=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getown(r2, 0x9) 23:05:15 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000012402000100f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x0) [ 545.518801][T20978] loop1: detected capacity change from 0 to 264192 [ 545.610623][T20978] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7400000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:05:16 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5cb445d11a3786595100ced0dc61ab58b3ce6c488aa0ebf") 23:05:16 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000022402000100f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x0) [ 546.045361][T21006] loop1: detected capacity change from 0 to 264192 23:05:16 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getown(r2, 0x9) [ 546.150918][T21006] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 546.317993][T21006] loop1: detected capacity change from 0 to 264192 [ 546.397510][T21006] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:16 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000032402000100f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x0) 23:05:16 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getown(r2, 0x9) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r3) 23:05:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7a00000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:05:17 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:05:17 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="6ebb5bc665f23aff7a20303000003030302c300600000000000001000080b3000d50318386db9f354337f5aa0a420b1e89d656b030a726016d3cce77fa28fe127149c6e137e4d5e1ba1763fe4ad3d8c7dea11413fbed9cec51bcdff4ca3a0287647f7c4bb6bb86be778997156e000015a5471425dea15b7e8ffd366f569ed595d14b0e8749e644ca0a4fbec51a9ec09ab870467533bc94a8471baba2170e706e5dde8d648992575d1ae2aa200c11066b6dc7c35c0d5db17aabbeee0b46a01297f2293087f43708000000000000000000e8b7fafbdec4813fcce5f4c1bf9413538602d3b8fff31277d6bc880fa1bae503101230fa21fdec5dc68f44f1037f0c81c5a90a87caf16e2d362b50ce63a60556fdf5adc2732a8e1f9b693b6dfd3167970203a1ed1826acf1f8850137386408d01b691831f7412ee3d2f6f8faf72d7242d62eb4d55288a731e7a3f1b57c0940f54ef23160853e572f5348c71e7e678bbf1d949bcbfe66982b1d243d3a11d6d23230b85b4bbbc0961111bc16fe07c2a56814961b745e3ca047bfc68bd6aba88eea427fcb07b4ea123bc4637468035300612cbd511855869a3a2664"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5cb445d11a3786595100ced0dc61ab58b3ce6c488aa0ebf") 23:05:17 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000042402000100f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x0) [ 546.989697][T21032] loop1: detected capacity change from 0 to 264192 [ 547.146160][T21032] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:17 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000202402000100f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x0) [ 547.319883][T21032] loop1: detected capacity change from 0 to 264192 [ 547.414134][T21032] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7fffffffffffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:05:17 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000fffffffb2402000100f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x0) 23:05:18 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5cb445d11a3786595100ced0dc61ab58b3ce6c488aa0ebf") [ 547.844394][T21055] loop1: detected capacity change from 0 to 264192 23:05:18 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) [ 547.900867][T21055] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 548.016458][T21055] loop1: detected capacity change from 0 to 264192 [ 548.053552][T21055] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:18 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e00000010000007fffffff2402000100f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x0) 23:05:18 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x0, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5cb445d11a3786595100ced0dc61ab58b3ce6c488aa0ebf") 23:05:18 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getown(r2, 0x9) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:05:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8cffffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) [ 548.536447][T21079] loop1: detected capacity change from 0 to 264192 23:05:18 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000fbffffff2402000100f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x0) [ 548.695478][T21079] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:18 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getown(r2, 0x9) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) [ 548.859237][T21079] loop1: detected capacity change from 0 to 264192 [ 548.901847][T21079] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:19 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x0, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5cb445d11a3786595100ced0dc61ab58b3ce6c488aa0ebf") 23:05:19 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000200002402000100f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x0) 23:05:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x97ffffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:05:19 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000300002402000100f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x0) 23:05:19 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) [ 549.392298][T21104] loop1: detected capacity change from 0 to 264192 [ 549.447383][T21104] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 549.597362][T21104] loop1: detected capacity change from 0 to 264192 23:05:19 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="6ebb5bc665f23aff7a20303000003030302c300600000000000001000080b3000d50318386db9f354337f5aa0a420b1e89d656b030a726016d3cce77fa28fe127149c6e137e4d5e1ba1763fe4ad3d8c7dea11413fbed9cec51bcdff4ca3a0287647f7c4bb6bb86be778997156e000015a5471425dea15b7e8ffd366f569ed595d14b0e8749e644ca0a4fbec51a9ec09ab870467533bc94a8471baba2170e706e5dde8d648992575d1ae2aa200c11066b6dc7c35c0d5db17aabbeee0b46a01297f2293087f43708000000000000000000e8b7fafbdec4813fcce5f4c1bf9413538602d3b8fff31277d6bc880fa1bae503101230fa21fdec5dc68f44f1037f0c81c5a90a87caf16e2d362b50ce63a60556fdf5adc2732a8e1f9b693b6dfd3167970203a1ed1826acf1f8850137386408d01b691831f7412ee3d2f6f8faf72d7242d62eb4d55288a731e7a3f1b57c0940f54ef23160853e572f5348c71e7e678bbf1d949bcbfe66982b1d243d3a11d6d23230b85b4bbbc0961111bc16fe07c2a56814961b745e3ca047bfc68bd6aba88eea427fcb07b4ea123bc4637468035300612cbd511855869a3a2664"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x0, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5cb445d11a3786595100ced0dc61ab58b3ce6c488aa0ebf") [ 549.657558][T21104] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:19 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getown(r2, 0x9) 23:05:19 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000400002402000100f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x0) 23:05:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb10f000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:05:20 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000003002402000100f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x0) [ 550.206400][T21130] loop1: detected capacity change from 0 to 264192 [ 550.308888][T21130] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:20 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:05:20 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000020002402000100f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x0) [ 550.478613][T21130] loop1: detected capacity change from 0 to 264192 23:05:20 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5cb445d11a3786595100ced0dc61ab58b3ce6c488aa0ebf") [ 550.543461][T21130] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc38a4ef100000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:05:20 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:05:20 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000002002402000100f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x0) 23:05:21 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) [ 551.012316][T21159] loop1: detected capacity change from 0 to 264192 [ 551.187621][T21159] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:21 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000003002402000100f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x0) [ 551.338469][T21159] loop1: detected capacity change from 0 to 264192 [ 551.424615][T21159] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:22 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000004002402000100f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x0) 23:05:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf6ffffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:05:22 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) 23:05:22 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000032402000100f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x0) [ 552.172836][T21181] loop1: detected capacity change from 0 to 264192 23:05:22 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5cb445d11a3786595100ced0dc61ab58b3ce6c488aa0ebf") [ 552.249188][T21181] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:22 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) [ 552.320497][T21181] loop1: detected capacity change from 0 to 264192 23:05:22 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) 23:05:22 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000050e40)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000002c0)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0x0, "3ebbbcb5d60c17"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f000005ea40)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)={0x0, ""/256, 0x0, 0x0}) r8 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r8, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r8, 0x81f8943c, &(0x7f0000050e40)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000002c0)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {0x0, r7}], 0x0, "3ebbbcb5d60c17"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000005fa40)={0x5, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {r6}], 0xff, "a87b66d79de5b7"}) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) [ 552.371139][T21181] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:22 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000202402000100f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x0) 23:05:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf9fdffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:05:23 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000022402000100f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x0) [ 553.212737][T21211] loop1: detected capacity change from 0 to 264192 [ 553.354050][T21211] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:23 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) [ 553.608190][T21211] loop1: detected capacity change from 0 to 264192 [ 553.686005][T21211] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:24 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="6ebb5bc665f23aff7a20303000003030302c300600000000000001000080b3000d50318386db9f354337f5aa0a420b1e89d656b030a726016d3cce77fa28fe127149c6e137e4d5e1ba1763fe4ad3d8c7dea11413fbed9cec51bcdff4ca3a0287647f7c4bb6bb86be778997156e000015a5471425dea15b7e8ffd366f569ed595d14b0e8749e644ca0a4fbec51a9ec09ab870467533bc94a8471baba2170e706e5dde8d648992575d1ae2aa200c11066b6dc7c35c0d5db17aabbeee0b46a01297f2293087f43708000000000000000000e8b7fafbdec4813fcce5f4c1bf9413538602d3b8fff31277d6bc880fa1bae503101230fa21fdec5dc68f44f1037f0c81c5a90a87caf16e2d362b50ce63a60556fdf5adc2732a8e1f9b693b6dfd3167970203a1ed1826acf1f8850137386408d01b691831f7412ee3d2f6f8faf72d7242d62eb4d55288a731e7a3f1b57c0940f54ef23160853e572f5348c71e7e678bbf1d949bcbfe66982b1d243d3a11d6d23230b85b4bbbc0961111bc16fe07c2a56814961b745e3ca047bfc68bd6aba88eea427fcb07b4ea123bc4637468035300612cbd511855869a3a2664"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5cb445d11a3786595100ced0dc61ab58b3ce6c488aa0ebf") 23:05:24 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000032402000100f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x0) 23:05:24 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) 23:05:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfbffffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:05:24 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:05:24 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000042402000100f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x0) [ 554.252765][T21234] loop1: detected capacity change from 0 to 264192 [ 554.336468][T21234] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:24 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f00000e8000/0x1000)=nil, 0x1000, 0x0, 0x12, 0xffffffffffffffff, 0x2000) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) [ 554.448921][T21234] loop1: detected capacity change from 0 to 264192 23:05:24 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 554.510455][T21234] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:24 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:05:24 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e000000100000000000000240a000100f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x0) 23:05:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfcfdffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:05:25 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002417000100f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x0) 23:05:25 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="6ebb5bc665f23aff7a20303000003030302c300600000000000001000080b3000d50318386db9f354337f5aa0a420b1e89d656b030a726016d3cce77fa28fe127149c6e137e4d5e1ba1763fe4ad3d8c7dea11413fbed9cec51bcdff4ca3a0287647f7c4bb6bb86be778997156e000015a5471425dea15b7e8ffd366f569ed595d14b0e8749e644ca0a4fbec51a9ec09ab870467533bc94a8471baba2170e706e5dde8d648992575d1ae2aa200c11066b6dc7c35c0d5db17aabbeee0b46a01297f2293087f43708000000000000000000e8b7fafbdec4813fcce5f4c1bf9413538602d3b8fff31277d6bc880fa1bae503101230fa21fdec5dc68f44f1037f0c81c5a90a87caf16e2d362b50ce63a60556fdf5adc2732a8e1f9b693b6dfd3167970203a1ed1826acf1f8850137386408d01b691831f7412ee3d2f6f8faf72d7242d62eb4d55288a731e7a3f1b57c0940f54ef23160853e572f5348c71e7e678bbf1d949bcbfe66982b1d243d3a11d6d23230b85b4bbbc0961111bc16fe07c2a56814961b745e3ca047bfc68bd6aba88eea427fcb07b4ea123bc4637468035300612cbd511855869a3a2664"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5cb445d11a3786595100ced0dc61ab58b3ce6c488aa0ebf") 23:05:25 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) [ 555.346091][T21268] loop1: detected capacity change from 0 to 264192 [ 555.385681][T21268] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:25 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 555.490478][T21268] loop1: detected capacity change from 0 to 264192 [ 555.528373][T21268] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:25 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402030000f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x0) 23:05:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfdfdffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:05:26 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402040000f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x0) [ 556.087516][T21293] loop1: detected capacity change from 0 to 264192 [ 556.218262][T21293] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:26 executing program 3: ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000180)={"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"}) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000), 0x7c9802, 0x0) r1 = dup(r0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, @perf_config_ext={0x1000, 0x8}, 0x8001, 0x5}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f00000000c0)) pipe(&(0x7f0000001d00)={0xffffffffffffffff}) r6 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T1(r6, 0x103, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_netrom_SIOCADDRT(r6, 0x890b, &(0x7f0000000100)={0x1, @default, @netrom={'nr', 0x0}, 0x9, 'syz0\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x6, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}) io_submit(0x0, 0xa, &(0x7f0000001ec0)=[&(0x7f0000000680)={0x0, 0x0, 0x0, 0x3, 