0x2, '\x00', 0x1}, 0x1}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0xfffffff7, @remote, 0x3}, 0x1c) 11:00:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400200000", 0x1f, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a090000000000", 0x14, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed", 0x1, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) [ 575.367979][T17486] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) 11:00:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000800000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f0000000000000100200000001000080000", 0x25, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:34 executing program 0: r0 = syz_open_procfs$userns(0x0, 0x0) lseek(r0, 0x8, 0x4) [ 575.368001][T17486] EXT4-fs (loop0): group descriptors corrupted! 11:00:34 executing program 0: r0 = syz_open_procfs$userns(0x0, 0x0) lseek(r0, 0x8, 0x4) [ 575.394601][T17497] loop3: detected capacity change from 0 to 264192 11:00:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400200000", 0x1f, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a090000000000", 0x14, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000001000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed", 0x1, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) [ 575.395035][T17483] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 575.395316][T17483] EXT4-fs (loop1): mount failed [ 575.399167][T17497] EXT4-fs (loop3): unsupported descriptor size 0 [ 575.446274][T17511] loop1: detected capacity change from 0 to 264192 [ 575.454812][T17515] loop0: detected capacity change from 0 to 264192 11:00:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f0000ffffffffffff07000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:34 executing program 0: r0 = syz_open_procfs$userns(0x0, 0x0) lseek(r0, 0x8, 0x4) [ 575.469315][T17511] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 575.469753][T17511] EXT4-fs (loop1): mount failed [ 575.479237][T17520] loop3: detected capacity change from 0 to 264192 [ 575.481611][T17520] EXT4-fs (loop3): unsupported descriptor size 0 [ 575.491902][T17515] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 575.491965][T17515] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 575.491985][T17515] EXT4-fs (loop0): group descriptors corrupted! [ 575.541089][T17538] loop3: detected capacity change from 0 to 264192 [ 575.544745][T17539] loop0: detected capacity change from 0 to 264192 [ 575.554110][T17539] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 575.554170][T17539] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 575.554244][T17539] EXT4-fs (loop0): group descriptors corrupted! [ 575.557938][T17538] EXT4-fs (loop3): unsupported descriptor size 0 [ 575.569763][T17548] loop1: detected capacity change from 0 to 264192 [ 575.586983][ T7746] I/O error, dev loop3, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 575.596351][T17548] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 575.596741][T17548] EXT4-fs (loop1): mount failed [ 575.625344][T17562] loop3: detected capacity change from 0 to 264192 [ 575.626942][T17563] loop0: detected capacity change from 0 to 264192 [ 575.628360][T17562] EXT4-fs (loop3): unsupported descriptor size 0 [ 575.635669][T17563] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 575.635689][T17563] EXT4-fs (loop0): unsupported descriptor size 0 [ 575.659430][T17567] loop1: detected capacity change from 0 to 264192 [ 575.679744][T17567] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 575.680059][T17567] EXT4-fs (loop1): mount failed [ 575.716873][T17577] loop0: detected capacity change from 0 to 264192 [ 575.717887][T17575] loop3: detected capacity change from 0 to 264192 [ 575.719026][T17577] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 575.719044][T17577] EXT4-fs (loop0): unsupported descriptor size 0 [ 575.719138][T17575] EXT4-fs (loop3): unsupported descriptor size 0 [ 575.759645][T17592] loop1: detected capacity change from 0 to 264192 [ 575.760547][T17589] loop0: detected capacity change from 0 to 264192 [ 575.766972][T17595] loop3: detected capacity change from 0 to 264192 [ 575.767976][T17595] EXT4-fs (loop3): unsupported descriptor size 0 [ 575.773663][T17589] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 575.773706][T17589] EXT4-fs (loop0): unsupported descriptor size 0 [ 575.808600][T17592] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 575.809015][T17592] EXT4-fs (loop1): mount failed [ 575.855966][T17608] loop4: detected capacity change from 0 to 264192 [ 575.877978][T17612] loop1: detected capacity change from 0 to 264192 [ 575.878057][ T7754] ================================================================== [ 575.878083][ T7754] BUG: KCSAN: data-race in bdev_disk_changed / set_capacity_and_notify [ 575.878109][ T7754] [ 575.878114][ T7754] write to 0xffff8881027b3688 of 8 bytes by task 17612 on cpu 1: [ 575.878129][ T7754] set_capacity_and_notify+0xab/0x1d0 [ 575.878150][ T7754] loop_set_size+0x2e/0x70 [ 575.878170][ T7754] loop_configure+0xb1b/0xc20 [ 575.878190][ T7754] lo_ioctl+0x641/0x1290 [ 575.878207][ T7754] blkdev_ioctl+0x20e/0x440 [ 575.878225][ T7754] __se_sys_ioctl+0xcb/0x140 [ 575.878243][ T7754] __x64_sys_ioctl+0x3f/0x50 [ 575.878260][ T7754] do_syscall_64+0x2b/0x70 [ 575.878281][ T7754] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 575.878302][ T7754] [ 575.878306][ T7754] read to 0xffff8881027b3688 of 8 bytes by task 7754 on cpu 0: [ 575.878323][ T7754] bdev_disk_changed+0x1b9/0xc30 [ 575.878344][ T7754] blkdev_get_by_dev+0x3c0/0x9c0 [ 575.878362][ T7754] blkdev_open+0xac/0x140 [ 575.878378][ T7754] do_dentry_open+0x521/0x850 [ 575.878400][ T7754] vfs_open+0x43/0x50 [ 575.878414][ T7754] path_openat+0x16cf/0x1b30 [ 575.878434][ T7754] do_filp_open+0x105/0x220 [ 575.878451][ T7754] do_sys_openat2+0xb5/0x2a0 [ 575.878465][ T7754] __x64_sys_openat+0xef/0x110 [ 575.878481][ T7754] do_syscall_64+0x2b/0x70 [ 575.878499][ T7754] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 575.878518][ T7754] [ 575.878521][ T7754] value changed: 0x0000000000000000 -> 0x0000000000040800 [ 575.878531][ T7754] [ 575.878534][ T7754] Reported by Kernel Concurrency Sanitizer on: [ 575.878539][ T7754] CPU: 0 PID: 7754 Comm: udevd Not tainted 5.19.0-rc2-syzkaller-00117-g47700948a4ab-dirty #0 [ 575.878560][ T7754] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 575.878571][ T7754] ================================================================== [ 575.879520][T17615] loop0: detected capacity change from 0 to 264192 [ 575.882257][T17608] EXT4-fs warning (device loop4): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-22). Please run e2fsck to fix. [ 575.882532][T17615] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 575.882548][T17615] EXT4-fs (loop0): unsupported descriptor size 0 [ 575.882972][T17608] EXT4-fs (loop4): mount failed [ 575.893599][T17612] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 575.894073][T17612] EXT4-fs (loop1): mount failed [ 575.894483][T17619] loop3: detected capacity change from 0 to 264192 [ 575.989778][T17628] loop0: detected capacity change from 0 to 264192 11:00:35 executing program 3: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) write$binfmt_misc(r1, &(0x7f0000000040)={'syz0', "8d9b878a060048e6bdd80176a9fbb3e9514d6d206c3259ae5f8c2aeac5ba9c1590eb03d0ded237f8fd6f5ec3e53c3356c1bb302c5a50663683c656ea39df00a069e6b06aa9eba282aa62d63a"}, 0x50) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x5, @private2={0xfc, 0x2, '\x00', 0x1}, 0x1}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0xfffffff7, @remote, 0x3}, 0x1c) 11:00:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400"/55, 0x37, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:35 executing program 0: syz_open_procfs$userns(0x0, &(0x7f0000000140)) lseek(0xffffffffffffffff, 0x8, 0x4) 11:00:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655f", 0x10, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000008000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400200000", 0x1f, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a090000000000", 0x14, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) [ 575.993892][T17628] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 575.993911][T17628] EXT4-fs (loop0): unsupported descriptor size 0 [ 575.995144][T17633] loop1: detected capacity change from 0 to 264192 [ 576.008938][T17619] EXT4-fs (loop3): unsupported descriptor size 0 [ 576.034956][T17633] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 576.035272][T17633] EXT4-fs (loop1): mount failed 11:00:35 executing program 0: syz_open_procfs$userns(0x0, &(0x7f0000000140)) lseek(0xffffffffffffffff, 0x8, 0x4) 11:00:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000020000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000010004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) [ 576.057755][T17640] loop0: detected capacity change from 0 to 264192 [ 576.058828][T17640] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 576.058856][T17640] EXT4-fs (loop0): unsupported descriptor size 0 [ 576.067586][T17643] loop3: detected capacity change from 0 to 264192 [ 576.068882][T17643] EXT4-fs (loop3): unsupported descriptor size 0 11:00:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000020004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400"/55, 0x37, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655f", 0x10, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) [ 576.100821][T17647] loop1: detected capacity change from 0 to 264192 [ 576.128112][T17647] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 576.132304][T17647] EXT4-fs (loop1): mount failed [ 576.153708][T17655] loop0: detected capacity change from 0 to 264192 [ 576.156664][T17656] loop3: detected capacity change from 0 to 264192 [ 576.157755][T17656] EXT4-fs (loop3): unsupported descriptor size 0 [ 576.158245][T17655] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 576.158305][T17655] EXT4-fs (loop0): unsupported descriptor size 0 [ 576.179570][T17661] loop1: detected capacity change from 0 to 264192 [ 576.208886][T17668] loop3: detected capacity change from 0 to 264192 [ 576.213309][T17668] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 576.213369][T17661] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 576.213626][T17661] EXT4-fs (loop1): mount failed [ 576.223906][T17670] loop0: detected capacity change from 0 to 264192 [ 576.228366][T17670] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 576.228382][T17670] EXT4-fs (loop0): unsupported descriptor size 0 [ 576.296293][T17690] loop1: detected capacity change from 0 to 264192 [ 576.300715][T17692] loop3: detected capacity change from 0 to 264192 [ 576.302569][T17693] loop0: detected capacity change from 0 to 264192 [ 576.305897][T17690] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 576.306182][T17692] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 576.306204][T17690] EXT4-fs (loop1): mount failed [ 576.310561][T17693] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 576.310578][T17693] EXT4-fs (loop0): unsupported descriptor size 0 [ 576.400016][T17713] loop0: detected capacity change from 0 to 264192 [ 576.404155][T17714] loop3: detected capacity change from 0 to 264192 [ 576.405066][T17713] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 576.405084][T17713] EXT4-fs (loop0): unsupported descriptor size 0 [ 576.413044][T17714] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 576.472525][T17720] loop1: detected capacity change from 0 to 264192 [ 576.479801][T17727] loop0: detected capacity change from 0 to 264192 [ 576.498827][T17720] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 576.499158][T17720] EXT4-fs (loop1): mount failed [ 576.499580][T17730] loop3: detected capacity change from 0 to 264192 [ 576.502764][T17727] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 576.502779][T17727] EXT4-fs (loop0): unsupported descriptor size 0 [ 576.505997][T17730] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 576.571146][T17746] loop1: detected capacity change from 0 to 264192 [ 576.573044][T17747] loop3: detected capacity change from 0 to 264192 [ 576.574158][T17748] loop0: detected capacity change from 0 to 264192 [ 576.575576][T17747] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 576.575938][T17748] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 576.575952][T17748] EXT4-fs (loop0): unsupported descriptor size 0 [ 576.626328][T17746] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 576.626703][T17746] EXT4-fs (loop1): mount failed [ 576.649363][T17768] loop1: detected capacity change from 0 to 264192 [ 576.669715][T17772] loop0: detected capacity change from 0 to 264192 [ 576.671312][T17772] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 576.671329][T17772] EXT4-fs (loop0): unsupported descriptor size 0 [ 576.689386][T17768] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 576.689735][T17768] EXT4-fs (loop1): mount failed [ 576.716713][T17783] loop3: detected capacity change from 0 to 264192 [ 576.730931][T17785] loop0: detected capacity change from 0 to 264192 [ 576.732747][T17785] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 576.732765][T17785] EXT4-fs (loop0): unsupported descriptor size 0 [ 576.732809][T17783] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 576.745973][T17791] loop1: detected capacity change from 0 to 264192 [ 576.840054][T17791] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 576.840344][T17791] EXT4-fs (loop1): mount failed [ 576.846079][T17808] loop3: detected capacity change from 0 to 264192 [ 576.853648][T17808] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 576.860893][T17815] loop0: detected capacity change from 0 to 264192 [ 576.886572][T17815] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 576.886591][T17815] EXT4-fs (loop0): unsupported descriptor size 0 [ 576.896296][T17825] loop1: detected capacity change from 0 to 264192 [ 576.901140][T17827] loop3: detected capacity change from 0 to 264192 [ 576.904262][T17827] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 576.952373][T17825] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 576.955217][T17825] EXT4-fs (loop1): mount failed [ 576.961386][T17843] loop0: detected capacity change from 0 to 264192 [ 576.966560][T17843] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 576.966657][T17843] EXT4-fs (loop0): unsupported descriptor size 0 [ 576.969633][T17848] loop3: detected capacity change from 0 to 264192 [ 576.980099][T17848] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 577.056550][T17860] loop1: detected capacity change from 0 to 264192 [ 577.071808][T17864] loop0: detected capacity change from 0 to 264192 [ 577.073754][T17864] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 577.073771][T17864] EXT4-fs (loop0): unsupported descriptor size 0 [ 577.075484][T17865] loop3: detected capacity change from 0 to 264192 [ 577.076594][T17865] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 577.143167][T17879] loop0: detected capacity change from 0 to 264192 [ 577.146590][T17879] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 577.146607][T17879] EXT4-fs (loop0): unsupported descriptor size 0 [ 577.167398][T17860] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 577.167680][T17860] EXT4-fs (loop1): mount failed [ 577.216874][T17893] loop3: detected capacity change from 0 to 264192 [ 577.220456][T17893] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 577.237998][T17896] loop0: detected capacity change from 0 to 264192 [ 577.238950][T17896] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 577.238967][T17896] EXT4-fs (loop0): unsupported descriptor size 0 [ 577.247842][T17899] loop1: detected capacity change from 0 to 264192 [ 577.282392][T17909] loop3: detected capacity change from 0 to 264192 [ 577.282759][T17899] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 577.283339][T17899] EXT4-fs (loop1): mount failed 11:00:35 executing program 3: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) write$binfmt_misc(r1, &(0x7f0000000040)={'syz0', "8d9b878a060048e6bdd80176a9fbb3e9514d6d206c3259ae5f8c2aeac5ba9c1590eb03d0ded237f8fd6f5ec3e53c3356c1bb302c5a50663683c656ea39df00a069e6b06aa9eba282aa62d63a"}, 0x50) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x5, @private2={0xfc, 0x2, '\x00', 0x1}, 0x1}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x40044, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0xfffffff7, @remote, 0x3}, 0x1c) 11:00:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000004020004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:35 executing program 0: syz_open_procfs$userns(0x0, &(0x7f0000000140)) lseek(0xffffffffffffffff, 0x8, 0x4) 11:00:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400200000", 0x1f, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655f", 0x10, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400"/55, 0x37, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) [ 577.340097][T17909] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 577.353919][T17920] loop0: detected capacity change from 0 to 264192 [ 577.363764][T17922] loop1: detected capacity change from 0 to 264192 [ 577.371368][T17922] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 577.371736][T17922] EXT4-fs (loop1): mount failed [ 577.380109][T17920] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled 11:00:35 executing program 0: r0 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) lseek(r0, 0x0, 0x4) 11:00:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000030004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000040004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) [ 577.380128][T17920] EXT4-fs (loop0): unsupported descriptor size 0 [ 577.416708][T17936] loop0: detected capacity change from 0 to 264192 [ 577.418941][T17937] loop3: detected capacity change from 0 to 264192 [ 577.421636][T17936] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 577.421651][T17936] EXT4-fs (loop0): unsupported descriptor size 0 11:00:35 executing program 0: r0 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) lseek(r0, 0x0, 0x0) 11:00:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000", 0x40, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000050004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) [ 577.431468][T17937] EXT4-fs (loop3): invalid first ino: 0 [ 577.436825][T17940] loop1: detected capacity change from 0 to 264192 [ 577.458065][T17940] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 577.458348][T17940] EXT4-fs (loop1): mount failed [ 577.477590][T17946] loop3: detected capacity change from 0 to 264192 [ 577.481372][T17946] EXT4-fs (loop3): invalid first ino: 0 [ 577.482863][T17950] loop0: detected capacity change