0x7ff, r4, &(0x7f00000006c0)="28835599330b7ad169dc0369f5c6fa53bfce5a68191b4eed049c3d8832ed6b2ce2195bc282bb970e3eab7b6eed883b5e3f50facde5afead288645ba862afba57224e5bffde91ffd858318ef83102ca66dd3414df627435f70479caa8406d67fbf358c373fd82418b35bc830cbd90ffa2be2c942b1cdae891b56097684149c4d055471341e703f284fb6809e963a73080f39cf20d31140e2979281421bafd42c7ce42e8b9", 0xa4, 0x1, 0x0, 0x1}, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x2, 0x3ff, 0xffffffffffffffff, &(0x7f0000001f40)="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", 0x1000, 0x6, 0x0, 0x1, r4}, &(0x7f0000001800)={0x0, 0x0, 0x0, 0x3, 0x9519, 0xffffffffffffffff, &(0x7f0000001740)="05124054fbec281bf05e8b0f220bfec3be597312558258b63064db31b522afc9695a8e5ae973f75c310c4b8929265df7ea385d92910968f3daa36f3949054a75871aaa03cec929fc506095c814dac58ce2530b5d7996ee6bdc379e0b3bb0a5057405936f59779d149a32c1971e6e39b6528e566bd8cb94e110efdba58819c198d14fc225c5caa1c6421092e0f723fa335f49027b8b2f0b337479ad37bca409eb6a4fd5ab79203e1864551c0b98bd55e3709cbfd6f028e737", 0xb8, 0x0, 0x0, 0x2}, &(0x7f0000001980)={0x0, 0x0, 0x0, 0x5, 0x401, 0xffffffffffffffff, &(0x7f0000001880)="ccf1bd60abd201e6f5c6271a978d68eae8c4cc89a3fffe46ca6063c256b64623e24c998962cd0747a9137b1c324d2c506f2817fbed41a8928c560c0a09cf6d92e2ede1aeedab019259eed7d9c60c1f362f4ec028f9cca959e3b0361a55eed77038571840d3149737b6bcfd029b720980c134647e183bafdc74c1563fe08cadffa9890c6e864b8492941cf7145109d19d49b0f996201095254b5a3cfd4102f891a74a087f9dce346f2aa1b0d92c46aac72416c4876e93def6ea7500864cf9f84c896da0d82397a3c2c92461641bab9a225e1943b58e9eded162fcac7cb19c1fa51ff24a004ee48025", 0xe8, 0x80, 0x0, 0x1}, &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x2, 0x5e95, r2, &(0x7f00000019c0)="37537fc58eb4c8e5b45acaee4530bedbb069dc200d936af1c0e5960a2c4ec827179d95b76534f051deb92c6ebbb2bbaa462dc41a5825a6c9bc87ce0968c5758d85f08f0f9a12b8064e62ee1ef94efa7cdb3e4c3b49b89ca6f54bef6077d6350f602a4537a8eedb8546c6e607554ef0a70611deee9466b29f6fdbd931f76037fe539bdd70ff", 0x85, 0xfffffffffffffffa, 0x0, 0x0, r1}, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x5, 0x4, r1, &(0x7f0000001ac0)="218e5f6ed78b30c5c6beeebf5eb4fbcc31ddea8873a3ea63ea3a02a645afd5d55e48d92da8238bbceb4f18984e992674175e88d3b8217556e0dd42f9f2abbee9abe299f54879bf05dfd33775800d8ac2f8d17c9d770f22884c604a2026", 0x5d, 0x1}, &(0x7f0000001c40)={0x0, 0x0, 0x0, 0x2, 0x7, 0xffffffffffffffff, &(0x7f0000001bc0)="0300000000000005b2eeba56c0a2dfffffd3fe5eafc22cd519ef36d0d20ef023ccba6f9343d0c72bea9608806852017c24f244d625436a1edcaf9a894d0b3c6ec5d81ccec079bf14f3e179366610332103be07493f24e1192ec39e92ab72bc6d817d81cbab344a7566c604c06e4aedb5aa4089", 0x73}, &(0x7f0000001cc0)={0x0, 0x0, 0x0, 0x6, 0x400, r6, &(0x7f0000001c80)="6a3da76071d11d468d5a21b9d558c90783a83ab6e05c6cc680568b1c299b29b05f0bd846a13b8486f1a958917891f8e4467ba87642", 0x35, 0x398000008000, 0x0, 0x2, r1}, &(0x7f0000001d80)={0x0, 0x0, 0x0, 0x0, 0x401, r5, &(0x7f0000001d40)="c733a2cc2fde4f24893f6214e3b80c6eb0614382ac", 0x15, 0x2, 0x0, 0x3}, &(0x7f0000001e80)={0x0, 0x0, 0x0, 0x3, 0x9, r6, &(0x7f0000001dc0)="9dbff07587f7b8a5deb0d72229efd561de2eff4749a9f03ce45841b6e15c4644b06412245646dfac0f88dff6efc6cbe4a15c4b887246f24c2e5c9731d90cc5249b673dda5e37f103c082a0a6b5f6d63eda2b6b4d8a567e9e9482e9bf96168db877470ef67aac65c075552284e54bba410bff99b7b83bb8f81a7ebc50b1512cbf1f9c4bc0b9a556f2b26eab9173d5eecb5420dc448c4dc17eef16fa0d3c7f82a6645b463579fa8c7e2fdf30478599ba49f7bfeb3e5705bcffd7c3", 0xba, 0x7, 0x0, 0x1}]) getsockopt$netrom_NETROM_T1(r3, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x1, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x0, 0x6, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}) mmap(&(0x7f00009eb000/0x3000)=nil, 0x3000, 0x0, 0x10, r3, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:05:26 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:05:26 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5cb445d11a3786595100ced0dc61ab58b3ce6c488aa0ebf") [ 556.347222][T21293] loop1: detected capacity change from 0 to 264192 [ 556.364425][T21293] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:26 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402020100f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x0) 23:05:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfdffffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:05:26 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402030100f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x0) 23:05:26 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) [ 556.769162][T21320] loop1: detected capacity change from 0 to 264192 23:05:27 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 556.861450][T21320] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:27 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5cb445d11a3786595100ced0dc61ab58b3ce6c488aa0ebf") 23:05:27 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402040100f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x0) 23:05:27 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) r2 = gettid() read$FUSE(r1, &(0x7f0000001040)={0x2020}, 0x2020) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) ptrace$setopts(0x4200, r3, 0x8001, 0x100004) tkill(r2, 0x40) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x204aa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, r2, 0xffff000000000002, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) [ 557.009736][T21320] loop1: detected capacity change from 0 to 264192 [ 557.045015][T21320] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:27 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000000)={[0x8]}, 0x8, 0x800) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000040)=0x4) 23:05:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfeffffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:05:27 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000500f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x0) [ 557.576235][T21354] loop1: detected capacity change from 0 to 264192 23:05:27 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000700f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x0) [ 557.676678][T21354] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:27 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:05:28 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:05:28 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)='a', &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5cb445d11a3786595100ced0dc61ab58b3ce6c488aa0ebf") [ 557.857416][T21354] loop1: detected capacity change from 0 to 264192 [ 557.868835][T21354] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:28 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000900f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x0) 23:05:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfeffffffffffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:05:28 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:05:28 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 558.196876][T21376] loop1: detected capacity change from 0 to 264192 [ 558.245402][T21376] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:28 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)='a', &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5cb445d11a3786595100ced0dc61ab58b3ce6c488aa0ebf") [ 558.498598][T21376] loop1: detected capacity change from 0 to 264192 [ 558.517286][T21376] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:28 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) ioctl$BLKRRPART(r1, 0x125f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:05:28 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402001700f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x0) 23:05:28 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:05:28 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:05:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xff00000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:05:29 executing program 0: r0 = dup(0xffffffffffffffff) sendfile(0xffffffffffffffff, r0, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 558.931183][T21405] loop1: detected capacity change from 0 to 264192 23:05:29 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402001800f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x0) 23:05:29 executing program 4: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) [ 559.047913][T21405] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:29 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)='a', &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5cb445d11a3786595100ced0dc61ab58b3ce6c488aa0ebf") 23:05:29 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402001a00f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x0) 23:05:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xff0f000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:05:29 executing program 0: r0 = dup(0xffffffffffffffff) sendfile(0xffffffffffffffff, r0, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 559.823993][T21428] loop1: detected capacity change from 0 to 264192 [ 559.884956][T21428] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 559.957013][T21428] loop1: detected capacity change from 0 to 264192 [ 560.008456][T21428] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:30 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000200f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x0) 23:05:30 executing program 4: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:05:30 executing program 0: r0 = dup(0xffffffffffffffff) sendfile(0xffffffffffffffff, r0, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:05:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:05:30 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", 0x0, &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5cb445d11a3786595100ced0dc61ab58b3ce6c488aa0ebf") [ 560.372539][T21448] loop1: detected capacity change from 0 to 264192 23:05:30 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, 0x0, 0x149802, 0x0) r1 = dup(r0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:05:30 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xc040, 0x1, 0x0, 0x1, 0x0, 0xec, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$inet(r1, &(0x7f0000000140)={0x2, 0x0, @multicast1}, &(0x7f0000000180)=0x10, 0x80800) getsockopt$EBT_SO_GET_INIT_INFO(r2, 0x0, 0x82, &(0x7f0000000200)={'broute\x00', 0x0, 0x0, 0x0, [0x4000001000000040, 0x8, 0x204, 0x80000002, 0x3, 0x2]}, &(0x7f00000001c0)=0xfffffffffffffde2) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000600), 0x143001, 0x0) ioctl$NS_GET_NSTYPE(r1, 0xb703, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f0000000280)=@filter={'filter\x00', 0xe, 0x4, 0x298, 0xffffffff, 0x130, 0x0, 0x130, 0xffffffff, 0xffffffff, 0x200, 0x200, 0x200, 0xffffffff, 0x4, &(0x7f00000000c0), {[{{@ip={@local, @multicast1, 0x0, 0xffffff00, 'team_slave_0\x00', 'bridge_slave_1\x00', {0xff}, {}, 0x6, 0x3, 0x9}, 0x0, 0x70, 0x98}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x8}}}, {{@ip={@loopback, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffff00, 0xffffffff, 'nr0\x00', 'veth1_virt_wifi\x00', {}, {}, 0x1, 0x1, 0x41}, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x1, 0x5, 0x1}, {0x0, 0x5, 0x2}}}}, {{@uncond, 0x0, 0xa8, 0xd0, 0x0, {}, [@common=@unspec=@connbytes={{0x38}, {[{0x7fffffff}, {0x9}], 0x1}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x2, 0x7, 0x5}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2f8) fcntl$setsig(r3, 0xa, 0x20) ioctl$PPPIOCSMAXCID(0xffffffffffffffff, 0x40047451, &(0x7f0000000040)=0xffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x10) [ 560.447033][T21448] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:30 executing program 4: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:05:30 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000500f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x0) [ 560.606590][T21448] loop1: detected capacity change from 0 to 264192 [ 560.617738][T21448] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:30 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", 0x0, &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5cb445d11a3786595100ced0dc61ab58b3ce6c488aa0ebf") 23:05:31 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000700f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x0) 23:05:31 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, 0x0, 0x149802, 0x0) r1 = dup(r0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:05:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffffff7f00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:05:31 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, 0x0, 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:05:31 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000800f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x0) [ 561.062995][T21478] loop1: detected capacity change from 0 to 264192 23:05:31 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, 0x0, 0x149802, 0x0) r1 = dup(r0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 561.158950][T21478] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:31 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="6ebb5bc665f23aff7a20303000003030302c300600000000000001000080b3000d50318386db9f354337f5aa0a420b1e89d656b030a726016d3cce77fa28fe127149c6e137e4d5e1ba1763fe4ad3d8c7dea11413fbed9cec51bcdff4ca3a0287647f7c4bb6bb86be778997156e000015a5471425dea15b7e8ffd366f569ed595d14b0e8749e644ca0a4fbec51a9ec09ab870467533bc94a8471baba2170e706e5dde8d648992575d1ae2aa200c11066b6dc7c35c0d5db17aabbeee0b46a01297f2293087f43708000000000000000000e8b7fafbdec4813fcce5f4c1bf9413538602d3b8fff31277d6bc880fa1bae503101230fa21fdec5dc68f44f1037f0c81c5a90a87caf16e2d362b50ce63a60556fdf5adc2732a8e1f9b693b6dfd3167970203a1ed1826acf1f8850137386408d01b691831f7412ee3d2f6f8faf72d7242d62eb4d55288a731e7a3f1b57c0940f54ef23160853e572f5348c71e7e678bbf1d949bcbfe66982b1d243d3a11d6d23230b85b4bbbc0961111bc16fe07c2a56814961b745e3ca047bfc68bd6aba88eea427fcb07b4ea123bc4637468035300612cbd511855869a3a2664"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", 0x0, &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5cb445d11a3786595100ced0dc61ab58b3ce6c488aa0ebf") 23:05:31 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, 0x0, 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) [ 561.330443][T21478] loop1: detected capacity change from 0 to 264192 [ 561.359308][T21478] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:31 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) readv(r0, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/145, 0x91}, {&(0x7f00000000c0)=""/138, 0x8a}, {&(0x7f0000000180)=""/7, 0x7}], 0x3) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:05:31 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000900f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x0) 23:05:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:05:31 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x0, 0x0) r1 = dup(r0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:05:31 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, 0x0, 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:05:31 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), 0x0, &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5cb445d11a3786595100ced0dc61ab58b3ce6c488aa0ebf") [ 561.827963][T21512] loop1: detected capacity change from 0 to 264192 [ 561.889155][T21512] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:32 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402001700f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x0) 23:05:32 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x0, 0x0) r1 = dup(r0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:05:32 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x0, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) [ 562.019030][T21512] loop1: detected capacity change from 0 to 264192 [ 562.124376][T21512] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:32 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402001800f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x0) 23:05:32 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), 0x0, &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5cb445d11a3786595100ced0dc61ab58b3ce6c488aa0ebf") 23:05:32 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x0, 0x0) r1 = dup(r0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 562.576191][ T1196] ieee802154 phy0 wpan0: encryption failed: -22 [ 562.582556][ T1196] ieee802154 phy1 wpan1: encryption failed: -22 23:05:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffff0700, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:05:33 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x0, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:05:33 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(0xffffffffffffffff) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:05:33 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402001a00f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x0) 23:05:33 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), 0x0, &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5cb445d11a3786595100ced0dc61ab58b3ce6c488aa0ebf") 23:05:33 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) r2 = getpgid(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, r2, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) r3 = accept4$inet(r1, &(0x7f0000000000)={0x2, 0x0, @empty}, &(0x7f0000000040)=0x10, 0x80000) fsetxattr$security_capability(r3, &(0x7f0000000080), &(0x7f00000000c0)=@v3={0x3000000, [{0x2, 0xff}, {0x1f, 0x1000}], 0xffffffffffffffff}, 0x18, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) [ 563.291985][T21555] loop1: detected capacity change from 0 to 264192 [ 563.334866][T21555] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:33 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(0xffffffffffffffff) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 563.416216][T21555] loop1: detected capacity change from 0 to 264192 [ 563.450257][T21555] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:33 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x0, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:05:33 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000003f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x0) 23:05:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffffff7f, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:05:34 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(0xffffffffffffffff) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:05:34 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), 0x0) [ 564.066892][T21576] loop1: detected capacity change from 0 to 264192 [ 564.093317][T21576] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:34 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000102f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x0) 23:05:34 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:05:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:05:34 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) sendfile(0xffffffffffffffff, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:05:34 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), 0x0) 23:05:35 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x5, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0xbcccec11481158a9}, 0x0, 0x20000, 0x0, 0x4, 0x0, 0x3}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x2) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), r1) sendmsg$NL80211_CMD_UPDATE_FT_IES(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)={0x14c, r3, 0x200, 0x70bd29, 0x25dfdbfd, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0x9}, @NL80211_ATTR_MDID={0x6, 0xb1, 0x1}, @NL80211_ATTR_MDID={0x6, 0xb1, 0x1f}, @NL80211_ATTR_IE={0x110, 0x2a, [@supported_rates, @tim={0x5, 0x27, {0xd3, 0x56, 0x81, "b3e49b8bc71e1994721ab5e1e9bbb0533f86076b6710007056c8b18bc9d9abfe98a67c82"}}, @perr={0x84, 0xdc, {0x7d, 0xe, [@ext={{}, @device_a, 0x0, @device_a, 0xc}, @not_ext={{}, @broadcast, 0x8000, "", 0x29}, @not_ext={{}, @device_b, 0xd86, "", 0x2b}, @ext={{}, @broadcast, 0x4, @device_b, 0x37}, @not_ext={{}, @device_a, 0x10000, "", 0x32}, @ext={{}, @broadcast, 0x4, @device_a, 0x6}, @ext={{}, @broadcast, 0x100, @device_a, 0x35}, @not_ext={{}, @device_a, 0x2, "", 0x1b}, @not_ext={{}, @device_a, 0x7a2, "", 0x26}, @not_ext={{}, @device_b, 0x0, "", 0x41}, @ext={{}, @device_b, 0x2, @broadcast, 0xf}, @ext={{}, @broadcast, 0x6, @device_b, 0x1a}, @not_ext={{}, @device_a, 0x7, "", 0x2}, @not_ext={{}, @device_a, 0x1000, "", 0x23}]}}, @dsss={0x3, 0x1, 0x4e}]}, @NL80211_ATTR_MDID={0x6, 0xb1, 0x101}]}, 0x14c}, 0x1, 0x0, 0x0, 0x40800}, 0x1) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000a34ffe10e1092151f28300d2f6010902120001000000000904"], 0x0) syz_usb_control_io$cdc_ncm(r4, &(0x7f0000000180)={0x14, 0x0, &(0x7f0000000140)={0x0, 0x3, 0x1a, {0x1a}}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x81, 0x1, 0x20, 0xff, 0x0, 0x6, 0x40400, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000340), 0x6}, 0x1000, 0x2, 0x9, 0x4, 0x2, 0x0, 0x7, 0x0, 0x7ff, 0x0, 0x200}, 0xffffffffffffffff, 0x10, r1, 0x54a808c9a46feb7c) syz_open_procfs(0x0, &(0x7f0000000000)='net/ptype\x00') ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0) [ 564.859370][T21600] loop1: detected capacity change from 0 to 264192 23:05:35 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000103f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x0) [ 564.927984][T21600] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:35 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) [ 565.059171][T21600] loop1: detected capacity change from 0 to 264192 [ 565.143276][T21600] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:35 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), 0x0) 23:05:35 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000104f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x0) 23:05:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:05:35 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:05:35 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000000400010000030005000000000002"], 0x60}}, 0x0) 23:05:35 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) sendfile(0xffffffffffffffff, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 565.673330][T21630] loop1: detected capacity change from 0 to 264192 [ 565.714333][ T8560] usb 4-1: new high-speed USB device number 2 using dummy_hcd [ 565.756445][T21630] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:36 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(0x0, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) [ 565.865495][T21630] loop1: detected capacity change from 0 to 264192 [ 565.889469][T21630] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 565.974859][ T8560] usb 4-1: Using ep0 maxpacket: 16 23:05:36 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0200001b00010000030005000000000002"], 0x60}}, 0x0) 23:05:36 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) [ 566.256112][ T8560] usb 4-1: New USB device found, idVendor=09e1, idProduct=5121, bcdDevice=83.f2 [ 566.265233][ T8560] usb 4-1: New USB device strings: Mfr=0, Product=210, SerialNumber=246 [ 566.273669][ T8560] usb 4-1: Product: syz [ 566.277862][ T8560] usb 4-1: SerialNumber: syz [ 566.324471][ T8560] usb 4-1: config 0 descriptor?? [ 566.585470][ T8560] int51x1: probe of 4-1:0.0 failed with error -22 [ 566.793607][ T20] usb 4-1: USB disconnect, device number 2 23:05:37 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) ioctl(r1, 0x3, &(0x7f0000000000)="4a5f06221259d0545f558ebab517402cb7b82efd200d934e1f97326719658ebb260c8ca81d617a0b7e3c73c722898b4058e471e37c38cc841d12e354f09c561424b4e674045275a13de6327e3ceec495c20d3e259141f13f02fef2e257ace3baeab626537acde250887f923ae1656b9dea64ab1d31bc9d2d2499f1631da368ea1c45e6801aaf8f09545b48b9f6b2f9ac74ecc93a98c625f19053c443aff184e92c4b490b13") perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) connect$l2tp(r1, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}, 0x4}, 0x10) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:05:37 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) sendfile(0xffffffffffffffff, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:05:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:05:37 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0300001b00010000030005000000000002"], 0x60}}, 0x0) 23:05:37 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(0x0, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:05:37 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="6ebb5bc665f23aff7a20303000003030302c300600000000000001000080b3000d50318386db9f354337f5aa0a420b1e89d656b030a726016d3cce77fa28fe127149c6e137e4d5e1ba1763fe4ad3d8c7dea11413fbed9cec51bcdff4ca3a0287647f7c4bb6bb86be778997156e000015a5471425dea15b7e8ffd366f569ed595d14b0e8749e644ca0a4fbec51a9ec09ab870467533bc94a8471baba2170e706e5dde8d648992575d1ae2aa200c11066b6dc7c35c0d5db17aabbeee0b46a01297f2293087f43708000000000000000000e8b7fafbdec4813fcce5f4c1bf9413538602d3b8fff31277d6bc880fa1bae503101230fa21fdec5dc68f44f1037f0c81c5a90a87caf16e2d362b50ce63a60556fdf5adc2732a8e1f9b693b6dfd3167970203a1ed1826acf1f8850137386408d01b691831f7412ee3d2f6f8faf72d7242d62eb4d55288a731e7a3f1b57c0940f54ef23160853e572f5348c71e7e678bbf1d949bcbfe66982b1d243d3a11d6d23230b85b4bbbc0961111bc16fe07c2a56814961b745e3ca047bfc68bd6aba88eea427fcb07b4ea123bc4637468035300612cbd511855869a3a2664"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) [ 567.670252][T21678] loop1: detected capacity change from 0 to 5 [ 567.748305][T21678] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:38 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0400001b00010000030005000000000002"], 0x60}}, 0x0) [ 568.035142][T21678] loop1: detected capacity change from 0 to 5 [ 568.074634][T21678] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:05:38 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0003001b00010000030005000000000002"], 0x60}}, 0x0) 23:05:38 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 23:05:38 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 568.609268][T21706] loop1: detected capacity change from 0 to 5 23:05:38 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(0x0, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) [ 568.674880][T21706] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:39 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r3 = socket(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r6, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newqdisc={0x38, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8}, {0xc, 0x2, [@TCA_HHF_RESET_TIMEOUT={0x8, 0x4, 0xfffffffc}]}}]}, 0x38}}, 0x0) bind$802154_raw(r3, &(0x7f0000000000)={0x24, @none={0x0, 0x3}}, 0x14) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="0c010000", @ANYRES16=0x0, @ANYBLOB="010029bd7000fcdbdf250a0000003c00018008000100", @ANYRES32=r6, @ANYBLOB="14000200626f6e645f736c6176655f3100000000145f736c6176655f31000008000100", @ANYRES32=r6, @ANYBLOB="bb0003003a05b55447515e29edb0b5806cc00aecc251baa8e083caf9db4730a2d483a77bebf17ecd91433d8bdd21e2c6571332e695d896bb3a7d1b1d224e1cba5e132f29a6f0f832806e47db6b103aca577d3552440429e9349e9291b790d51edf78e344312c25716e9ca06bbbe8b3ac622c1e667cbc6e9e78a28958171d005d03762b67bf90ba0d140d7a7f3ac4619991c6aa17d32c58a0267a7d0ccf7f807eba7fafe472966d510e8b0b110b247d859a0ae0623dcc4a4c3a03cc00"], 0x10c}, 0x1, 0x0, 0x0, 0x19}, 0x24004000) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r7 = signalfd(r2, &(0x7f00000003c0)={[0xffff]}, 0x8) sendmsg$NL80211_CMD_SET_QOS_MAP(r7, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0xd080}, 0xc, &(0x7f0000000500)={&(0x7f0000000440)={0x40, 0x0, 0x200, 0x70bd28, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_QOS_MAP={0x2a, 0xc7, {[{0x4, 0x7}, {0x4, 0x5}, {0x4, 0x3}, {0x85, 0x2}, {0x1, 0x2}, {0x1, 0x7}, {0xff, 0x5}, {0x9, 0x4}, {0x9}, {0x20, 0x1}, {0x9, 0x2}, {0x20, 0x7}, {0x7, 0x2}, {0x8, 0x5}, {0x0, 0x6}], "b655188986f154f7"}}]}, 0x40}}, 0x4000044) 23:05:39 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0020001b00010000030005000000000002"], 0x60}}, 0x0) [ 568.789997][T21706] loop1: detected capacity change from 0 to 5 [ 568.849247][T21706] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:05:39 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0002001b00010000030005000000000002"], 0x60}}, 0x0) 23:05:39 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="6ebb5bc665f23aff7a20303000003030302c300600000000000001000080b3000d50318386db9f354337f5aa0a420b1e89d656b030a726016d3cce77fa28fe127149c6e137e4d5e1ba1763fe4ad3d8c7dea11413fbed9cec51bcdff4ca3a0287647f7c4bb6bb86be778997156e000015a5471425dea15b7e8ffd366f569ed595d14b0e8749e644ca0a4fbec51a9ec09ab870467533bc94a8471baba2170e706e5dde8d648992575d1ae2aa200c11066b6dc7c35c0d5db17aabbeee0b46a01297f2293087f43708000000000000000000e8b7fafbdec4813fcce5f4c1bf9413538602d3b8fff31277d6bc880fa1bae503101230fa21fdec5dc68f44f1037f0c81c5a90a87caf16e2d362b50ce63a60556fdf5adc2732a8e1f9b693b6dfd3167970203a1ed1826acf1f8850137386408d01b691831f7412ee3d2f6f8faf72d7242d62eb4d55288a731e7a3f1b57c0940f54ef23160853e572f5348c71e7e678bbf1d949bcbfe66982b1d243d3a11d6d23230b85b4bbbc0961111bc16fe07c2a56814961b745e3ca047bfc68bd6aba88eea427fcb07b4ea123bc4637468035300612cbd511855869a3a2664"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e") [ 569.459685][T21727] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 23:05:39 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 569.522427][T21735] loop1: detected capacity change from 0 to 5 23:05:39 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) [ 569.622124][T21735] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:39 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0003001b00010000030005000000000002"], 0x60}}, 0x0) [ 569.757746][T21735] loop1: detected capacity change from 0 to 5 [ 569.774187][ T5] Bluetooth: hci4: command 0x0406 tx timeout [ 569.788242][T21735] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 569.978444][T21732] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 23:05:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:05:40 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e") 23:05:40 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0004001b00010000030005000000000002"], 0x60}}, 0x0) 23:05:40 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) dup(r0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = fcntl$getown(r2, 0x9) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r5 = dup(r4) setsockopt$bt_rfcomm_RFCOMM_LM(r5, 0x12, 0x3, &(0x7f0000000040), 0x4) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x9, 0x20, 0x9, 0x0, 0x7, 0x4, 0x8, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6b89, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}, 0x4732, 0x8, 0xffff, 0x5, 0x100000001, 0x48, 0x5, 0x0, 0x3, 0x0, 0x3}, r3, 0xe, r5, 0x0) ioctl$NBD_SET_FLAGS(r5, 0xab0a, 0x9) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) bind$bt_l2cap(r5, &(0x7f0000000000)={0x1f, 0x80, @any, 0x7}, 0xe) [ 570.346633][T21764] loop1: detected capacity change from 0 to 5 [ 570.398937][T21764] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:40 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:05:40 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) [ 570.504793][T21764] loop1: detected capacity change from 0 to 5 [ 570.588771][T21764] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:40 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000031b00010000030005000000000002"], 0x60}}, 0x0) 23:05:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:05:41 executing program 3: seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000080)=0x1000) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) r2 = syz_open_dev$vcsn(&(0x7f0000000000), 0x7, 0x200800) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000040)={0x0, 0x101}, 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:05:41 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000201b00010000030005000000000002"], 0x60}}, 0x0) 23:05:41 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e") [ 571.297542][T21794] loop1: detected capacity change from 0 to 5 23:05:41 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:05:41 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) sendfile(r0, r1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 571.379477][T21794] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:41 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000021b00010000030005000000000002"], 0x60}}, 0x0) [ 571.499955][T21794] loop1: detected capacity change from 0 to 5 [ 571.579914][T21794] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:42 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) sendfile(r0, r1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:05:42 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000031b00010000030005000000000002"], 0x60}}, 0x0) 23:05:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:05:42 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:05:42 