from 0 to 264192 [ 577.496878][T17950] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 577.496894][T17950] EXT4-fs (loop0): unsupported descriptor size 0 [ 577.516286][T17956] loop1: detected capacity change from 0 to 256 [ 577.518863][T17956] EXT4-fs (loop1): bad geometry: block count 512 exceeds size of device (128 blocks) [ 577.550604][ T7359] Buffer I/O error on dev loop1, logical block 0, async page read [ 577.550636][ T7359] Buffer I/O error on dev loop1, logical block 2, async page read [ 577.550657][ T7359] Buffer I/O error on dev loop1, logical block 3, async page read [ 577.553742][T17965] loop0: detected capacity change from 0 to 264192 [ 577.562258][T17968] loop3: detected capacity change from 0 to 264192 [ 577.564142][T17969] loop1: detected capacity change from 0 to 256 [ 577.573756][T17968] EXT4-fs (loop3): invalid first ino: 0 [ 577.575877][T17969] EXT4-fs (loop1): bad geometry: block count 512 exceeds size of device (128 blocks) [ 577.587781][T17965] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 577.587797][T17965] EXT4-fs (loop0): unsupported descriptor size 0 [ 577.669472][T17987] loop0: detected capacity change from 0 to 264192 [ 577.675672][T17987] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 577.675691][T17987] EXT4-fs (loop0): unsupported descriptor size 0 [ 577.682272][T17989] loop1: detected capacity change from 0 to 256 [ 577.695320][T17989] EXT4-fs (loop1): bad geometry: block count 512 exceeds size of device (128 blocks) [ 577.704747][T17992] loop3: detected capacity change from 0 to 264192 [ 577.712208][T17992] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) [ 577.748687][T18001] loop0: detected capacity change from 0 to 264192 [ 577.749612][T18001] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 577.770391][T18005] loop3: detected capacity change from 0 to 264192 [ 577.780657][T18005] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) [ 577.786387][T18007] loop1: detected capacity change from 0 to 256 [ 577.787561][T18007] EXT4-fs (loop1): bad geometry: block count 512 exceeds size of device (128 blocks) [ 577.820575][T18018] loop0: detected capacity change from 0 to 264192 [ 577.829854][T18018] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 577.843099][T18022] loop1: detected capacity change from 0 to 256 [ 577.856168][T18024] loop3: detected capacity change from 0 to 264192 [ 577.860961][T18022] EXT4-fs (loop1): bad geometry: block count 512 exceeds size of device (128 blocks) [ 577.861185][T18024] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) [ 577.904928][T18034] loop0: detected capacity change from 0 to 264192 [ 577.909647][T18034] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 577.943613][T18042] loop1: detected capacity change from 0 to 256 [ 577.945251][T18043] loop3: detected capacity change from 0 to 264192 [ 577.947184][T18042] EXT4-fs (loop1): bad geometry: block count 512 exceeds size of device (128 blocks) [ 577.947269][T18043] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) [ 577.947974][T18045] loop4: detected capacity change from 0 to 16383 [ 577.958808][T18049] loop0: detected capacity change from 0 to 264192 [ 577.960963][T18049] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 577.963181][T18045] EXT4-fs mount: 198 callbacks suppressed [ 577.963194][T18045] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. [ 577.968059][T18045] EXT4-fs error (device loop4): __ext4_new_inode:1072: comm syz-executor.4: reserved inode found cleared - inode=1 [ 578.010339][ T1860] EXT4-fs (loop4): unmounting filesystem. [ 578.015374][T18056] loop3: detected capacity change from 0 to 264192 [ 578.016898][T18056] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) [ 578.018318][T18058] loop1: detected capacity change from 0 to 264192 [ 578.062849][T18063] loop0: detected capacity change from 0 to 264192 [ 578.067214][T18063] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 578.071079][T18065] loop4: detected capacity change from 0 to 264192 [ 578.080295][T18068] loop3: detected capacity change from 0 to 264192 [ 578.090801][T18068] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) [ 578.090974][T18065] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 578.108391][T18065] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. [ 578.125953][T18073] loop0: detected capacity change from 0 to 264192 [ 578.135811][T18073] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 578.150720][T18058] EXT4-fs error (device loop1): ext4_quota_enable:6753: comm syz-executor.1: Bad quota inode # 4 [ 578.150968][T18058] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 578.159058][T18058] EXT4-fs (loop1): mount failed [ 578.225587][T18083] loop0: detected capacity change from 0 to 264192 [ 578.236712][ T7754] Buffer I/O error on dev loop1, logical block 0, async page read [ 578.236739][ T7754] Buffer I/O error on dev loop1, logical block 3, async page read [ 578.238674][T18083] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 578.261035][ T1860] EXT4-fs (loop4): unmounting filesystem. [ 578.268085][T18087] loop3: detected capacity change from 0 to 264192 [ 578.274295][ T7754] blk_print_req_error: 41 callbacks suppressed [ 578.274308][ T7754] I/O error, dev loop0, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 578.291864][T18087] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) [ 578.303758][T18097] loop4: detected capacity change from 0 to 264192 [ 578.310795][T18097] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. [ 578.313585][T18101] loop1: detected capacity change from 0 to 264192 [ 578.319054][T18105] loop0: detected capacity change from 0 to 264192 [ 578.319920][T18105] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 578.324400][T18101] EXT4-fs error (device loop1): ext4_quota_enable:6753: comm syz-executor.1: Bad quota inode # 4 [ 578.324572][T18101] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 578.327604][T18101] EXT4-fs (loop1): mount failed [ 578.331594][ T1860] EXT4-fs (loop4): unmounting filesystem. [ 578.345013][ T7754] I/O error, dev loop3, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 578.354332][ T7746] I/O error, dev loop1, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 578.388979][T18115] loop3: detected capacity change from 0 to 264192 [ 578.390074][T18114] loop4: detected capacity change from 0 to 264192 [ 578.391358][T18115] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) [ 578.391751][T18112] loop0: detected capacity change from 0 to 264192 [ 578.396553][T18121] loop1: detected capacity change from 0 to 264192 [ 578.398329][T18112] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 578.400030][T18114] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. [ 578.404098][T18121] EXT4-fs error (device loop1): ext4_quota_enable:6753: comm syz-executor.1: Bad quota inode # 4 [ 578.404242][T18121] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 578.416340][T18121] EXT4-fs (loop1): mount failed [ 578.431436][ T7754] I/O error, dev loop0, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 578.433035][ T7746] I/O error, dev loop3, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 578.446268][T18127] loop3: detected capacity change from 0 to 264192 11:00:36 executing program 3: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) write$binfmt_misc(r1, &(0x7f0000000040)={'syz0', "8d9b878a060048e6bdd80176a9fbb3e9514d6d206c3259ae5f8c2aeac5ba9c1590eb03d0ded237f8fd6f5ec3e53c3356c1bb302c5a50663683c656ea39df00a069e6b06aa9eba282aa62d63a"}, 0x50) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x5, @private2={0xfc, 0x2, '\x00', 0x1}, 0x1}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0xfffffff7, @remote, 0x3}, 0x1c) 11:00:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400200000", 0x1f, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f00000000", 0x18, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:36 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x25, &(0x7f0000000080)=0x1, 0x4) 11:00:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000004060004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000", 0x40, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000080004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:36 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) [ 578.452191][ T7359] I/O error, dev loop1, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 578.499301][ T1860] EXT4-fs (loop4): unmounting filesystem. [ 578.502844][T18127] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) [ 578.505074][T18138] loop0: detected capacity change from 0 to 264192 11:00:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000180004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:36 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x10, &(0x7f0000000080)=0x1, 0x4) 11:00:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000260004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:36 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x10, &(0x7f0000000080)=0x1, 0x4) [ 578.535565][T18138] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 578.566965][T18144] loop1: detected capacity change from 0 to 264192 [ 578.603618][T18151] loop4: detected capacity change from 0 to 264192 [ 578.605086][T18152] loop3: detected capacity change from 0 to 264192 [ 578.605996][T18152] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) [ 578.607343][T18144] EXT4-fs error (device loop1): ext4_quota_enable:6753: comm syz-executor.1: Bad quota inode # 4 [ 578.608663][T18144] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 578.608994][T18144] EXT4-fs (loop1): mount failed [ 578.612027][T18157] loop0: detected capacity change from 0 to 264192 [ 578.619947][T18157] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 578.637610][T18151] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. [ 578.655049][ T7754] I/O error, dev loop3, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 578.676752][T18168] loop1: detected capacity change from 0 to 264192 [ 578.681313][T18169] loop3: detected capacity change from 0 to 264192 [ 578.699507][T18169] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) [ 578.737948][T18168] EXT4-fs error (device loop1): ext4_quota_enable:6753: comm syz-executor.1: Bad quota inode # 4 [ 578.738127][T18168] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 578.739701][T18168] EXT4-fs (loop1): mount failed [ 578.756126][T18174] loop0: detected capacity change from 0 to 264192 [ 578.765426][T18174] EXT4-fs (loop0): invalid first ino: 0 [ 578.785375][ T1860] EXT4-fs (loop4): unmounting filesystem. [ 578.795110][T18178] loop5: detected capacity change from 0 to 264192 [ 578.845058][T18178] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: writeback. [ 578.884594][T18183] loop1: detected capacity change from 0 to 264192 [ 578.911057][T18187] loop4: detected capacity change from 0 to 264192 [ 578.916399][T18188] loop0: detected capacity change from 0 to 264192 [ 578.930848][T18183] EXT4-fs error (device loop1): ext4_quota_enable:6753: comm syz-executor.1: Bad quota inode # 4 [ 578.931045][T18183] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 578.938969][T18188] EXT4-fs (loop0): invalid first ino: 0 [ 578.940043][T18183] EXT4-fs (loop1): mount failed [ 578.977002][ T1832] EXT4-fs (loop5): unmounting filesystem. [ 578.977339][T18192] loop3: detected capacity change from 0 to 264192 [ 578.985145][T18192] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 578.987281][T18187] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. [ 579.090804][T18196] loop0: detected capacity change from 0 to 264192 [ 579.100887][T18197] loop1: detected capacity change from 0 to 264192 [ 579.115198][T18196] EXT4-fs (loop0): invalid first ino: 0 [ 579.122498][ T1860] EXT4-fs (loop4): unmounting filesystem. [ 579.138654][T18201] loop3: detected capacity change from 0 to 264192 [ 579.161292][T18201] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 579.167814][T18204] loop5: detected capacity change from 0 to 264192 [ 579.192735][T18197] EXT4-fs error (device loop1): ext4_quota_enable:6753: comm syz-executor.1: Bad quota inode # 4 [ 579.192912][T18197] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 579.197003][T18197] EXT4-fs (loop1): mount failed [ 579.220008][T18209] loop0: detected capacity change from 0 to 264192 [ 579.230920][T18209] EXT4-fs (loop0): fragment/cluster size (16384) != block size (1024) [ 579.246006][T18215] loop4: detected capacity change from 0 to 264192 [ 579.248147][T18204] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: writeback. [ 579.274886][T18218] loop1: detected capacity change from 0 to 264192 [ 579.282786][T18215] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. [ 579.314128][T18218] EXT4-fs error (device loop1): ext4_quota_enable:6753: comm syz-executor.1: Bad quota inode # 4 [ 579.317811][T18223] loop3: detected capacity change from 0 to 264192 [ 579.318283][T18218] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 579.319603][T18218] EXT4-fs (loop1): mount failed [ 579.320588][ T1860] EXT4-fs (loop4): unmounting filesystem. [ 579.338501][T18225] loop0: detected capacity change from 0 to 264192 [ 579.344607][ T1832] EXT4-fs (loop5): unmounting filesystem. [ 579.352046][T18225] EXT4-fs (loop0): fragment/cluster size (16384) != block size (1024) [ 579.379262][T18230] loop5: detected capacity change from 0 to 264192 [ 579.384330][T18230] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 579.386690][T18232] loop4: detected capacity change from 0 to 264192 [ 579.395503][T18237] loop1: detected capacity change from 0 to 264192 [ 579.396665][T18238] loop0: detected capacity change from 0 to 264192 [ 579.397999][T18230] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: writeback. [ 579.402448][T18238] EXT4-fs (loop0): fragment/cluster size (16384) != block size (1024) [ 579.416220][T18241] loop3: detected capacity change from 0 to 264192 [ 579.440281][T18232] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. [ 579.440878][T18237] EXT4-fs error (device loop1): ext4_quota_enable:6753: comm syz-executor.1: Bad quota inode # 4 [ 579.441964][T18237] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 579.463994][T18237] EXT4-fs (loop1): mount failed [ 579.468332][T18244] loop0: detected capacity change from 0 to 264192 [ 579.473042][ T1832] EXT4-fs (loop5): unmounting filesystem. [ 579.479921][T18244] EXT4-fs (loop0): fragment/cluster size (16384) != block size (1024) [ 579.482944][ T1860] EXT4-fs (loop4): unmounting filesystem. [ 579.498109][T18248] loop5: detected capacity change from 0 to 264192 [ 579.503418][T18248] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 579.512389][T18248] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: writeback. [ 579.512483][ T7359] I/O error, dev loop0, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 579.518028][T18251] loop4: detected capacity change from 0 to 264192 [ 579.541581][T18251] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. [ 579.551154][T18256] loop0: detected capacity change from 0 to 264192 [ 579.552372][T18256] EXT4-fs (loop0): fragment/cluster size (16384) != block size (1024) [ 579.562573][T18259] loop3: detected capacity change from 0 to 264192 [ 579.565623][T18260] loop1: detected capacity change from 0 to 264192 [ 579.567566][ T1832] EXT4-fs (loop5): unmounting filesystem. [ 579.583468][ T1860] EXT4-fs (loop4): unmounting filesystem. [ 579.584325][ T7754] I/O error, dev loop0, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 579.608125][T18267] loop0: detected capacity change from 0 to 264192 [ 579.616650][T18260] EXT4-fs error (device loop1): ext4_ext_check_inode:497: inode #4: comm syz-executor.1: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 579.616907][T18260] EXT4-fs error (device loop1): ext4_quota_enable:6753: comm syz-executor.1: Bad quota inode # 4 [ 579.617068][T18260] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 579.617810][T18269] loop5: detected capacity change from 0 to 264192 [ 579.620405][T18269] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 579.622333][T18260] EXT4-fs (loop1): mount failed [ 579.633648][T18267] EXT4-fs (loop0): fragment/cluster size (16384) != block size (1024) [ 579.637225][T18270] loop4: detected capacity change from 0 to 264192 [ 579.649548][T18259] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 579.652644][T18269] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: writeback. [ 579.681573][ T1841] EXT4-fs (loop3): unmounting filesystem. [ 579.693320][ T1832] EXT4-fs (loop5): unmounting filesystem. 11:00:37 executing program 3: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r1 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) write$binfmt_misc(r1, &(0x7f0000000040)={'syz0', "8d9b878a060048e6bdd80176a9fbb3e9514d6d206c3259ae5f8c2aeac5ba9c1590eb03d0ded237f8fd6f5ec3e53c3356c1bb302c5a50663683c656ea39df00a069e6b06aa9eba282aa62d63a"}, 0x50) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0xfffffff7, @remote, 0x3}, 0x1c) 11:00:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f0000000000000000003f0004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400200000", 0x1f, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000", 0x40, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f00000000", 0x18, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:37 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x10, &(0x7f0000000080)=0x1, 0x4) 11:00:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000400004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:37 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_int(r0, 0x6, 0x10, &(0x7f0000000080)=0x1, 0x4) [ 579.693962][T18270] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. [ 579.695252][T18275] loop0: detected capacity change from 0 to 264192 [ 579.698560][T18275] EXT4-fs (loop0): fragment/cluster size (16384) != block size (1024) 11:00:37 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_int(r0, 0x6, 0x10, &(0x7f0000000080)=0x1, 0x4) 11:00:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000800400004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:37 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_int(r0, 0x6, 0x10, &(0x7f0000000080)=0x1, 0x4) [ 579.706145][T18281] loop1: detected capacity change from 0 to 264192 [ 579.744962][T18285] loop5: detected capacity change from 0 to 264192 [ 579.746953][T18285] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 579.754491][ T1860] EXT4-fs (loop4): unmounting filesystem. [ 579.755819][T18281] EXT4-fs error (device loop1): ext4_ext_check_inode:497: inode #4: comm syz-executor.1: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) 11:00:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f00000000", 0x18, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) [ 579.755997][T18281] EXT4-fs