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="6ebb5bc665f23aff7a20303000003030302c300600000000000001000080b3000d50318386db9f354337f5aa0a420b1e89d656b030a726016d3cce77fa28fe127149c6e137e4d5e1ba1763fe4ad3d8c7dea11413fbed9cec51bcdff4ca3a0287647f7c4bb6bb86be778997156e000015a5471425dea15b7e8ffd366f569ed595d14b0e8749e644ca0a4fbec51a9ec09ab870467533bc94a8471baba2170e706e5dde8d648992575d1ae2aa200c11066b6dc7c35c0d5db17aabbeee0b46a01297f2293087f43708000000000000000000e8b7fafbdec4813fcce5f4c1bf9413538602d3b8fff31277d6bc880fa1bae503101230fa21fdec5dc68f44f1037f0c81c5a90a87caf16e2d362b50ce63a60556fdf5adc2732a8e1f9b693b6dfd3167970203a1ed1826acf1f8850137386408d01b691831f7412ee3d2f6f8faf72d7242d62eb4d55288a731e7a3f1b57c0940f54ef23160853e572f5348c71e7e678bbf1d949bcbfe66982b1d243d3a11d6d23230b85b4bbbc0961111bc16fe07c2a56814961b745e3ca047bfc68bd6aba88eea427fcb07b4ea123bc4637468035300612cbd511855869a3a2664"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12a") 23:05:42 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x30200, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@newtaction={0x14, 0x30, 0x20, 0x70bd27, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x20048001) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$snddsp_control(&(0x7f0000969000/0x2000)=nil, 0x1000, 0x0, 0x100010, r1, 0x83000000) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:05:42 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000041b00010000030005000000000002"], 0x60}}, 0x0) [ 572.143143][T21828] loop1: detected capacity change from 0 to 5 [ 572.210860][T21828] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 572.349583][T21828] loop1: detected capacity change from 0 to 5 [ 572.409004][T21828] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:42 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) sendfile(r0, r1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:05:42 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:05:42 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000000400010000030005000000000002"], 0x60}}, 0x0) 23:05:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:05:43 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12a") [ 572.996854][T21861] loop1: detected capacity change from 0 to 5 [ 573.127110][T21861] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 573.296764][T21861] loop1: detected capacity change from 0 to 5 23:05:43 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) [ 573.361433][T21861] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:43 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:05:43 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b03000000030005000000000002"], 0x60}}, 0x0) 23:05:43 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12a") 23:05:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) [ 573.794156][T21888] loop1: detected capacity change from 0 to 5 [ 573.805639][T21888] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:44 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b04000000030005000000000002"], 0x60}}, 0x0) 23:05:44 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:05:44 executing program 3: ioctl$I2C_SLAVE(0xffffffffffffffff, 0x703, 0x3a7) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) newfstatat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) read$FUSE(0xffffffffffffffff, &(0x7f0000003040)={0x2020, 0x0, 0x0, 0x0}, 0x2020) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000005480)='./file3\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000003c0)='./bus\x00', &(0x7f0000000540)='system.posix_acl_access\x00', &(0x7f00000008c0)={{}, {}, [{0x2, 0x3}], {}, [{}, {0x8, 0x3, r5}]}, 0x3c, 0x0) fsetxattr$system_posix_acl(r1, &(0x7f00000004c0)='system.posix_acl_default\x00', &(0x7f0000000680)={{}, {0x1, 0x4}, [{0x2, 0x1, 0xffffffffffffffff}, {0x2, 0x3, 0xee00}, {0x2, 0x4, r2}, {0x2, 0x4, r3}], {0x4, 0x4}, [{0x8, 0x5}, {0x8, 0x2, r4}, {0x8, 0x1, 0xee00}, {0x8, 0x1, r5}, {}], {0x10, 0x7}}, 0x6c, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) r6 = syz_mount_image$befs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x8, 0x7, &(0x7f0000000340)=[{&(0x7f0000001040)="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", 0x1000, 0x9}, {&(0x7f0000000080)="14fa59298a3ba30733a9f9ed2bfaef76ec930dc4a6343de208a0164b6b73f2bb5623f89eefa9b8a4c2363c30d9b8ab60f8ed2f5a93b443ca9b61d9249635701f2be34d74cec665676c0b3b14e04b2ca2d0fcf6b5f12c6a841b93117217920f87fc380954baf00dbf5fbcc8eaa4a1", 0x6e, 0x1}, {&(0x7f0000000100)="f1bfeb28e686bc8bc451ec7f06dcfd144b1f58d03f31133fa10e0e595e8d71435493bc7d8bec4c9451d44876e838ce01653d811fe07bc1a967411081cdac3aed32a7301845f8634289368ead646122ec1bf27794d79159f19ca53aa279198ef81d0d000e6ac5b6e122bec615b66ad6a56d0f7e8848b0128c0bd8", 0x7a}, {&(0x7f0000000180)="e1bba7f82c4f98199f1f346f8d32ea4baed623fe5221b03c14bd3d42d850b21e2dc23cf0dcc4e1cda9b58aaf073e4a5886dad5b82800290b57dd9d4e4230bed5e20674a2a64c29b626e1b2951251973b9307c7ae0dafca83af238aa70cbdecfc", 0x60, 0x81}, {&(0x7f0000000200)="2ffd837a6cfe6d1ec37875be2b7edd2640649ef8c4f643e573f4b838e25cf6c9fb88e8969016831d0f6fc481147b7b807b849a0dc45398e3e3", 0x39, 0x2}, {&(0x7f0000000240)="59ea0ac514ac1e388c2e3aa0ea6a1126bfea6db9ff066957352dfbf8c29d4dc100c6ce46bed47a1e876b0a716843a4b0df2061d9087fdd501805a3ed4d806fbca5d894dd33c11c20f5484d1366922cbabe3832231c9f9e22e930d1bcfcc4d450779993c21f254312b18a94df01e8d058094d1fd18b17da793f5b410ccf775c297b701c668c4c96c38f68f8ef5fda66025787a30d033441a9d0fe8aca64773f956277b907a5045609bce2726bb384bc76d0a89d3efe99a384d06b99531780b7f2c41ee4d197f8900453ac41bae9825d1f25c20b4720a13b5027648fc1299e", 0xde, 0x3}, {&(0x7f0000002040)="6eafe8a8aa31e8119b0757c2e8b7422944594db97148e9184aec9aab5ed10edc8ab9ff50ee297fd6c17d35af56e1c0b64016a353203fadb87d7a9923f7f3c174ef1329b7f1f5e69c643801792896b0c1b09366476df2c6fd2c95902fe5fc5eed549e36205836b62cee8e7d16036605218855d89d803599a8b8667431a770012481dc1f42caac93656405e5d14445cdb051cc742af683f8228b1e5f066daf41bea709520d17ed9bfe6b1c97ccf489aa5faa5997d1f92eaed182982d180df17ab37044bf3219af9d57704f81a55b6450d206e511b1b50ec204cc24dbaa3f36d02949487aa8cebdbb045495752f06f73483b52552404388059cb72b12a9d5ca4a9179271626df8c8fea35f64f36cba68dfabc51b65c4a517d11c7c2e90957fb09da65d86115687ef8b39bfa1024536b8ffad8aabb471cacb0ed7ffbad3332d04ebe245fda1bc8df6a2c96a4bafec1f0b8b7b7d5871e6f29d842932d338962be26c744cea3d50cef074278ad1014caf2c1b2853882238b4eac08bfcce86820c87ab140c0e207d8212004b9df265f9e6070088ed9114d3ec26f30b32506ac9f8b04a12a6f54e03468eb3cc63bfd806746b8c19cf72157b1043a1b6d28c17060d2bc6c7cca4edf1f0d9441fe3c56654a310d1951932df004d6ab612cc0c71a381d83751518979c469410abd4242e29c911c1e703c387d5eadb8c33617d10e54b6d83811a79b5ba3833e8df02b9829a4de3ce7fd323f814b1aaf00729ca58c7efd24c9151c60d98cfb60402cd3d9292a796f9a27deaa9ccaebb96786b8dbe2f092402888addfd6789d695324a9e216f3e79f1effa75863eab8909099e2f211f5bfed727669f7d324f573b744aebef1c41a5e86b219287151ef507522f12586fe6d8ce4c6b8588704d0b256e86f57b3e49e07fbbc8e413024686da9d7e53021d5260d45f1bb8900343245fd369b49e2e43504cb53591b6c2d2fb6518d1576be37dc6340d5fd217798d673029a9eb3ec5d665f444c15568cf15b9b54ca8736efdd64c558ff571d5f89d973b106712910c6005ced44289428e1f3eb79bc9342a9cd80ad068f055d09fc285daf74ff84a056ff6cc2edab24baee8e7046a7830d2908bc7963ec3925512c44e026157aa6fb42b40a552776377c2a692bad026a9e7d2c877bf43ebf79277896ac0ea0ee0bdc5263da8b8aedd1e41f08f724c5e5d47f63a880b6a17109b66ca3b743effed66ecc6e8f994781dfcc883cd69023633f547174a7f4e4382a7ef9317a9a34c4037acda76d3a7f627cda41dfdf8a46a3329ae0f979fa41aa2ffdce1b1b370413951c40d0b188c34a3d6ff2d1c67f3019c3e00ed6a179183d967c3b2da3eddc5e26b35d53e78b945e2f6a3c83a70f0f591545f8d51173505a35c41f135be6f2cced20c5e4754e36807be13bb0dc8ee356dbe319764a7f844976977f60b7b7dd7c7b491e391cb6c6011ac82a3fda0481f1168aad82b6248f829916abc7d2902a6cf961dc199e0e8d1f0835ae870b02e211fc5a8d2afb6ba6b0e00bd57b73d8ff454d3b1e38a5ec20673cd7c53169d21681ec60832aabec33263985774d86e7506e0f795da0808de8e0f254d11bb429e0858b556bf127a4b5a85b5cc7f87cf3740c9c59cde10edfd38ec4e56ab298f14310a6f40d1ddfe5e84f48f567bb23043438ba3682800879919a1e0ab66eaba51a06358acc3e5327f2bb2d626576890b1def1b97fa5d6d539230bee85b8ba2c6ef01e51520ea48ae43fcd5343afeda9f6e671d09d3f0d0ce01919a6a3c7cbd23cc22fec246d33a6709bf90a02381ae131a3d49c0281e31add89fa593c735c234dd542aa3258179e2b3e788b3aead42649335ed73f10cd70249d61f9a72471cad17515cd6d691628d65aa7e921f223801740b32b25ada083f844ad9c1ffb0e5307c31ef0abbcb3f34f18d6128f022d0eed1ab22435feffd899757d12803f7942e7a6d871835c7146cb71e321e99b131c9a48780ce0966565f1aed2485c5e3957f5e1289b8e149d53d8f4cb64d8c16c149ef4eecf957e7a96ac3ba2357fe5eeff8ea08b81ddf1336b9eaab507abe6db29b93f064f1e95bc7aaa9c277b5af3c06bc7e5d339d0ca252419bbcbfa829c615d79ae27cb2cc8e14c810b0c727041a892132a0f1fdf35dfb1278219f588547b3b147613f3fa2f85bfdb1472f8381ea00ee3cee1d48a6c99749db6f0be0b17b13ae92f41788071d1d0e30e351b53755ac41cdb87bd6590270275c8faa2eadce2e1f6a048212bb4bdfa91dd19bba42eba12b585ffe4c38a5599c790ae25932a778c2acf78b0d33d88205360c558b58da2752eff825cfc606147d1c307e8cefe687ce9b63cf6321c3c5918bbf53d095a4c423eba0e20df8f4c1fd0ffaf8f9f139cc84c4ab4d97f187360594cc148b8ee5e8d7cbdbaf702403d3dc810d3f9aa585464066f98205ce6f912f9adcf02186729793212f45d0f310f08d53051f3fae2c3f8ac90ab7017e1b8225c060a22a6ac2c758f841e679c09c63fd1759a63ee2371ebd59ecd7847e0bc78cac863c45c730eccdc77cec0b7e06205ea8eea9850a0af52ecd487607a6042d298a8a47676c6441f2a0781938625fbb510b16178cb401e50ab8dab25fd729d071c8e6e9d6ab6ae1fa4268c6c8f5e5b2d968be81bf3bf10ebb589210266a7a43223c2e9eb98ef4ec4616d7aaa08eadbb45fcbec004289b3eca98cd6c16cc9d185e532bdae0d40c93af2fe83a95f494513b4c0a516302dda6383f1e634ce801345647e9cce8bae67a48c6a3b6095330bc278305e514ae6fd4ca72ee1eff60118d6b346225439249a3b0adfe01b7ccd2dc484ddcfb99e2c84c4c2ab1fd5f4749701b7a778ad52343ab9d9d42c3984b5359117276be2e412c0cb6a7d54b4e5179f737b74ab1a49dc23008c6020ab697b4c5a227fd00faa389cc80ce2c7ed56745a0ca1120a458c110c7737c00e582ba0845c8e64a32613d823bdce51d2ad5b67717dc11c23d1b973d3327abbad8b5adc23c58a3584f6f1e5f2c395b719879c151e37410983203a93cdf3ba975eac6eff1b42e91480f5024a2a37f3a2e5fb1bd9bbbec294e73f759d4ecfc731493b5294cc464ddfd4a88aef21bfda3a20af5d1c44d7f0cd7b4944ea4090e882d5a9be2419dbd513a330f9023b9273041b0f9d1d535e233e8913dfed5c2b4b2a8bde505749e99abb2ef053a1a184f246d51337b9274680791bd913ea6ec27ed0cbfe6441946701663618c1effc86038eadab51f8158fddd86f24d143a03c88247556f4225468834f6e56729d41297024817c91628e4608f282e976d4b1cfda0040d71e657c2f3df20604274f09b808e230253ae3c2e16298874ad23f4eb242ecb86fb722a742f35b8011f52b5fa8d14833f56c1755ee8eeefae16900b2ce3b6478d167ff1a09c52ca2d3c1eae5b9c741f8d90cb1d2b4eb8d8af7bb4769543e75366c20178fcc70230db28094edfa5d735647adf09ce8d5bc7c3f5e390fc5e567a7b00eb849db62d9e96f0854d6f6190a853b5063563c9dbfff3b1f48c69cffedaf23fa78d1b22a0f3ecc9d92d905b822ecf8a822dd2e1c58693b311cdb938376f0345d7dccdb0625904b07ed4df1b364059a7e7886f9e69d34c1c6289388f13fee42de5cba8ebf3b2aba0ace8f486b6a146b580cf908aea5a3a77a0cd94b085140fe49bf271324d8ab2015fa98737afad5344bb56633d6b5a059386208e38c341cb5da6f74d908ce7b6b5d930ab83096a19e86579623b79e76c9ee182ceb09f1f39c71b872776d5efda51906c8beb10352ce45c10bbb1bcf712ee4ce611d79d59a2379910d61198fb49ed0df0438a6112292d4929550e893f5c62653c668b50bfeb123d1b6271e5ab26e2451fda57dffef44c52cef8be4e6fa2302d548908d78b7f43b6ca63f501eb501864a7fba3fe5e8cbfdb6379346114eb369ec62a137025d3f8d75682b0ef100f42b53dcb6cea3254d51a154bda8816fd536477d3674880dc3be98535c0c89cd2ec401ba068d0c4e8b6031bbddcc494f09a767fadb72f74965c3a1f694c3dd96f6481c91cc92de6478b77005a78c3fb1be0b83bc164445f83a75e01d67990dce614835e80c713adf6dadf0fe52b278f24caefdcf93dda6ed95c0dbbf197225f5e8662f419d108a6e85ffffff7b69f0477479cad5a3bff1da7034c1f148ae22d4997eee866a00aafbd5073c7270f9a1d987dd1e9246255f80d9b47bd588ac68a5eaf285fc97b0e8006ac978bf4415193b1c6ed71f3809f6d05643df35b5b786babc0ee88f0fd28552c3a50d2191cddb167148ef9ebe2f765109e38c82a7b753c4cf4857e6bf148d490b30295e3ee78b305f2d3b19c11e765333069b7cb79791f0772a0c3e9741f9c45e2715d4f11c0bc5ed768a9ebaf43d30480331e3e5ed0b15ec9c806cb2fd5eeff187a1d013ec2d19c81224b014428212c1f5844b0bcd1d8bb9ac5975707a49e077b3fcd90305cecf948adbbeda4c607cbeca687ebe8ddd33fd1b3e453bfdf11245a2bae36ebf16cc70f5407b4aee5088b7442612235315105d6e113e4f9d952525269bf4c8fe4e7c0dfb87d2129e1c5fd6447c167b3e750c371ae8d6c3ddc6fd07304a9f8c27223293031f710589a48571233bf02da212be55223795d13b5bc515184f9a518528b49f8a700609e56da8cc55b26f3a208279e6514d2844d05208259b78dd6b3aac1aea230ec09bcb133f6cdde6507d999af955b12be096c10dba185ff626609d91b5f34d729ccb10f8edffcace542510d20d4b37f645dea0dd082dfe3bc52af63bbf7fd9fe21a4b45b9d7c67f0ccde05ed21451beedb7eb867d064634a42f48c3cf2c1012a8fe9f8880d9e0f0759e68dd3fc939644e24ce69aebddef86464b07dce6da641619b8324757d6e6994ea74c550c148c860c0e2853c9402849ce9f6305d31be12b28839496cf9b0644038dd5ccb0c442e494444d7e890dc643cec8f431c2bb34ea7cb369ca5bbee2f06411b11c0a98c345bc8290f729847122b65a1dea86381ff7da55c216ccf9d70998497459c1338d10da06b4e142b008c82268dbfa0a5704e3944da3502cbda1700189d3df970d701fa67184cb7e08e59c2a6596d4b6672cd164ea8d9263fef795abdee6574dc3dcdc826f5062bc920deb5f22012744563bd6b47454f1e7ecba81e27d7eba0b07d7bfbe3631fd67cea6c52fb46a354c4f8134b0f9f40c9bd7ffdf01d9867cb31ccd3fc2d1e3bde635b3e4f876f253c0731e35ffd78917e3ef0fd36b33571dc9825ad1c817172238de77b7ac3bd4651e1f393c9a4e913b14bec574549bbceebe8074569ca2cc740d8297e048085ca4613aa001bee0a4c93c547545015ca6272eddfa7a267aa57c0ffe78c65f23277d8cffd93e8faad319ae6eaa84460a6f2e47f5495e4678eae83bf395cbd19697f066bdba6023782213b7862c1f4461dee8312540dba77114a1585c0841fc28ac06739b2de1242f15093da144d6c9cd785429d99fc2a29f4652a87b4d92e631069bf7d833e2e667dcf92e12457c2680a57a0d95a4641b84c65d17826497ec1d2a98a52e16975b8949706a44b4f742c84e638bfd7a61cb7206af24facd26409e6b3b6f018e6a0ad2cad0bcb10308090948009ff86963139fb59244e22ad4fe626f169ca3817c757d72b59fa0ce4396b128f5ab390d14ba53b6619f78080868e0d7afb0c0aa0440942bda131d89f0c6d6db5837f87f834da57a8fa72bdabb9109398c0192f3143258c1fc52f697c76dab79", 0x1000, 0xba}], 0x99243cfe0089d301, &(0x7f0000000400)=ANY=[@ANYBLOB='),/dev/nullb0\x00,euid>', @ANYRESDEC=0xee00, @ANYBLOB=',smackfsroot=+{-,mask=MAY_READ,fowner>', @ANYRESDEC=0xee00, @ANYBLOB=',L']) openat(r6, &(0x7f0000000480)='./file0\x00', 0x505300, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) [ 573.898253][T21888] loop1: detected capacity change from 0 to 5 [ 573.930786][T21888] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:44 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b02010000030005000000000002"], 0x60}}, 0x0) 23:05:44 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="6ebb5bc665f23aff7a20303000003030302c300600000000000001000080b3000d50318386db9f354337f5aa0a420b1e89d656b030a726016d3cce77fa28fe127149c6e137e4d5e1ba1763fe4ad3d8c7dea11413fbed9cec51bcdff4ca3a0287647f7c4bb6bb86be778997156e000015a5471425dea15b7e8ffd366f569ed595d14b0e8749e644ca0a4fbec51a9ec09ab870467533bc94a8471baba2170e706e5dde8d648992575d1ae2aa200c11066b6dc7c35c0d5db17aabbeee0b46a01297f2293087f43708000000000000000000e8b7fafbdec4813fcce5f4c1bf9413538602d3b8fff31277d6bc880fa1bae503101230fa21fdec5dc68f44f1037f0c81c5a90a87caf16e2d362b50ce63a60556fdf5adc2732a8e1f9b693b6dfd3167970203a1ed1826acf1f8850137386408d01b691831f7412ee3d2f6f8faf72d7242d62eb4d55288a731e7a3f1b57c0940f54ef23160853e572f5348c71e7e678bbf1d949bcbfe66982b1d243d3a11d6d23230b85b4bbbc0961111bc16fe07c2a56814961b745e3ca047bfc68bd6aba88eea427fcb07b4ea123bc4637468035300612cbd511855869a3a2664"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5") 23:05:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) [ 574.136878][T21905] loop3: detected capacity change from 0 to 8 23:05:44 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:05:44 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b03010000030005000000000002"], 0x60}}, 0x0) 23:05:44 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) [ 574.301406][T21915] loop1: detected capacity change from 0 to 5 [ 574.375315][T21905] loop3: detected capacity change from 0 to 8 [ 574.411750][T21915] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:44 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b04010000030005000000000002"], 0x60}}, 0x0) 23:05:44 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbfs(&(0x7f0000000340), 0x1ff, 0x0) ioctl$USBDEVFS_BULK(r2, 0x80045505, 0x0) write(r2, &(0x7f0000000100)="8b1428", 0x3) sendfile(r0, r1, 0x0, 0x80006) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x40) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$sock_netrom_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={0x1, @default, @netrom={'nr', 0x0}, 0x9, 'syz0\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x6, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}) io_submit(0x0, 0x4, &(0x7f0000000440)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x6, 0xffffffffffffffff, &(0x7f0000000140)="867cebe085ef4dc58e11136c7fcd2f612578b9a516f45461261d3a697d65efa7c1e782a762c23bb358621a4a1ef56d8b41b1ca19549a7dba4f050a62b67d0427709852e2bced", 0x46, 0x9, 0x0, 0x1, r1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x6, 0x3, 0xffffffffffffffff, &(0x7f0000001040)="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", 0x1000, 0x81, 0x0, 0x0, r1}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000240)="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", 0xfd, 0x9cb, 0x0, 0x2}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0xc0ed3891680356ad, 0x8, r0, &(0x7f00000003c0)="a17185280546cc91efe711869ebaae1c1c28815a375f605351273710a711b0fb41", 0x21, 0x3ff, 0x0, 0x1}]) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x4, 0xf0, 0x2, 0x0, 0x2, 0x400, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000000), 0x4}, 0xb004, 0x1, 0x4, 0x2, 0x9, 0x9, 0xb1b, 0x0, 0x7fff, 0x0, 0x7}, r3, 0x2, r4, 0x1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:05:44 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5") 23:05:44 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 574.569143][T21915] loop1: detected capacity change from 0 to 5 [ 574.602046][T21915] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x14, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:05:45 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00050000030005000000000002"], 0x60}}, 0x0) 23:05:45 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 575.204867][T21955] loop1: detected capacity change from 0 to 5 23:05:45 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00070000030005000000000002"], 0x60}}, 0x0) [ 575.322058][T21955] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:45 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5") 23:05:45 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 575.515296][T21955] loop1: detected capacity change from 0 to 5 [ 575.570237][T21955] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:45 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00090000030005000000000002"], 0x60}}, 0x0) 23:05:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3c, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:05:46 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00170000030005000000000002"], 0x60}}, 0x0) [ 576.052052][T21982] loop1: detected capacity change from 0 to 5 [ 576.108603][T21982] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 576.226661][T21982] loop1: detected capacity change from 0 to 5 [ 576.263360][T21982] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:46 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:05:46 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:05:46 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00180000030005000000000002"], 0x60}}, 0x0) 23:05:46 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_netrom_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x1, @default, @rose={'rose', 0x0}, 0x9, 'syz0\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x3, 0xfffffffd, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x40) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f00000001c0)=0x1f) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) syz_open_procfs(r3, &(0x7f0000000000)='wchan\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) gettid() madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) connect$netrom(r1, &(0x7f0000000080)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x7}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @bcast, @bcast, @bcast]}, 0x48) 23:05:46 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5cb445d11a3786595100ced0d") 23:05:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x72, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:05:46 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b001a0000030005000000000002"], 0x60}}, 0x0) 23:05:47 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="6ebb5bc665f23aff7a20303000003030302c300600000000000001000080b3000d50318386db9f354337f5aa0a420b1e89d656b030a726016d3cce77fa28fe127149c6e137e4d5e1ba1763fe4ad3d8c7dea11413fbed9cec51bcdff4ca3a0287647f7c4bb6bb86be778997156e000015a5471425dea15b7e8ffd366f569ed595d14b0e8749e644ca0a4fbec51a9ec09ab870467533bc94a8471baba2170e706e5dde8d648992575d1ae2aa200c11066b6dc7c35c0d5db17aabbeee0b46a01297f2293087f43708000000000000000000e8b7fafbdec4813fcce5f4c1bf9413538602d3b8fff31277d6bc880fa1bae503101230fa21fdec5dc68f44f1037f0c81c5a90a87caf16e2d362b50ce63a60556fdf5adc2732a8e1f9b693b6dfd3167970203a1ed1826acf1f8850137386408d01b691831f7412ee3d2f6f8faf72d7242d62eb4d55288a731e7a3f1b57c0940f54ef23160853e572f5348c71e7e678bbf1d949bcbfe66982b1d243d3a11d6d23230b85b4bbbc0961111bc16fe07c2a56814961b745e3ca047bfc68bd6aba88eea427fcb07b4ea123bc4637468035300612cbd511855869a3a2664"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5") [ 576.764923][T22010] loop1: detected capacity change from 0 to 5 23:05:47 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00020000030005000000000002"], 0x60}}, 0x0) [ 576.976929][T22010] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:47 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) r2 = syz_open_dev$usbfs(&(0x7f0000000340), 0x1ff, 0x0) ioctl$USBDEVFS_BULK(r2, 0x80045505, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, r2, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xad365bcf26fe48ce, 0x9, 0x9, 0x9, 0x1c0, r1, 0x8, '\x00', 0x0, r1, 0x3, 0x2}, 0x40) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r3, 0xc0096616, &(0x7f0000000040)={0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) [ 577.102982][T22010] loop1: detected capacity change from 0 to 5 [ 577.235568][T22010] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:47 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5cb445d11a3786595100ced0d") 23:05:47 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00050000030005000000000002"], 0x60}}, 0x0) 23:05:47 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:05:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7ffff, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:05:47 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5") 23:05:48 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00070000030005000000000002"], 0x60}}, 0x0) 23:05:48 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5cb445d11a3786595100ced0d") 23:05:48 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00080000030005000000000002"], 0x60}}, 0x0) 23:05:48 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000040), 0x80400, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x400000, 0x0) sendfile(r3, r4, &(0x7f00000000c0)=0xc3, 0x9) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x840, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000100), 0x2, 0x181000) mmap(&(0x7f000043e000/0x1000)=nil, 0x1000, 0x2584b2b05fc774db, 0x80010, r5, 0x2) sendfile(r2, r2, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:05:48 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5") 23:05:48 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00090000030005000000000002"], 0x60}}, 0x0) 23:05:49 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="6ebb5bc665f23aff7a20303000003030302c300600000000000001000080b3000d50318386db9f354337f5aa0a420b1e89d656b030a726016d3cce77fa28fe127149c6e137e4d5e1ba1763fe4ad3d8c7dea11413fbed9cec51bcdff4ca3a0287647f7c4bb6bb86be778997156e000015a5471425dea15b7e8ffd366f569ed595d14b0e8749e644ca0a4fbec51a9ec09ab870467533bc94a8471baba2170e706e5dde8d648992575d1ae2aa200c11066b6dc7c35c0d5db17aabbeee0b46a01297f2293087f43708000000000000000000e8b7fafbdec4813fcce5f4c1bf9413538602d3b8fff31277d6bc880fa1bae503101230fa21fdec5dc68f44f1037f0c81c5a90a87caf16e2d362b50ce63a60556fdf5adc2732a8e1f9b693b6dfd3167970203a1ed1826acf1f8850137386408d01b691831f7412ee3d2f6f8faf72d7242d62eb4d55288a731e7a3f1b57c0940f54ef23160853e572f5348c71e7e678bbf1d949bcbfe66982b1d243d3a11d6d23230b85b4bbbc0961111bc16fe07c2a56814961b745e3ca047bfc68bd6aba88eea427fcb07b4ea123bc4637468035300612cbd511855869a3a2664"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5cb445d11a3786595100ced0dc61ab58b3ce6") 23:05:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="0a000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:05:49 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00170000030005000000000002"], 0x60}}, 0x0) 23:05:49 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5") 23:05:49 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) [ 579.182088][T22071] loop1: detected capacity change from 0 to 5 [ 579.268927][T22071] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:49 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5cb445d11a3786595100ced0dc61ab58b3ce6") 23:05:49 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00180000030005000000000002"], 0x60}}, 0x0) [ 579.399015][T22071] loop1: detected capacity change from 0 to 5 [ 579.445524][T22071] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:49 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x35) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000040)={0xd5, 0x2}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x18000000000002e0, 0x28, 0x10000f0, &(0x7f00000004c0)="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", 0x0, 0x17, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4, &(0x7f0000000000), &(0x7f0000000080)}, 0x28) r2 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x40010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xf9b, 0x0, 0xfffc}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r2, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:05:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="10000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:05:49 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) r2 = syz_open_dev$usbfs(&(0x7f0000000340), 0x1ff, 0x0) ioctl$USBDEVFS_BULK(r2, 0x80045505, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, r2, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xad365bcf26fe48ce, 0x9, 0x9, 0x9, 0x1c0, r1, 0x8, '\x00', 0x0, r1, 0x3, 0x2}, 0x40) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r3, 0xc0096616, &(0x7f0000000040)={0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:05:49 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b001a0000030005000000000002"], 0x60}}, 0x0) [ 579.788923][T22099] loop1: detected capacity change from 0 to 5 [ 579.867973][T22099] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:50 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5cb445d11a3786595100ced0dc61ab58b3ce6") 23:05:50 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) [ 580.056450][T22099] loop1: detected capacity change from 0 to 5 23:05:50 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00000300030005000000000002"], 0x60}}, 0x0) [ 580.156845][T22099] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="11000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:05:50 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010200030005000000000002"], 0x60}}, 0x0) 23:05:51 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:05:51 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5") [ 580.828215][T22125] loop1: detected capacity change from 0 to 5 [ 580.910405][T22125] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 581.035274][T22125] loop1: detected capacity change from 0 to 5 [ 581.046686][T22125] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:51 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5cb445d11a3786595100ced0dc61ab58b3ce6c488aa") 23:05:51 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010300030005000000000002"], 0x60}}, 0x0) 23:05:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="25000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:05:51 executing program 3: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x4, 0x100000001, 0x3f}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000001c0)={r3, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x90) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000080)={r3, 0x1c, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x6, @dev={0xfe, 0x80, '\x00', 0x35}}]}, &(0x7f00000000c0)=0x10) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r5 = dup(r4) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r4, r5, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r5, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r4, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:05:51 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x10, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) [ 581.437205][T22153] loop1: detected capacity change from 0 to 5 23:05:51 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010400030005000000000002"], 0x60}}, 0x0) 23:05:51 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5") [ 581.534551][T22153] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:52 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x10, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:05:52 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5cb445d11a3786595100ced0dc61ab58b3ce6c488aa") 23:05:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2f000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:05:52 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010003030005000000000002"], 0x60}}, 0x0) [ 582.140628][T22178] loop1: detected capacity change from 0 to 5 [ 582.245368][T22178] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:52 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010020030005000000000002"], 0x60}}, 0x0) 23:05:52 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x10, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:05:52 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="6ebb5bc665f23aff7a20303000003030302c300600000000000001000080b3000d50318386db9f354337f5aa0a420b1e89d656b030a726016d3cce77fa28fe127149c6e137e4d5e1ba1763fe4ad3d8c7dea11413fbed9cec51bcdff4ca3a0287647f7c4bb6bb86be778997156e000015a5471425dea15b7e8ffd366f569ed595d14b0e8749e644ca0a4fbec51a9ec09ab870467533bc94a8471baba2170e706e5dde8d648992575d1ae2aa200c11066b6dc7c35c0d5db17aabbeee0b46a01297f2293087f43708000000000000000000e8b7fafbdec4813fcce5f4c1bf9413538602d3b8fff31277d6bc880fa1bae503101230fa21fdec5dc68f44f1037f0c81c5a90a87caf16e2d362b50ce63a60556fdf5adc2732a8e1f9b693b6dfd3167970203a1ed1826acf1f8850137386408d01b691831f7412ee3d2f6f8faf72d7242d62eb4d55288a731e7a3f1b57c0940f54ef23160853e572f5348c71e7e678bbf1d949bcbfe66982b1d243d3a11d6d23230b85b4bbbc0961111bc16fe07c2a56814961b745e3ca047bfc68bd6aba88eea427fcb07b4ea123bc4637468035300612cbd511855869a3a2664"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5cb445d11a3786595100ced0dc61ab58b3ce6c488aa") [ 582.405172][T22178] loop1: detected capacity change from 0 to 5 [ 582.434944][T22178] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:52 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5cb445d11a3786595100ced0dc61ab58b3ce6c488aa") 23:05:52 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xd9}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) r2 = socket(0x28, 0x1, 0x800) sendmsg$SOCK_DIAG_BY_FAMILY(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10048000}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0xd8, 0x14, 0x2, 0x70bd27, 0x25dfdbff, {0x2c, 0xf9}, [@INET_DIAG_REQ_BYTECODE={0xc3, 0x1, "b748aeffbd44a68bb09ab64a2b8f7c9e8658ecf6e6a43928392da128b585aae36b9aade52a4bf316655e0f174fa80e7865cd00eaef7300aaeac26d97819fbf1b2cbe66599828466833e617fff136ae2eb6631041d4d098df4100e6862a5c3682988ee7dd75f6a1847d965ec64c349dc7aa0d82fb116f469d2085a9c00fb12f9dd52770e92b5a386b5ea8b9f54e553f507ceff43a18b88700338ff66b23e68f89bc039bb7b7bcb6442e4a802f0b283248a7cbded4db624e5232170e2fa91560"}]}, 0xd8}, 0x1, 0x0, 0x0, 0x4008000}, 0x20000800) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:05:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="3c000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:05:52 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010002030005000000000002"], 0x60}}, 0x0) [ 582.845075][T22206] loop1: detected capacity change from 0 to 5 [ 582.889408][T22206] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 583.074282][T22206] loop1: detected capacity change from 0 to 5 23:05:53 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) [ 583.146983][T22206] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:53 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010003030005000000000002"], 0x60}}, 0x0) 23:05:53 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5cb445d11a3786595100ced0dc61ab58b3ce6c488aa0e") 23:05:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="60000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:05:53 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T1(r3, 