error (device loop1): ext4_quota_enable:6753: comm syz-executor.1: Bad quota inode # 4 [ 579.756102][T18281] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 579.756486][T18281] EXT4-fs (loop1): mount failed [ 579.766703][T18285] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: writeback. [ 579.799805][T18291] loop0: detected capacity change from 0 to 264192 [ 579.800593][T18291] EXT4-fs (loop0): fragment/cluster size (16384) != block size (1024) [ 579.809390][ T1832] EXT4-fs (loop5): unmounting filesystem. [ 579.820588][T18296] loop4: detected capacity change from 0 to 264192 [ 579.822692][T18297] loop3: detected capacity change from 0 to 264192 [ 579.830452][T18296] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. [ 579.841087][T18297] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 579.853209][T18301] loop5: detected capacity change from 0 to 264192 [ 579.854054][T18301] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 579.854432][ T1860] EXT4-fs (loop4): unmounting filesystem. [ 579.860223][T18303] loop1: detected capacity change from 0 to 264192 [ 579.866534][T18310] loop0: detected capacity change from 0 to 264192 [ 579.871461][T18310] EXT4-fs (loop0): fragment/cluster size (16384) != block size (1024) [ 579.876740][T18301] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: writeback. [ 579.897370][T18315] loop0: detected capacity change from 0 to 264192 [ 579.905943][T18303] EXT4-fs error (device loop1): ext4_ext_check_inode:497: inode #4: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 2, max 4(4), depth 0(0) [ 579.906083][T18303] EXT4-fs error (device loop1): ext4_quota_enable:6753: comm syz-executor.1: Bad quota inode # 4 [ 579.906175][T18303] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 579.906505][T18303] EXT4-fs (loop1): mount failed [ 579.939515][ T1841] EXT4-fs (loop3): unmounting filesystem. [ 579.948804][T18317] loop4: detected capacity change from 0 to 264192 [ 579.955545][ T1832] EXT4-fs (loop5): unmounting filesystem. [ 579.998317][T18321] loop1: detected capacity change from 0 to 264192 [ 580.005314][T18317] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. [ 580.047828][T18315] EXT4-fs (loop0): fragment/cluster size (16384) != block size (1024) [ 580.052323][T18324] loop5: detected capacity change from 0 to 264192 [ 580.075862][T18321] EXT4-fs error (device loop1): ext4_ext_check_inode:497: inode #4: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 2, max 4(4), depth 0(0) [ 580.076221][T18321] EXT4-fs error (device loop1): ext4_quota_enable:6753: comm syz-executor.1: Bad quota inode # 4 [ 580.076368][T18321] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 580.076829][T18321] EXT4-fs (loop1): mount failed [ 580.128504][ T1860] EXT4-fs (loop4): unmounting filesystem. [ 580.130247][T18327] loop3: detected capacity change from 0 to 264192 [ 580.153795][T18329] loop0: detected capacity change from 0 to 264192 [ 580.160399][T18327] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 580.167719][T18329] EXT4-fs (loop0): fragment/cluster size (16384) != block size (1024) [ 580.202719][T18336] loop5: detected capacity change from 0 to 264192 [ 580.203673][T18332] loop1: detected capacity change from 0 to 264192 [ 580.229496][T18338] loop4: detected capacity change from 0 to 264192 [ 580.279197][ T1841] EXT4-fs (loop3): unmounting filesystem. [ 580.303435][T18340] loop0: detected capacity change from 0 to 264192 [ 580.304489][T18340] EXT4-fs (loop0): fragment/cluster size (16384) != block size (1024) [ 580.335212][T18338] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. [ 580.347674][T18349] loop5: detected capacity change from 0 to 264192 [ 580.350490][T18348] loop3: detected capacity change from 0 to 264192 [ 580.351468][ T7754] I/O error, dev loop0, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 580.358999][T18332] EXT4-fs error (device loop1): ext4_ext_check_inode:497: inode #4: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 2, max 4(4), depth 0(0) [ 580.359309][T18332] EXT4-fs error (device loop1): ext4_quota_enable:6753: comm syz-executor.1: Bad quota inode # 4 [ 580.359492][T18332] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 580.360061][T18332] EXT4-fs (loop1): mount failed [ 580.369681][ T1860] EXT4-fs (loop4): unmounting filesystem. [ 580.378376][T18348] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 580.405777][T18359] loop0: detected capacity change from 0 to 264192 [ 580.407600][ T1841] EXT4-fs (loop3): unmounting filesystem. [ 580.426077][T18359] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 580.427202][T18354] loop5: detected capacity change from 0 to 264192 [ 580.439932][T18361] loop1: detected capacity change from 0 to 264192 [ 580.444455][ T7359] Buffer I/O error on dev loop5, logical block 0, async page read [ 580.444482][ T7359] loop5: unable to read partition table [ 580.444500][ T7359] loop5: partition table beyond EOD, truncated [ 580.467801][T18361] EXT4-fs error (device loop1): ext4_ext_check_inode:497: inode #4: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 2, max 4(4), depth 0(0) [ 580.467938][T18361] EXT4-fs error (device loop1): ext4_quota_enable:6753: comm syz-executor.1: Bad quota inode # 4 [ 580.468096][T18361] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 580.469582][T18361] EXT4-fs (loop1): mount failed [ 580.472182][T18366] loop0: detected capacity change from 0 to 264192 [ 580.477014][T18369] loop3: detected capacity change from 0 to 264192 [ 580.489954][T18371] loop5: detected capacity change from 0 to 264192 [ 580.520230][T18369] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 580.527725][T18375] loop1: detected capacity change from 0 to 264192 [ 580.553841][ T1841] EXT4-fs (loop3): unmounting filesystem. [ 580.556861][T18366] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 580.566033][T18381] loop5: detected capacity change from 0 to 264192 [ 580.576524][T18384] loop3: detected capacity change from 0 to 264192 [ 580.578920][T18375] EXT4-fs error (device loop1): ext4_ext_check_inode:497: inode #4: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 2, max 4(4), depth 0(0) [ 580.579055][T18375] EXT4-fs error (device loop1): ext4_quota_enable:6753: comm syz-executor.1: Bad quota inode # 4 [ 580.579224][T18375] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 580.579626][T18375] EXT4-fs (loop1): mount failed [ 580.595347][T18384] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 580.629537][T18391] No source specified [ 580.630253][ T1841] EXT4-fs (loop3): unmounting filesystem. [ 580.638188][T18395] loop0: detected capacity change from 0 to 264192 [ 580.640779][T18395] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 580.647977][T18398] loop1: detected capacity change from 0 to 264192 [ 580.655625][T18398] EXT4-fs error (device loop1): ext4_ext_check_inode:497: inode #4: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 2, max 4(4), depth 0(0) 11:00:38 executing program 3: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0xfffffff7, @remote, 0x3}, 0x1c) 11:00:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af3020004000000000000000000000002000000300000000200000004", 0x45, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f0000000000000000005a0004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400200000", 0x1f, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:38 executing program 0: connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x10, &(0x7f0000000080)=0x1, 0x4) 11:00:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400", 0x1c, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:38 executing program 0: connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x10, &(0x7f0000000080)=0x1, 0x4) [ 580.657633][T18398] EXT4-fs error (device loop1): ext4_quota_enable:6753: comm syz-executor.1: Bad quota inode # 4 [ 580.659943][T18398] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 580.660247][T18398] EXT4-fs (loop1): mount failed [ 580.678465][T18400] loop3: detected capacity change from 0 to 264192 11:00:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000760004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:38 executing program 0: connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x10, &(0x7f0000000080)=0x1, 0x4) 11:00:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000830004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) [ 580.688144][T18400] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 580.692242][T18405] No source specified [ 580.709111][ T1841] EXT4-fs (loop3): unmounting filesystem. [ 580.712024][T18410] loop4: detected capacity change from 0 to 264192 [ 580.724334][T18415] loop0: detected capacity change from 0 to 264192 [ 580.732158][T18414] No source specified 11:00:38 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x10, &(0x7f0000000080)=0x1, 0x4) 11:00:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400200000", 0x1f, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) [ 580.735322][T18417] loop1: detected capacity change from 0 to 264192 [ 580.755693][T18420] loop3: detected capacity change from 0 to 264192 [ 580.757438][T18417] EXT4-fs error (device loop1): ext4_ext_check_inode:497: inode #4: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 2, max 4(4), depth 0(0) [ 580.757593][T18417] EXT4-fs error (device loop1): ext4_quota_enable:6753: comm syz-executor.1: Bad quota inode # 4 [ 580.757772][T18417] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 580.758124][T18417] EXT4-fs (loop1): mount failed [ 580.777905][T18426] loop4: detected capacity change from 0 to 264192 [ 580.782371][T18424] loop5: detected capacity change from 0 to 264192 [ 580.802246][T18424] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 580.804342][T18420] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 580.822587][T18434] loop0: detected capacity change from 0 to 264192 [ 580.857400][ T1841] EXT4-fs (loop3): unmounting filesystem. [ 580.861398][T18440] loop4: detected capacity change from 0 to 264192 [ 580.866405][T18424] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: writeback. [ 580.877322][T18443] loop1: detected capacity change from 0 to 264192 [ 580.885738][T18444] loop3: detected capacity change from 0 to 264192 [ 580.890384][ T1832] EXT4-fs (loop5): unmounting filesystem. [ 580.923707][T18444] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 580.925358][T18448] loop4: detected capacity change from 0 to 264192 [ 580.926706][T18443] EXT4-fs error (device loop1): ext4_ext_check_inode:497: inode #4: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 2, max 4(4), depth 0(0) [ 580.927017][T18443] EXT4-fs error (device loop1): ext4_quota_enable:6753: comm syz-executor.1: Bad quota inode # 4 [ 580.927211][T18443] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 580.927506][T18443] EXT4-fs (loop1): mount failed [ 580.936185][T18451] loop5: detected capacity change from 0 to 264192 [ 580.937141][T18452] loop0: detected capacity change from 0 to 264192 [ 580.959328][ T1443] Buffer I/O error on dev loop4, logical block 0, async page read [ 580.959362][ T1443] loop4: unable to read partition table [ 580.959379][ T1443] loop4: partition table beyond EOD, truncated [ 580.990585][T18451] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 581.012819][ T1841] EXT4-fs (loop3): unmounting filesystem. [ 581.014982][T18451] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: writeback. [ 581.035227][T18460] loop1: detected capacity change from 0 to 264192 [ 581.038982][ T1832] EXT4-fs (loop5): unmounting filesystem. [ 581.045682][T18463] loop0: detected capacity change from 0 to 264192 [ 581.052740][T18464] loop4: detected capacity change from 0 to 264192 [ 581.057087][T18467] loop5: detected capacity change from 0 to 264192 [ 581.058245][T18460] EXT4-fs error (device loop1): ext4_ext_check_inode:497: inode #4: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 2, max 4(4), depth 0(0) [ 581.058351][T18467] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 581.058485][T18460] EXT4-fs error (device loop1): ext4_quota_enable:6753: comm syz-executor.1: Bad quota inode # 4 [ 581.058698][T18460] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 581.071348][T18460] EXT4-fs (loop1): mount failed [ 581.073623][T18463] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback. [ 581.086644][T18472] loop3: detected capacity change from 0 to 264192 [ 581.088000][ T1443] Buffer I/O error on dev loop4, logical block 0, async page read [ 581.088031][ T1443] loop4: unable to read partition table [ 581.088114][ T1443] loop4: partition table beyond EOD, truncated [ 581.095167][T18467] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: writeback. [ 581.107505][T18476] loop4: detected capacity change from 0 to 264192 [ 581.145398][ T1443] Buffer I/O error on dev loop4, logical block 0, async page read [ 581.145425][ T1443] loop4: unable to read partition table [ 581.145515][ T1443] loop4: partition table beyond EOD, truncated [ 581.163274][T18480] loop5: detected capacity change from 0 to 23 [ 581.178394][T18482] loop0: detected capacity change from 0 to 264192 [ 581.197564][T18480] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 581.197586][T18480] EXT4-fs (loop5): bad geometry: block count 512 exceeds size of device (11 blocks) [ 581.202763][T18486] loop1: detected capacity change from 0 to 264192 [ 581.208279][T18487] No source specified [ 581.227634][T18492] loop3: detected capacity change from 0 to 264192 [ 581.232618][ T7359] Buffer I/O error on dev loop5, logical block 0, async page read [ 581.265003][T18486] EXT4-fs error (device loop1): ext4_ext_check_inode:497: inode #4: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 2, max 4(4), depth 0(0) [ 581.267471][T18486] EXT4-fs error (device loop1): ext4_quota_enable:6753: comm syz-executor.1: Bad quota inode # 4 [ 581.267640][T18486] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 581.268204][T18486] EXT4-fs (loop1): mount failed [ 581.287907][T18498] No source specified [ 581.301498][T18497] loop5: detected capacity change from 0 to 23 [ 581.302335][T18497] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 581.302352][T18497] EXT4-fs (loop5): bad geometry: block count 512 exceeds size of device (11 blocks) [ 581.304113][T18501] loop0: detected capacity change from 0 to 264192 [ 581.387862][T18512] loop5: detected capacity change from 0 to 23 [ 581.392778][T18512] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 581.392826][T18512] EXT4-fs (loop5): bad geometry: block count 512 exceeds size of device (11 blocks) [ 581.394915][T18505] loop1: detected capacity change from 0 to 264192 [ 581.397483][T18511] No source specified [ 581.402434][T18513] loop3: detected capacity change from 0 to 264192 [ 581.430424][T18505] EXT4-fs error (device loop1): ext4_ext_check_inode:497: inode #4: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 2, max 4(4), depth 0(0) [ 581.430608][T18505] EXT4-fs error (device loop1): ext4_quota_enable:6753: comm syz-executor.1: Bad quota inode # 4 [ 581.430710][T18505] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 581.442020][T18505] EXT4-fs (loop1): mount failed [ 581.476262][T18519] loop5: detected capacity change from 0 to 23 [ 581.523797][T18523] loop1: detected capacity change from 0 to 264192 [ 581.525283][T18522] loop4: detected capacity change from 0 to 264192 [ 581.532761][T18519] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 581.532866][T18519] EXT4-fs (loop5): bad geometry: block count 512 exceeds size of device (11 blocks) [ 581.546810][T18523] EXT4-fs error (device loop1): ext4_ext_check_inode:497: inode #4: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 2, max 4(4), depth 0(0) [ 581.547014][T18523] EXT4-fs error (device loop1): ext4_quota_enable:6753: comm syz-executor.1: Bad quota inode # 4 [ 581.547099][T18523] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. 11:00:39 executing program 3: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0xfffffff7, @remote, 0x3}, 0x1c) 11:00:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af3020004000000000000000000000002000000300000000200000004", 0x45, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400", 0x1c, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000fffffff60004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:39 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x10, &(0x7f0000000080)=0x1, 0x4) 11:00:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400200000", 0x1f, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000fffffffe0004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:39 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x10, &(0x7f0000000080)=0x1, 0x4) [ 581.562781][T18522] EXT4-fs warning (device loop4): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-22). Please run e2fsck to fix. [ 581.563922][T18523] EXT4-fs (loop1): mount failed [ 581.569328][T18522] EXT4-fs (loop4): mount failed [ 581.616319][T18529] loop3: detected capacity change from 0 to 264192 [ 581.649348][T18532] loop5: detected capacity change from 0 to 23 [ 581.676960][T18540] loop1: detected capacity change from 0 to 264192 [ 581.682112][T18539] loop0: detected capacity change from 0 to 264192 11:00:39 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, 0x0, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x10, &(0x7f0000000080)=0x1, 0x4) 11:00:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f0000fffffffffffffffe0004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:39 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, 0x0, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x10, &(0x7f0000000080)=0x1, 0x4) 11:00:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000ffffffff0004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) [ 581.682167][T18532] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 581.682184][T18532] EXT4-fs (loop5): bad geometry: block count 512 exceeds size of device (11 blocks) [ 581.717170][T18540] EXT4-fs error (device loop1): ext4_ext_check_inode:497: inode #4: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 2, max 4(4), depth 0(0) [ 581.718884][T18546] loop3: detected capacity change from 0 to 264192 [ 581.719658][T18540] EXT4-fs error (device loop1): ext4_quota_enable:6753: comm syz-executor.1: Bad quota inode # 4 [ 581.733822][T18540] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 581.734422][T18540] EXT4-fs (loop1): mount failed [ 581.744769][T18549] loop5: detected capacity change from 0 to 23 [ 581.748860][T18551] loop4: detected capacity change from 0 to 264192 [ 581.770641][T18549] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 581.770660][T18549] EXT4-fs (loop5): bad geometry: block count 512 exceeds size of device (11 blocks) [ 581.838530][T18559] loop0: detected capacity change from 0 to 264192 [ 