0x103, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x1, @default, @netrom={'nr', 0x0}, 0x9, 'syz0\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x6, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}) sendfile(r2, r3, &(0x7f0000000000)=0xfff, 0x80000000) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:05:53 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:05:53 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5cb445d11a3786595100ced0dc61ab58b3ce6c488aa") [ 583.652367][T22233] loop1: detected capacity change from 0 to 5 [ 583.673205][T22233] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 583.756357][T22233] loop1: detected capacity change from 0 to 5 23:05:54 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010004030005000000000002"], 0x60}}, 0x0) 23:05:54 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5cb445d11a3786595100ced0dc61ab58b3ce6c488aa0e") [ 583.806691][T22233] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="72000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:05:54 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:05:54 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030205000000000002"], 0x60}}, 0x0) [ 584.542415][T22259] loop1: detected capacity change from 0 to 5 [ 584.580538][T22259] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:54 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5cb445d11a3786595100ced0dc61ab58b3ce6c488aa") 23:05:54 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5cb445d11a3786595100ced0dc61ab58b3ce6c488aa0e") 23:05:55 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030305000000000002"], 0x60}}, 0x0) 23:05:55 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) [ 584.804041][T22259] loop1: detected capacity change from 0 to 5 [ 584.824387][T22259] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:55 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030405000000000002"], 0x60}}, 0x0) 23:05:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20020000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:05:55 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:05:55 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5cb445d11a3786595100ced0dc61ab58b3ce6c488aa0e") 23:05:55 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) r2 = socket$pppl2tp(0x18, 0x1, 0x1) fchmod(r2, 0x90) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:05:55 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) [ 585.578115][T22296] loop1: detected capacity change from 0 to 5 23:05:55 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030007000000000002"], 0x60}}, 0x0) [ 585.649401][T22296] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 585.796414][T22296] loop1: detected capacity change from 0 to 5 23:05:56 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030009000000000002"], 0x60}}, 0x0) [ 585.842163][T22296] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:56 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:05:56 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xd9}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) r2 = socket(0x28, 0x1, 0x800) sendmsg$SOCK_DIAG_BY_FAMILY(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10048000}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0xd8, 0x14, 0x2, 0x70bd27, 0x25dfdbff, {0x2c, 0xf9}, [@INET_DIAG_REQ_BYTECODE={0xc3, 0x1, "b748aeffbd44a68bb09ab64a2b8f7c9e8658ecf6e6a43928392da128b585aae36b9aade52a4bf316655e0f174fa80e7865cd00eaef7300aaeac26d97819fbf1b2cbe66599828466833e617fff136ae2eb6631041d4d098df4100e6862a5c3682988ee7dd75f6a1847d965ec64c349dc7aa0d82fb116f469d2085a9c00fb12f9dd52770e92b5a386b5ea8b9f54e553f507ceff43a18b88700338ff66b23e68f89bc039bb7b7bcb6442e4a802f0b283248a7cbded4db624e5232170e2fa91560"}]}, 0xd8}, 0x1, 0x0, 0x0, 0x4008000}, 0x20000800) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:05:56 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030017000000000002"], 0x60}}, 0x0) 23:05:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20030000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:05:56 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5cb445d11a3786595100ced0dc61ab58b3ce6c488aa0e") 23:05:56 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:05:56 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030018000000000002"], 0x60}}, 0x0) [ 586.616060][T22333] loop1: detected capacity change from 0 to 5 [ 586.841908][T22333] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:57 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(r2, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:05:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20040000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:05:57 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b0001000003001a000000000002"], 0x60}}, 0x0) 23:05:57 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:05:57 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="6ebb5bc665f23aff7a20303000003030302c300600000000000001000080b3000d50318386db9f354337f5aa0a420b1e89d656b030a726016d3cce77fa28fe127149c6e137e4d5e1ba1763fe4ad3d8c7dea11413fbed9cec51bcdff4ca3a0287647f7c4bb6bb86be778997156e000015a5471425dea15b7e8ffd366f569ed595d14b0e8749e644ca0a4fbec51a9ec09ab870467533bc94a8471baba2170e706e5dde8d648992575d1ae2aa200c11066b6dc7c35c0d5db17aabbeee0b46a01297f2293087f43708000000000000000000e8b7fafbdec4813fcce5f4c1bf9413538602d3b8fff31277d6bc880fa1bae503101230fa21fdec5dc68f44f1037f0c81c5a90a87caf16e2d362b50ce63a60556fdf5adc2732a8e1f9b693b6dfd3167970203a1ed1826acf1f8850137386408d01b691831f7412ee3d2f6f8faf72d7242d62eb4d55288a731e7a3f1b57c0940f54ef23160853e572f5348c71e7e678bbf1d949bcbfe66982b1d243d3a11d6d23230b85b4bbbc0961111bc16fe07c2a56814961b745e3ca047bfc68bd6aba88eea427fcb07b4ea123bc4637468035300612cbd511855869a3a2664"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5cb445d11a3786595100ced0dc61ab58b3ce6c488aa0e") [ 587.363429][T22355] loop1: detected capacity change from 0 to 5 [ 587.391873][T22355] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:57 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030007000000000002"], 0x60}}, 0x0) [ 587.592866][T22355] loop1: detected capacity change from 0 to 5 [ 587.629051][T22355] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:57 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) r2 = socket$pppl2tp(0x18, 0x1, 0x1) fchmod(r2, 0x90) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:05:57 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:05:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20050000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:05:58 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x35) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000040)={0xd5, 0x2}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x18000000000002e0, 0x28, 0x10000f0, &(0x7f00000004c0)="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", 0x0, 0x17, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4, &(0x7f0000000000), &(0x7f0000000080)}, 0x28) r2 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x40010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xf9b, 0x0, 0xfffc}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r2, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:05:58 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030008000000000002"], 0x60}}, 0x0) 23:05:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20060000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:05:58 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:05:58 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x41c1, 0x84010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8, 0xf8df, 0x7fff}, 0x0, 0xfffefffffffffffb, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x1) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:05:58 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030009000000000002"], 0x60}}, 0x0) [ 588.367572][T22390] loop1: detected capacity change from 0 to 5 [ 588.412848][T22390] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 588.473278][T22390] loop1: detected capacity change from 0 to 5 [ 588.506711][T22390] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:58 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:05:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20070000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:05:58 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) r2 = socket$pppl2tp(0x18, 0x1, 0x1) fchmod(r2, 0x90) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:05:59 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030017000000000002"], 0x60}}, 0x0) [ 588.909195][T22420] loop1: detected capacity change from 0 to 5 23:05:59 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x40) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x20, 0x6, 0x3, 0x0, 0x0, 0x81, 0x88000, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000000), 0x2}, 0x8cb0a, 0xcbb, 0xfff, 0x0, 0x9, 0x10000, 0x0, 0x0, 0x4, 0x0, 0x400}, r2, 0x3, r1, 0x2) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) ioctl$TCFLSH(r1, 0x540b, 0x2) [ 589.008045][T22420] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 589.182219][T22420] loop1: detected capacity change from 0 to 5 23:05:59 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) [ 589.233310][T22420] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:59 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20060000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:05:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20080000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:05:59 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030018000000000002"], 0x60}}, 0x0) [ 589.612961][T22448] loop0: detected capacity change from 0 to 5 [ 589.643520][T22448] EXT4-fs (loop0): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 589.664239][T22451] loop1: detected capacity change from 0 to 5 [ 589.695390][T22451] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:05:59 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:06:00 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b0001000003001a000000000002"], 0x60}}, 0x0) [ 589.914006][T22451] loop1: detected capacity change from 0 to 5 [ 589.923911][T22451] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:00 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:06:00 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005020000000002"], 0x60}}, 0x0) 23:06:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20090000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) [ 590.329567][T22471] loop1: detected capacity change from 0 to 5 [ 590.358772][T22471] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:00 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:06:00 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5") 23:06:00 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5cb445d11a3786595100ced0dc61ab58b3ce6") 23:06:00 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = fcntl$getown(r2, 0x9) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r5 = dup(r4) setsockopt$bt_rfcomm_RFCOMM_LM(r5, 0x12, 0x3, &(0x7f0000000040), 0x4) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x9, 0x20, 0x9, 0x0, 0x7, 0x4, 0x8, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6b89, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}, 0x4732, 0x8, 0xffff, 0x5, 0x100000001, 0x48, 0x5, 0x0, 0x3, 0x0, 0x3}, r3, 0xe, r5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400, 0x0, 0x1000000000}, 0x0, 0xffff000000000008, r5, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x4, 0x3, 0x7, 0x40, 0x0, 0x6, 0x0, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x4, 0x400, 0x8, 0x9, 0x7ff, 0x200, 0x3, 0x0, 0x7}, 0x0, 0x1, 0xffffffffffffffff, 0x1) sendfile(r0, r1, 0x0, 0x80006) perf_event_open(&(0x7f0000000740)={0x5, 0x80, 0x1f, 0x35, 0x7f, 0xff, 0x0, 0xfff, 0x1000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x5f60}, 0x12400, 0x7, 0xb638, 0x73821d4626fa47e7, 0x6, 0xb5a, 0x7, 0x0, 0x5, 0x0, 0x10000}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000000)={0x0, 0x5}, 0x8) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000100)={0x3, 0x80, 0xff, 0xa4, 0xf9, 0x10, 0x0, 0x8, 0x0, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xffff, 0x4, @perf_bp={&(0x7f0000000200), 0xa}, 0x44880, 0x3, 0x8, 0x2, 0x1, 0xacd, 0x3ff, 0x0, 0xdaf, 0x0, 0xffffffff}) ioctl$FIOCLEX(r0, 0x5451) writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000180)="0b1acf4915c066fe0e7d9a40667dfcadf917cd74568abb8dde4ae2ee48", 0x1d}, {&(0x7f00000001c0)="b7ff3704e747fb9672858b25793cc918a830aa4705f2a7fb8fc5cba0be55feb2f50794779c00ad6fe750a5fbe5920318ad9447c8", 0x34}, {&(0x7f00000002c0)="1f5ca4de96ff9c50d17c638b5226d33d6228465fdeffb3a3d3501ef8221efd267ec09a68a2220367b15823c31b6d0f670328ef6819d7ad46a9010636cf06fee42bfdf4cfc87bf89c4a6bde6d8e2e3f3e6d3b49b101b3ff7f9c71dea0e42035df72e31173f24c685fa929a0adee3da7651a8c2c5b4d52dbc4946c07aad739d37b11b809e7a5caf7a53f42e4bc0db0abb10880e9b2479e7b70b3b426a162c2b4c1ba4a55c08b55ef3d04a8d87bced3310466f0ea563b53b06e5908e51a8ddddb70c76c193a402bef5bdb90bd389298150db3fef001d545407fb3305478778637383fb329aea0d4", 0xe6}, {&(0x7f00000003c0)="562869dfea0cd0927a31a1ee57023997572d70dc15856af55bcbfbf9a0e90efd7b1b51a7c67243d9519eeb25b19608669985d235c39da854af55a304d2890b90a5fecc528a91f4342d849b1c969fe522055b183e26e95edaf9293ead8e8e1b8050a91196fd78e533bf1702bc1c1b7ba8bca86c57875bbde9faa0cb35c9cbccced0c97e946d3dbb5b86b4b258625f22e357310b2060b729994869e680e40eb155711d0df5b1b710dec4583ed6ae7f83cd529df67e98aaabf09b89fd3cc7245fc91787a7d22ac8fffc9cc5b743e611b92f9c76c6", 0xd3}, {&(0x7f00000004c0)="cab770fb71d4cb3bc3ec50475cce6cacff3c919fe4d0405c9da2d3bf6360ec436a0ed14bc880cd2f43be72177869d48d6fdb9c9a3c7abb83518320a7b3057a55c729c2456f3d442b2045b22776859c7c837873f50b61769c9608154890a73282ff2123338c3426dbcbc066d089ba7dbf341ada3a7a1d409ba1b4c15046d145318c84f9f82459719452db2999d2b43fd359452a9e24234091a7c81597", 0x9c}, {&(0x7f0000000580)="e39842d79dae01586cecf70b47fb932ac5bee52f597fcbe86c9e1dedc9eb9d9293bb7cf6ef56d55cca107b061a4d782fc7ba5288b182be2e2bb8b25ca8ec13f396e20dd29421b9ce4bc9efabbf2b25bdd617e6394c8ab03c46c0d0a8b86bc8080a3ae20d10b703ac46bbe3d04a65031d65b656e4cb49", 0x76}, {&(0x7f0000000600)="d030f3fb1e96a2e7beb8457944afc7e59be0878fcc140b9d4beaf7849366fb3de2f7e5147a3b1e9648ba305d25916af887fa5c9b7586367ebcb8131980c3edb284292acdb454610d43f092ad353751d27826c54ddb28bd3f35fe122509d174a68ffc14df4810f2b5ffe74388da4eb0376ef8dc2a3030dd15c407b69be77c5bab2ca9099a75e83aa9c9b4112597c50c4f", 0x90}, {&(0x7f0000001040)="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", 0x1000}], 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:06:00 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005030000000002"], 0x60}}, 0x0) [ 590.447951][T22471] loop1: detected capacity change from 0 to 5 [ 590.476649][T22471] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200a0000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) [ 590.764859][T22497] loop1: detected capacity change from 0 to 5 [ 590.793093][T22497] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:01 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:06:01 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005040000000002"], 0x60}}, 0x0) [ 590.942786][T22497] loop1: detected capacity change from 0 to 5 [ 590.953319][T22497] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:01 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5") 23:06:01 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000300000002"], 0x60}}, 0x0) 23:06:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200c0000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:01 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:06:01 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x30200, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@newtaction={0x14, 0x30, 0x20, 0x70bd27, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x20048001) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$snddsp_control(&(0x7f0000969000/0x2000)=nil, 0x1000, 0x0, 0x100010, r1, 0x83000000) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:06:01 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005002000000002"], 0x60}}, 0x0) [ 591.436395][T22522] loop1: detected capacity change from 0 to 5 [ 591.448861][T22522] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 591.503796][T22522] loop1: detected capacity change from 0 to 5 [ 591.536492][T22522] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:01 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:06:02 