581.845120][T18560] loop1: detected capacity change from 0 to 264192 [ 581.871075][T18563] loop5: detected capacity change from 0 to 264192 [ 581.881176][T18563] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 581.911886][T18551] EXT4-fs warning (device loop4): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-22). Please run e2fsck to fix. [ 581.918833][T18551] EXT4-fs (loop4): mount failed [ 581.979302][T18559] EXT4-fs error (device loop0): __ext4_fill_super:5226: inode #2: comm syz-executor.0: iget: root inode unallocated [ 581.979581][T18559] EXT4-fs (loop0): get root inode failed [ 581.979594][T18559] EXT4-fs (loop0): mount failed [ 581.980158][T18560] EXT4-fs error (device loop1): ext4_ext_check_inode:497: inode #4: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 2, max 4(4), depth 0(0) [ 581.980908][T18560] EXT4-fs error (device loop1): ext4_quota_enable:6753: comm syz-executor.1: Bad quota inode # 4 [ 581.981102][T18560] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 581.981875][T18560] EXT4-fs (loop1): mount failed [ 581.990243][T18574] loop5: detected capacity change from 0 to 22 [ 581.995526][T18574] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 581.995589][T18574] EXT4-fs (loop5): bad geometry: block count 512 exceeds size of device (11 blocks) [ 582.109377][T18584] loop3: detected capacity change from 0 to 264192 [ 582.112318][T18586] loop1: detected capacity change from 0 to 264192 [ 582.115698][T18588] loop4: detected capacity change from 0 to 264192 [ 582.117240][T18591] loop5: detected capacity change from 0 to 22 [ 582.133340][T18586] EXT4-fs error (device loop1): ext4_quota_enable:6753: comm syz-executor.1: Bad quota inode # 4 [ 582.133454][T18586] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 582.136839][T18586] EXT4-fs (loop1): mount failed [ 582.149440][T18591] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 582.149457][T18591] EXT4-fs (loop5): bad geometry: block count 512 exceeds size of device (11 blocks) [ 582.214449][T18588] EXT4-fs warning (device loop4): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-22). Please run e2fsck to fix. [ 582.215041][T18588] EXT4-fs (loop4): mount failed [ 582.230182][T18602] loop5: detected capacity change from 0 to 22 [ 582.232539][T18601] loop1: detected capacity change from 0 to 264192 [ 582.238609][T18602] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 582.238674][T18602] EXT4-fs (loop5): bad geometry: block count 512 exceeds size of device (11 blocks) [ 582.244180][T18605] loop3: detected capacity change from 0 to 264192 [ 582.249084][T18601] EXT4-fs error (device loop1): ext4_quota_enable:6753: comm syz-executor.1: Bad quota inode # 4 [ 582.249766][T18601] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 582.250078][T18601] EXT4-fs (loop1): mount failed [ 582.373888][T18598] 9pnet_fd: Insufficient options for proto=fd [ 582.375077][T18610] loop5: detected capacity change from 0 to 264192 [ 582.376091][T18610] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 582.514704][T18620] loop5: detected capacity change from 0 to 21 [ 582.515975][T18621] loop1: detected capacity change from 0 to 264192 [ 582.516576][T18622] loop4: detected capacity change from 0 to 264192 [ 582.519987][T18619] loop3: detected capacity change from 0 to 264192 [ 582.532339][T18626] loop0: detected capacity change from 0 to 264192 [ 582.534827][T18621] EXT4-fs error (device loop1): ext4_quota_enable:6753: comm syz-executor.1: Bad quota inode # 3 [ 582.535211][T18621] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 582.535525][T18621] EXT4-fs (loop1): mount failed [ 582.549254][T18620] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 582.549273][T18620] EXT4-fs (loop5): bad geometry: block count 512 exceeds size of device (10 blocks) [ 582.556533][T18622] EXT4-fs warning (device loop4): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-22). Please run e2fsck to fix. [ 582.556920][T18622] EXT4-fs (loop4): mount failed [ 582.573463][T18626] EXT4-fs error (device loop0): ext4_lookup:1812: inode #2: comm syz-executor.0: deleted inode referenced: 12 [ 582.656246][T18640] loop1: detected capacity change from 0 to 264192 [ 582.658585][T18644] loop5: detected capacity change from 0 to 21 [ 582.662541][T18644] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 582.662557][T18644] EXT4-fs (loop5): bad geometry: block count 512 exceeds size of device (10 blocks) [ 582.665730][T18646] loop4: detected capacity change from 0 to 264192 [ 582.674298][T18640] EXT4-fs error (device loop1): ext4_quota_enable:6753: comm syz-executor.1: Bad quota inode # 3 [ 582.674482][T18640] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 582.674862][T18640] EXT4-fs (loop1): mount failed [ 582.675275][T18646] EXT4-fs warning (device loop4): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-22). Please run e2fsck to fix. [ 582.675754][T18646] EXT4-fs (loop4): mount failed [ 582.683824][T18650] loop0: detected capacity change from 0 to 264192 [ 582.696291][T18654] loop3: detected capacity change from 0 to 264192 [ 582.743137][T18650] EXT4-fs error (device loop0): ext4_lookup:1812: inode #2: comm syz-executor.0: deleted inode referenced: 12 [ 582.787206][T18660] loop5: detected capacity change from 0 to 21 [ 582.790721][T18661] loop1: detected capacity change from 0 to 264192 [ 582.799576][T18661] EXT4-fs error (device loop1): ext4_quota_enable:6753: comm syz-executor.1: Bad quota inode # 3 [ 582.799757][T18661] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 582.800013][T18661] EXT4-fs (loop1): mount failed [ 582.808810][T18665] loop4: detected capacity change from 0 to 264192 [ 582.810594][T18660] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 582.810612][T18660] EXT4-fs (loop5): bad geometry: block count 512 exceeds size of device (10 blocks) [ 582.837204][T18665] EXT4-fs warning (device loop4): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-22). Please run e2fsck to fix. [ 582.842771][T18665] EXT4-fs (loop4): mount failed [ 582.859270][T18669] loop0: detected capacity change from 0 to 264192 [ 582.898592][T18674] loop5: detected capacity change from 0 to 264192 [ 582.901972][T18676] loop3: detected capacity change from 0 to 264192 [ 582.906265][T18674] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled 11:00:40 executing program 3: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0xfffffff7, @remote, 0x3}, 0x1c) 11:00:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f00000007ffffffffffff0004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400200000", 0x1f, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {0x0, 0x0, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400", 0x1c, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af3020004000000000000000000000002000000300000000200000004", 0x45, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:40 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, 0x0, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x10, &(0x7f0000000080)=0x1, 0x4) [ 582.914412][T18674] EXT4-fs error (device loop5): __ext4_fill_super:5226: inode #2: comm syz-executor.5: iget: root inode unallocated [ 582.917018][T18680] loop0: detected capacity change from 0 to 264192 [ 582.917711][T18674] EXT4-fs (loop5): get root inode failed [ 582.917723][T18674] EXT4-fs (loop5): mount failed [ 582.941903][T18685] loop1: detected capacity change from 0 to 264192 [ 582.948303][T18688] loop4: detected capacity change from 0 to 264192 [ 582.964048][T18692] loop0: detected capacity change from 0 to 264192 11:00:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f0000feffffffffffffff0004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:40 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x10, &(0x7f0000000080)=0x1, 0x4) 11:00:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000020000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) [ 582.966399][T18688] EXT4-fs warning (device loop4): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-22). Please run e2fsck to fix. [ 582.967185][T18685] EXT4-fs error (device loop1): ext4_quota_enable:6753: comm syz-executor.1: Bad quota inode # 3 [ 582.967300][T18685] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 582.967340][T18688] EXT4-fs (loop4): mount failed 11:00:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000030000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:40 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x10, &(0x7f0000000080)=0x1, 0x4) 11:00:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f00000000000004002000", 0x1e, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) [ 582.967660][T18685] EXT4-fs (loop1): mount failed [ 582.976988][T18693] loop3: detected capacity change from 0 to 264192 [ 582.980777][T18697] loop5: detected capacity change from 0 to 264192 [ 583.009107][T18697] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 583.025312][T18697] EXT4-fs error (device loop5): __ext4_fill_super:5226: inode #2: comm syz-executor.5: iget: root inode unallocated [ 583.025666][T18697] EXT4-fs (loop5): get root inode failed [ 583.025678][T18697] EXT4-fs (loop5): mount failed [ 583.033975][T18702] loop1: detected capacity change from 0 to 264192 [ 583.056504][T18707] loop4: detected capacity change from 0 to 264192 [ 583.069408][T18707] EXT4-fs warning (device loop4): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-22). Please run e2fsck to fix. [ 