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005004003000002"], 0x60}}, 0x0) 23:06:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200d0000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:02 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5") 23:06:02 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x40) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000140)={0x4a43e3c4d38e9c3c, 0x80, 0x80, 0x0, 0x1f, 0x81, 0x0, 0xfffffffffffffffa, 0x14500, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000100), 0x8}, 0x8800, 0x2, 0xbfd, 0x8, 0x0, 0x0, 0x941, 0x0, 0x13bb, 0x0, 0xb6}, r3, 0xc, r2, 0x2) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getown(r4, 0x9) read$FUSE(0xffffffffffffffff, &(0x7f0000003080)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) wait4(r5, &(0x7f00000001c0), 0x4, &(0x7f0000000200)) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000080)=0x0) r7 = signalfd4(r1, &(0x7f00000000c0)={[0xad9]}, 0x8, 0x80000) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xff, 0x2, 0x8, 0x56, 0x0, 0x7, 0x400, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7f, 0x4, @perf_config_ext={0x1f, 0x6}, 0x300, 0x61, 0x8, 0x8, 0x5, 0x90, 0xc6, 0x0, 0x2dac, 0x0, 0xc54}, r6, 0xc, r7, 0x8c9ed7989685589a) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) [ 592.119810][T22551] loop1: detected capacity change from 0 to 5 [ 592.142178][T22551] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:02 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:06:02 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000340000002"], 0x60}}, 0x0) 23:06:02 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000), 0x464e43, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b144}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000826000/0x4000)=nil, 0x4000, 0x3000000, 0x50, 0xffffffffffffffff, 0x18d27000) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:06:02 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="6ebb5bc665f23aff7a20303000003030302c300600000000000001000080b3000d50318386db9f354337f5aa0a420b1e89d656b030a726016d3cce77fa28fe127149c6e137e4d5e1ba1763fe4ad3d8c7dea11413fbed9cec51bcdff4ca3a0287647f7c4bb6bb86be778997156e000015a5471425dea15b7e8ffd366f569ed595d14b0e8749e644ca0a4fbec51a9ec09ab870467533bc94a8471baba2170e706e5dde8d648992575d1ae2aa200c11066b6dc7c35c0d5db17aabbeee0b46a01297f2293087f43708000000000000000000e8b7fafbdec4813fcce5f4c1bf9413538602d3b8fff31277d6bc880fa1bae503101230fa21fdec5dc68f44f1037f0c81c5a90a87caf16e2d362b50ce63a60556fdf5adc2732a8e1f9b693b6dfd3167970203a1ed1826acf1f8850137386408d01b691831f7412ee3d2f6f8faf72d7242d62eb4d55288a731e7a3f1b57c0940f54ef23160853e572f5348c71e7e678bbf1d949bcbfe66982b1d243d3a11d6d23230b85b4bbbc0961111bc16fe07c2a56814961b745e3ca047bfc68bd6aba88eea427fcb07b4ea123bc4637468035300612cbd511855869a3a2664"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5") 23:06:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200f0000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) [ 592.547675][T22567] loop1: detected capacity change from 0 to 5 [ 592.702713][T22567] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 592.813878][T22567] loop1: detected capacity change from 0 to 5 [ 592.824308][T22567] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:03 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x30200, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@newtaction={0x14, 0x30, 0x20, 0x70bd27, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x20048001) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap$snddsp_control(&(0x7f0000969000/0x2000)=nil, 0x1000, 0x0, 0x100010, r1, 0x83000000) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:06:03 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000010002"], 0x60}}, 0x0) 23:06:03 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:06:03 executing program 0: seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000080)=0x1000) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) r2 = syz_open_dev$vcsn(&(0x7f0000000000), 0x7, 0x200800) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000040)={0x0, 0x101}, 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:06:03 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r2, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newqdisc={0x38, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8}, {0xc, 0x2, [@TCA_HHF_RESET_TIMEOUT={0x8, 0x4, 0xfffffffc}]}}]}, 0x38}}, 0x0) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000080)={0x27, 0x1, 0x8f1, 0x2, 0xef, 0x9, "5c0414935b7db161ae63b52a0e4556c07d26082503f5d14585be54b24a4cd8fd52957ecb612af9d93176f8b32628555077437651c92b8fc823bd39b12eaf76", 0xb}, 0x60) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r4 = dup(r3) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) dup(r5) r6 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T1(r6, 0x103, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_netrom_SIOCADDRT(r6, 0x890b, &(0x7f0000000100)={0x1, @default, @netrom={'nr', 0x0}, 0x9, 'syz0\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x6, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}) sendfile(r6, r4, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r4, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r3, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:06:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20100000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:03 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000020002"], 0x60}}, 0x0) [ 593.208566][T22594] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 23:06:03 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) [ 593.392677][T22602] loop1: detected capacity change from 0 to 5 [ 593.514506][T22602] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:03 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000030002"], 0x60}}, 0x0) [ 593.715057][T22602] loop1: detected capacity change from 0 to 5 [ 593.750795][T22602] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 593.756893][T22599] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 23:06:04 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) 23:06:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20110000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:04 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000040002"], 0x60}}, 0x0) 23:06:04 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000), 0x464e43, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b144}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000826000/0x4000)=nil, 0x4000, 0x3000000, 0x50, 0xffffffffffffffff, 0x18d27000) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:06:04 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e") 23:06:04 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000000)=0xdb, 0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) [ 594.144068][T22624] loop1: detected capacity change from 0 to 5 [ 594.291875][T22624] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:04 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000200002"], 0x60}}, 0x0) [ 594.461980][T22624] loop1: detected capacity change from 0 to 5 23:06:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r2, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newqdisc={0x38, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8}, {0xc, 0x2, [@TCA_HHF_RESET_TIMEOUT={0x8, 0x4, 0xfffffffc}]}}]}, 0x38}}, 0x0) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000080)={0x27, 0x1, 0x8f1, 0x2, 0xef, 0x9, "5c0414935b7db161ae63b52a0e4556c07d26082503f5d14585be54b24a4cd8fd52957ecb612af9d93176f8b32628555077437651c92b8fc823bd39b12eaf76", 0xb}, 0x60) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r4 = dup(r3) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) dup(r5) r6 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T1(r6, 0x103, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_netrom_SIOCADDRT(r6, 0x890b, &(0x7f0000000100)={0x1, @default, @netrom={'nr', 0x0}, 0x9, 'syz0\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x6, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}) sendfile(r6, r4, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r4, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r3, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) [ 594.561264][T22624] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:04 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) [ 594.670667][T22647] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 23:06:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20480000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:05 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005fffffffb0002"], 0x60}}, 0x0) 23:06:05 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r2, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newqdisc={0x38, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8}, {0xc, 0x2, [@TCA_HHF_RESET_TIMEOUT={0x8, 0x4, 0xfffffffc}]}}]}, 0x38}}, 0x0) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000080)={0x27, 0x1, 0x8f1, 0x2, 0xef, 0x9, "5c0414935b7db161ae63b52a0e4556c07d26082503f5d14585be54b24a4cd8fd52957ecb612af9d93176f8b32628555077437651c92b8fc823bd39b12eaf76", 0xb}, 0x60) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r4 = dup(r3) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) dup(r5) r6 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T1(r6, 0x103, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_netrom_SIOCADDRT(r6, 0x890b, &(0x7f0000000100)={0x1, @default, @netrom={'nr', 0x0}, 0x9, 'syz0\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x6, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}) sendfile(r6, r4, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r4, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r3, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:06:05 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b000100000300057fffffff0002"], 0x60}}, 0x0) [ 595.171536][T22662] loop1: detected capacity change from 0 to 5 [ 595.234651][T22662] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:05 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) [ 595.355954][T22666] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 23:06:05 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) r2 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x180, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) [ 595.404022][T22662] loop1: detected capacity change from 0 to 5 23:06:06 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005fbffffff0002"], 0x60}}, 0x0) 23:06:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="204c0000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:06 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000000)=0xdb, 0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:06:06 executing program 4: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) [ 596.180096][T22691] loop1: detected capacity change from 0 to 5 [ 596.260679][T22691] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:06 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000200000002"], 0x60}}, 0x0) 23:06:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r2, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newqdisc={0x38, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8}, {0xc, 0x2, [@TCA_HHF_RESET_TIMEOUT={0x8, 0x4, 0xfffffffc}]}}]}, 0x38}}, 0x0) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000080)={0x27, 0x1, 0x8f1, 0x2, 0xef, 0x9, "5c0414935b7db161ae63b52a0e4556c07d26082503f5d14585be54b24a4cd8fd52957ecb612af9d93176f8b32628555077437651c92b8fc823bd39b12eaf76", 0xb}, 0x60) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r4 = dup(r3) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) dup(r5) r6 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T1(r6, 0x103, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_netrom_SIOCADDRT(r6, 0x890b, &(0x7f0000000100)={0x1, @default, @netrom={'nr', 0x0}, 0x9, 'syz0\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x6, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}) sendfile(r6, r4, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r4, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r3, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) [ 596.472276][T22691] loop1: detected capacity change from 0 to 5 [ 596.498791][T22691] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:06 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000300000002"], 0x60}}, 0x0) [ 596.679309][T22708] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 23:06:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20600000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:07 executing program 4: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 23:06:07 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000400000002"], 0x60}}, 0x0) [ 597.171072][T22720] loop1: detected capacity change from 0 to 5 23:06:07 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f0000000040)) [ 597.254254][T22720] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:07 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), 0x0) [ 597.426437][T22720] loop1: detected capacity change from 0 to 5 [ 597.503681][T22720] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:07 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000003000002"], 0x60}}, 0x0) 23:06:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20680000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:08 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000020000002"], 0x60}}, 0x0) 23:06:08 executing program 4: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="6ebb5bc665f23aff7a20303000003030302c300600000000000001000080b3000d50318386db9f354337f5aa0a420b1e89d656b030a726016d3cce77fa28fe127149c6e137e4d5e1ba1763fe4ad3d8c7dea11413fbed9cec51bcdff4ca3a0287647f7c4bb6bb86be778997156e000015a5471425dea15b7e8ffd366f569ed595d14b0e8749e644ca0a4fbec51a9ec09ab870467533bc94a8471baba2170e706e5dde8d648992575d1ae2aa200c11066b6dc7c35c0d5db17aabbeee0b46a01297f2293087f43708000000000000000000e8b7fafbdec4813fcce5f4c1bf9413538602d3b8fff31277d6bc880fa1bae503101230fa21fdec5dc68f44f1037f0c81c5a90a87caf16e2d362b50ce63a60556fdf5adc2732a8e1f9b693b6dfd3167970203a1ed1826acf1f8850137386408d01b691831f7412ee3d2f6f8faf72d7242d62eb4d55288a731e7a3f1b57c0940f54ef23160853e572f5348c71e7e678bbf1d949bcbfe66982b1d243d3a11d6d23230b85b4bbbc0961111bc16fe07c2a56814961b745e3ca047bfc68bd6aba88eea427fcb07b4ea123bc4637468035300612cbd511855869a3a2664"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) [ 598.234356][T22748] loop1: detected capacity change from 0 to 5 23:06:08 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="6ebb5bc665f23aff7a20303000003030302c300600000000000001000080b3000d50318386db9f354337f5aa0a420b1e89d656b030a726016d3cce77fa28fe127149c6e137e4d5e1ba1763fe4ad3d8c7dea11413fbed9cec51bcdff4ca3a0287647f7c4bb6bb86be778997156e000015a5471425dea15b7e8ffd366f569ed595d14b0e8749e644ca0a4fbec51a9ec09ab870467533bc94a8471baba2170e706e5dde8d648992575d1ae2aa200c11066b6dc7c35c0d5db17aabbeee0b46a01297f2293087f43708000000000000000000e8b7fafbdec4813fcce5f4c1bf9413538602d3b8fff31277d6bc880fa1bae503101230fa21fdec5dc68f44f1037f0c81c5a90a87caf16e2d362b50ce63a60556fdf5adc2732a8e1f9b693b6dfd3167970203a1ed1826acf1f8850137386408d01b691831f7412ee3d2f6f8faf72d7242d62eb4d55288a731e7a3f1b57c0940f54ef23160853e572f5348c71e7e678bbf1d949bcbfe66982b1d243d3a11d6d23230b85b4bbbc0961111bc16fe07c2a56814961b745e3ca047bfc68bd6aba88eea427fcb07b4ea123bc4637468035300612cbd511855869a3a2664"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), 0x0) [ 598.287683][T22748] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:08 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), 0x0) 23:06:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="206c0000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:08 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000040030002"], 0x60}}, 0x0) [ 598.648364][T22763] loop1: detected capacity change from 0 to 5 [ 598.764098][T22763] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:09 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0x1) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000040)) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:06:09 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000003400002"], 0x60}}, 0x0) [ 598.931735][T22763] loop1: detected capacity change from 0 to 5 23:06:09 executing program 4: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) [ 599.036677][T22763] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:09 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), 