583.069841][T18707] EXT4-fs (loop4): mount failed [ 583.113436][T18702] EXT4-fs error (device loop1): ext4_quota_enable:6753: comm syz-executor.1: Bad quota inode # 3 [ 583.113664][T18702] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 583.114162][T18702] EXT4-fs (loop1): mount failed [ 583.122548][T18710] loop0: detected capacity change from 0 to 264192 [ 583.128056][T18716] loop3: detected capacity change from 0 to 264192 [ 583.128737][T18715] loop5: detected capacity change from 0 to 264192 [ 583.129462][T18715] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 583.144973][T18715] EXT4-fs error (device loop5): __ext4_fill_super:5226: inode #2: comm syz-executor.5: iget: root inode unallocated [ 583.145096][T18715] EXT4-fs (loop5): get root inode failed [ 583.145108][T18715] EXT4-fs (loop5): mount failed [ 583.196231][T18724] loop4: detected capacity change from 0 to 264192 [ 583.212632][T18724] __quota_error: 16 callbacks suppressed [ 583.212654][T18724] Quota error (device loop4): v2_read_file_info: Free block number too big (0 >= 0). [ 583.212683][T18724] EXT4-fs warning (device loop4): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 583.220904][T18724] EXT4-fs (loop4): mount failed [ 583.225075][T18729] loop5: detected capacity change from 0 to 264192 [ 583.241488][T18730] loop1: detected capacity change from 0 to 264192 [ 583.242141][T18731] loop0: detected capacity change from 0 to 264192 [ 583.259265][T18730] EXT4-fs error (device loop1): ext4_quota_enable:6753: comm syz-executor.1: Bad quota inode # 3 [ 583.259477][T18730] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 583.259896][T18730] EXT4-fs (loop1): mount failed [ 583.259939][T18729] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 583.276117][T18740] loop3: detected capacity change from 0 to 264192 [ 583.279074][T18741] loop4: detected capacity change from 0 to 264192 [ 583.279455][T18729] EXT4-fs error (device loop5): __ext4_fill_super:5226: inode #2: comm syz-executor.5: iget: root inode unallocated [ 583.279827][T18729] EXT4-fs (loop5): get root inode failed [ 583.279840][T18729] EXT4-fs (loop5): mount failed [ 583.318674][T18741] Quota error (device loop4): v2_read_file_info: Free block number too big (0 >= 0). [ 583.318719][T18741] EXT4-fs warning (device loop4): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 583.323104][T18748] loop0: detected capacity change from 0 to 264192 [ 583.325079][T18741] EXT4-fs (loop4): mount failed [ 583.386399][T18753] loop1: detected capacity change from 0 to 264192 [ 583.397051][T18758] loop4: detected capacity change from 0 to 264192 [ 583.402670][T18762] loop3: detected capacity change from 0 to 264192 [ 583.403580][T18763] loop5: detected capacity change from 0 to 264192 [ 583.410120][T18763] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 583.410402][T18753] EXT4-fs error (device loop1): ext4_quota_enable:6753: comm syz-executor.1: Bad quota inode # 3 [ 583.412573][T18753] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 583.412898][T18753] EXT4-fs (loop1): mount failed [ 583.427866][T18763] EXT4-fs error (device loop5): __ext4_fill_super:5226: inode #2: comm syz-executor.5: iget: root inode unallocated [ 583.428097][T18763] EXT4-fs (loop5): get root inode failed [ 583.428109][T18763] EXT4-fs (loop5): mount failed [ 583.429490][T18758] Quota error (device loop4): v2_read_file_info: Free block number too big (0 >= 0). [ 583.429531][T18758] EXT4-fs warning (device loop4): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 583.429920][T18758] EXT4-fs (loop4): mount failed [ 583.435005][T18768] loop0: detected capacity change from 0 to 264192 [ 583.505640][T18774] loop1: detected capacity change from 0 to 264192 [ 583.517491][T18776] loop4: detected capacity change from 0 to 264192 [ 583.529272][T18774] EXT4-fs error (device loop1): ext4_quota_enable:6753: comm syz-executor.1: Bad quota inode # 3 [ 583.534489][T18779] loop3: detected capacity change from 0 to 264192 [ 583.549394][T18774] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 583.549732][T18774] EXT4-fs (loop1): mount failed [ 583.571106][T18782] loop5: detected capacity change from 0 to 264192 [ 583.574087][T18782] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 583.597984][T18782] EXT4-fs error (device loop5): __ext4_fill_super:5226: inode #2: comm syz-executor.5: iget: root inode unallocated [ 583.598169][T18782] EXT4-fs (loop5): get root inode failed [ 583.598181][T18782] EXT4-fs (loop5): mount failed [ 583.598602][T18776] Quota error (device loop4): v2_read_file_info: Free block number too big (0 >= 0). [ 583.598773][T18776] EXT4-fs warning (device loop4): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 583.600177][T18776] EXT4-fs (loop4): mount failed [ 583.605260][ T7359] blk_print_req_error: 27 callbacks suppressed [ 583.605273][ T7359] I/O error, dev loop1, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 583.700117][T18797] loop5: detected capacity change from 0 to 264192 [ 583.700904][T18797] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 583.721301][T18802] loop1: detected capacity change from 0 to 264192 [ 583.724004][T18797] EXT4-fs error (device loop5): __ext4_fill_super:5226: inode #2: comm syz-executor.5: iget: root inode unallocated [ 583.724215][T18797] EXT4-fs (loop5): get root inode failed [ 583.724228][T18797] EXT4-fs (loop5): mount failed [ 583.737836][T18806] loop4: detected capacity change from 0 to 264192 [ 583.742137][T18802] EXT4-fs error (device loop1): ext4_quota_enable:6753: comm syz-executor.1: Bad quota inode # 3 [ 583.742250][T18802] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 583.742617][T18802] EXT4-fs (loop1): mount failed [ 583.752638][T18806] Quota error (device loop4): v2_read_file_info: Free block number too big (0 >= 0). [ 583.752678][T18806] EXT4-fs warning (device loop4): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 583.756769][T18806] EXT4-fs (loop4): mount failed [ 583.788305][T18812] loop0: detected capacity change from 0 to 264192 [ 583.795841][T18815] loop3: detected capacity change from 0 to 264192 [ 583.821176][T18818] loop5: detected capacity change from 0 to 264192 [ 583.862909][T18822] loop1: detected capacity change from 0 to 264192 [ 583.882073][T18818] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 583.887475][T18825] loop4: detected capacity change from 0 to 264192 [ 583.924822][T18822] EXT4-fs error (device loop1): ext4_ext_check_inode:497: inode #3: comm syz-executor.1: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 583.926824][T18822] EXT4-fs error (device loop1): ext4_quota_enable:6753: comm syz-executor.1: Bad quota inode # 3 11:00:41 executing program 3: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0xfffffff7, @remote, 0x3}, 0x1c) 11:00:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af30200040000000000000000000000020000003000000002000000040000", 0x47, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {&(0x7f0000000580)="111fc0d901000000803a0900803a09000000000006", 0x15, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400200000", 0x1f, 0x1500}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000030000000020000000400000032", 0x49, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af302000400000000000000000000000200000040000000020000000400000042", 0x49, 0x1700}, {0x0, 0x0, 0x6700000}, {0x0, 0x0, 0xc000}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x10000}], 0x0, &(0x7f0000013b00)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000340)={0x0, 0xfb, 0x95, 0x0, 0x9, "90e009b724c7ffe10f506598b651d2b9", "2ce40de2543a01472f681801097b0620c55996113c7be3547beee4558e6d2691148ede2421759dc77e97fcbb4673b68273ea9feb1e9165d275e8177e26e5d5bf861f0f0894a2b5d8adcae70dce37c4e74b8fd6519db0ae1d8c252e6c96c0d20344e7ade1d3bc862efc620f0838c3ef9b111e683bb624036f789e301be16e90af"}, 0x95, 0x2) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) 11:00:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) 11:00:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000040000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) 11:00:41 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x10, &(0x7f0000000080)=0x1, 0x4) 11:00:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000050000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@dioread_nolock}]}) [ 583.927275][T18822] EXT4-fs warning (device loop1): ext4_enable_quotas:6793: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 583.927657][T18822] EXT4-fs (loop1): mount failed [ 583.932470][T18825] Quota error (device loop4): v2_read_file_info: Free block number too big (0 >= 0). [ 583.932554][T18825] EXT4-fs warning (device loop4): ext4_enable_quotas:6793: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. 11:00:41 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4001, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x10, &(0x7f0000000080)=0x1, 0x4) 11:00:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400", 0x1c, 0x1500}, {0x0, 0x0, 0x6700000}], 0x0, &(0x7f00000000c0)={[{@jqfmt_vfsv1}]}) [ 583.941384][T18825] EXT4-fs (loop4): mount failed [ 583.989996][T18841] loop1: detected capacity change from 0 to 264192 [ 584.014728][T18845] loop5: detected capacity change from 0 to 264192 [ 584.015673][T18845] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled 11:00:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000002540)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500},