0x0) 23:06:09 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), 0x0) 23:06:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20740000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:09 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000102"], 0x60}}, 0x0) [ 599.550056][T22792] loop1: detected capacity change from 0 to 5 [ 599.652578][T22792] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:10 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000202"], 0x60}}, 0x0) [ 599.784482][T22792] loop1: detected capacity change from 0 to 5 [ 599.828329][T22792] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:10 executing program 4: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="6ebb5bc665f23aff7a20303000003030302c300600000000000001000080b3000d50318386db9f354337f5aa0a420b1e89d656b030a726016d3cce77fa28fe127149c6e137e4d5e1ba1763fe4ad3d8c7dea11413fbed9cec51bcdff4ca3a0287647f7c4bb6bb86be778997156e000015a5471425dea15b7e8ffd366f569ed595d14b0e8749e644ca0a4fbec51a9ec09ab870467533bc94a8471baba2170e706e5dde8d648992575d1ae2aa200c11066b6dc7c35c0d5db17aabbeee0b46a01297f2293087f43708000000000000000000e8b7fafbdec4813fcce5f4c1bf9413538602d3b8fff31277d6bc880fa1bae503101230fa21fdec5dc68f44f1037f0c81c5a90a87caf16e2d362b50ce63a60556fdf5adc2732a8e1f9b693b6dfd3167970203a1ed1826acf1f8850137386408d01b691831f7412ee3d2f6f8faf72d7242d62eb4d55288a731e7a3f1b57c0940f54ef23160853e572f5348c71e7e678bbf1d949bcbfe66982b1d243d3a11d6d23230b85b4bbbc0961111bc16fe07c2a56814961b745e3ca047bfc68bd6aba88eea427fcb07b4ea123bc4637468035300612cbd511855869a3a2664"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), 0x0) 23:06:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="207a0000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:10 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), 0x0, &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5cb445d11a3786595100ced0dc61ab58b3ce6c488aa0ebf") 23:06:10 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), 0x0, &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5cb445d11a3786595100ced0dc61ab58b3ce6c488aa0ebf") [ 600.256333][T22816] loop1: detected capacity change from 0 to 5 [ 600.376635][T22816] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:10 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) syz_io_uring_setup(0x87, &(0x7f0000000240), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000604000/0x4000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000080)=0x0) r4 = pidfd_getfd(r1, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r4, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000002c0)={&(0x7f00000000c0)={0x148, 0x0, 0x10, 0x70bd2c, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x400}, @TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x70}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x401}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xd83}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x81de}]}]}, @TIPC_NLA_NET={0x40, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3f}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8000}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x100}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}]}, @TIPC_NLA_SOCK={0x48, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x862d}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_CON={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x3}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x54ee}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x6}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x400}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x4}]}]}, @TIPC_NLA_MEDIA={0x70, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x351}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x24004000}, 0x48080) r5 = socket(0x40000000015, 0x5, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x0, 0x0}, 0x0) syz_io_uring_submit(r2, 0x0, &(0x7f0000000000)=@IORING_OP_FALLOCATE={0x11, 0x5, 0x0, @fd_index=0x6, 0xffffffff80000000, 0x0, 0x0, 0x0, 0x1}, 0x18c) 23:06:10 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000302"], 0x60}}, 0x0) [ 600.539054][T22816] loop1: detected capacity change from 0 to 5 [ 600.631939][T22816] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:10 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000402"], 0x60}}, 0x0) 23:06:10 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) readv(r0, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/145, 0x91}, {&(0x7f00000000c0)=""/138, 0x8a}, {&(0x7f0000000180)=""/7, 0x7}], 0x3) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:06:11 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", 0x0, &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5cb445d11a3786595100ced0dc61ab58b3ce6c488aa0ebf") 23:06:11 executing program 4: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)='a', &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5cb445d11a3786595100ced0dc61ab58b3ce6c488aa0ebf") 23:06:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20fe0000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:11 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000002002"], 0x60}}, 0x0) [ 601.313874][T22848] loop1: detected capacity change from 0 to 5 [ 601.377526][T22848] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 601.558183][T22848] loop1: detected capacity change from 0 to 5 [ 601.592668][T22848] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000300000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:11 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", 0x0, &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5cb445d11a3786595100ced0dc61ab58b3ce6c488aa0ebf") 23:06:11 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:06:12 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b0001000003000500fffffffb02"], 0x60}}, 0x0) [ 601.896292][T22864] loop1: detected capacity change from 0 to 5 23:06:12 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) 23:06:12 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) readv(r0, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/145, 0x91}, {&(0x7f00000000c0)=""/138, 0x8a}, {&(0x7f0000000180)=""/7, 0x7}], 0x3) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) [ 601.960891][T22864] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:12 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005007fffffff02"], 0x60}}, 0x0) [ 602.155709][T22864] loop1: detected capacity change from 0 to 5 [ 602.245152][T22864] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:12 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", 0x0, &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5cb445d11a3786595100ced0dc61ab58b3ce6c488aa0ebf") 23:06:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000500000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:12 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b0001000003000500fbffffff02"], 0x60}}, 0x0) 23:06:12 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) syz_io_uring_setup(0x87, &(0x7f0000000240), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000604000/0x4000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000080)=0x0) r4 = pidfd_getfd(r1, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r4, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000002c0)={&(0x7f00000000c0)={0x148, 0x0, 0x10, 0x70bd2c, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x400}, @TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x70}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x401}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xd83}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x81de}]}]}, @TIPC_NLA_NET={0x40, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3f}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8000}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x100}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}]}, @TIPC_NLA_SOCK={0x48, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x862d}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_CON={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x3}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x54ee}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x6}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x400}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x4}]}]}, @TIPC_NLA_MEDIA={0x70, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x351}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x24004000}, 0x48080) r5 = socket(0x40000000015, 0x5, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000340)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x0, 0x0}, 0x0) syz_io_uring_submit(r2, 0x0, &(0x7f0000000000)=@IORING_OP_FALLOCATE={0x11, 0x5, 0x0, @fd_index=0x6, 0xffffffff80000000, 0x0, 0x0, 0x0, 0x1}, 0x18c) [ 602.974658][T22899] loop1: detected capacity change from 0 to 5 [ 603.085196][T22899] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:13 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000001"], 0x60}}, 0x0) [ 603.228685][T22899] loop1: detected capacity change from 0 to 5 [ 603.378641][T22899] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:13 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 23:06:13 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5cb445d11a3786595100ced0dc61ab58b3ce6c488aa0ebf") 23:06:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000600000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:13 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000002000002"], 0x60}}, 0x0) 23:06:14 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000000)={0x6, 0x8}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r1, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x42000}, 0xc, &(0x7f0000000200)={&(0x7f0000000080)={0x158, 0x0, 0x200, 0x70bd2d, 0x25dfdbfc, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x3}, {0x6, 0x11, 0x20}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x3}, {0x6, 0x11, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x3}, {0x6, 0x11, 0x40}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x5576c9c4}, {0x6, 0x11, 0x7}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x8}, {0x6, 0x11, 0x1}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x7}, {0x6, 0x11, 0x1}}, {@pci={{0x8}, {0x11}}, {0x8}, {0x6, 0x11, 0x7}}]}, 0x158}, 0x1, 0x0, 0x0, 0x1}, 0x408c) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:06:14 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="6ebb5bc665f23aff7a20303000003030302c300600000000000001000080b3000d50318386db9f354337f5aa0a420b1e89d656b030a726016d3cce77fa28fe127149c6e137e4d5e1ba1763fe4ad3d8c7dea11413fbed9cec51bcdff4ca3a0287647f7c4bb6bb86be778997156e000015a5471425dea15b7e8ffd366f569ed595d14b0e8749e644ca0a4fbec51a9ec09ab870467533bc94a8471baba2170e706e5dde8d648992575d1ae2aa200c11066b6dc7c35c0d5db17aabbeee0b46a01297f2293087f43708000000000000000000e8b7fafbdec4813fcce5f4c1bf9413538602d3b8fff31277d6bc880fa1bae503101230fa21fdec5dc68f44f1037f0c81c5a90a87caf16e2d362b50ce63a60556fdf5adc2732a8e1f9b693b6dfd3167970203a1ed1826acf1f8850137386408d01b691831f7412ee3d2f6f8faf72d7242d62eb4d55288a731e7a3f1b57c0940f54ef23160853e572f5348c71e7e678bbf1d949bcbfe66982b1d243d3a11d6d23230b85b4bbbc0961111bc16fe07c2a56814961b745e3ca047bfc68bd6aba88eea427fcb07b4ea123bc4637468035300612cbd511855869a3a2664"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) [ 603.934508][T22926] loop1: detected capacity change from 0 to 5 23:06:14 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000003000002"], 0x60}}, 0x0) [ 604.003312][T22926] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 604.125128][T22926] loop1: detected capacity change from 0 to 5 [ 604.190512][T22926] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:14 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) 23:06:14 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) 23:06:14 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000004000002"], 0x60}}, 0x0) 23:06:14 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000050e40)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000002c0)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0x0, "3ebbbcb5d60c17"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f000005ea40)={0x0, 0x0, "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", "b59355e65873dfbc880aa38a67f3b23b082cce7813eca459c8bf93bb06919097d2e32a9149ea8640d82fa20c4e0f79f23f4417caf700c66af0f2e582fb50a227c3c5aa754ea881b8a444fbce4d92cec771851550bc20b69a0390c0012e2633d0690c7c464d94b3631506a056f4614b5df37178227cba62d62b059063f5b78807ca23755ee15a18678a0297ff429cb9f05f854568550a931cafb2479ac38e5ecc5a1582198146a2e6ff2224903d5fe23907320361c8341439c855dcd9758bc0aff4f95043739032a5f587ff1d8b5a7a1217910b94005e1f15160146db9d29bc977f6ccd2f392a925c9b92768e8e97a9e5ad8687ee1eb569ee86b424e359b190568fff17b0ac8dcd58f3460e4a49d1b9dc2352c9881dd2d6ffa1cb358694991f593197efe5a2f81bdc7234cf9f26f0a462be9fc25e2d2f0257a59e069577e103668fcb35ebda52883ca496ece78ce9c1d88c5d451b11c3e3654c0a0a4e1f102a8ec4605c7fed33e1fe77a1bc2092704a069e9bff35a3d790dace80c1338e5671cf7558ef73c28999ad1dbbff3e1c6939376ccf3f9ea79fbef8dff0cb17e3db107f996ec8ab58af8b409a2c7bc16c3d453451db56170b9dfbc313be2ec74861b54a0630cc9fc585cfc4cc3a6006aa70802c071a82274d378e71aa94374403358425ba01c2b9b8fb9990f5b783873f8b2a0f222b62e7211c3a9964c1ad6a4fd2c5d54923c7ea5eccea7e42bfb69ca80883cd5d944fd2f388f67fd0b7c531c916afdcc2537a4beee3632185ad14bd873425adb37482660ced11efd6e7377fd5614d8f1b77892d7236ee691512225dfb4a7dc195d7a7026600982ed61513b82b0836776be1449e8ef0806b70ef947242d14b33ba92d86f6c918daabe0b5cc3b222071de9c82d491f2918690a708d10430848b0138c23e77389f38a9f033dfa8fbe91fcfc16448e462958633ddabf19a9b2a28105afbf85cb0f498fd15a2daae79f0daf41ce22a4abbe0010cab414222994bea8bc7e53485a275bfbca5c9e56be32774b4f7c796382669e197341947ae1bd25e4aaff6a17c34c1749423c5246169e578525a545e42dc30339bb8951ebca310ccd074c858f1e7306b3d31e992c2869b878c7add7c363252eeb06d0d5518b4329c76dcee77aaa0ef87922cb89b2e644cca51a80a4bb909e4aad814c75c6167e46fb15a266a7e3db25751d3af67b0e8ca10dc1ad87539033588c75e45f5c8ae5e459c9356a617064f02136a575280b612b7dcaa9787b68886d00de8dab83b35785c5bdac275a782181bd07100604f2466fd87c4978fe39fbc598218ceacae451961d5a423156512a8fa56d4729de2ad44067e2612fadb9ad0ec1308d7bc01a32a6ac4a4004c57b3c99ce908ce8a3789a633401abf116d1f4d479b6ca9bbac0f76ae41b8f1a2003415f7e0a3f597755f13cbf5373aac3c64f8cb275befdbe835cd3a9607bbc5081288716f8ea509a4c807c12fed4ec4a15ee38d2ed3425439ca995c09349d525fbf297d97f3d14d9871068e3c92f87a076439eee31a553c93d1153eed07d68c5d8cb37ae6e2fb7c499dc53901edd8dc574ce5a6734d4d69e849259fea1107f7bdc86b328443a16287339c2a7ac44815845d48575cf4b63fd5d310fdff24d0f8469797744e7160c80e400e6a03d46d99991678b97cf2a6d024f700804af234bdffed22a9bad344516d21ac802fe9ee0bf47d196009401b96bb07507fbf9bbd19c3f4657cccc8d502de2224f8f75778923ef94a6a33f1e9c2bacc14b76c12593649fc57e747df4c52b7851f467fa601d614a5ba49c59c9590329f873426f12f976d210de5d0ca369e55d910b14788220670f823952cb0d0d792e0b293890511c477271e9022f8b8be37614f4e53d0cac578c9a0b0b1b13b8f596adf413e333474bec8d8de12b83eb69679596789315619688db05f337bf1a82f6a5a95bdda46cab397a812e86ce00ff083c0b21ac79d4e3a10a71baf8198ca16c9c01307594bf2b673e4da84158fe494129d6295f9609a022b326f9915ddd23fe2bfbfb43a4eebd74b6dca8d1c6a57c8ef07dc9b23676dc12575e9f800d91cffcb77491386800502437f3cda50a2ac5cddcf3d2a471373924ac4636597810048467e80d3c9cd102457151adb346238f721c99c7c03923cc60655d9f0167bea97c0f6e4ea92bb66f8cd90012e382a783d7695f55a39fbfb224e1d10feb87638317033d56557c489ca4a850cadeb3b18614913f2ae48167ee3c47eaa0cccb464bdbe1f81074582caf99eb18164a748a0de7d26d47878ef60e9b793f02a029426fc53a3ef6f44f66e2be10f2fede885a660272b7a72fcaee829a714d6e62ab119da89dfc9e6a819fd0d538e4f1f70df213b2d480ca60fd34356f062d7f4e94213c5a9518a6a6c85be26c5a619528492176ff52bb1ad8d06a628bcf1e117da765290fe8ef1eda31b25362c580a2da97350409be5e21d6b9c14524a9adc218080888f6dcbbe51fb4f5a0b39cf12e4d66f8f5056a0826531535626ad00821d7214973ff7b2148eb0c19229e8a000bd4477e91c444126ded8aebfd4022da95149cee58f9df645810753bfef97bad9e9c3cb546a66793b3cddfa038304a4b90e87bdf5d476008005077e507b3babc679491f6be9ccf49f37092b9770b3d8872dfa377b3055a15dd5a8004c91e79d64ca6090ea001d14fb67915b77564f862be0beb0288712bab47f94c1161f384737cfaee8f88b29d8339aa16d92b6ae143ff04b00389c1a7e863fda74920c3fce858023afe88d1f00eacbc085ee4be714e995542cb181ca9ad98be457ca3dd0cfda4df7ea76d661a099b97af15535dd47f79bc6638a2a10aeed3b595e528847252ef1a175249b2cc061b7c29551753da95838b2a8af62000664bcb41d3aa194779d9e77d9dd7637c44d37f62e82b79fd2a811866167a4838d64ad5eddb0f3533ef80a03e62bb34ecb109c947ae60ab40b20716ad4039ad8f74cf4f9fe2e5a981f8fed70c0a5279e128c83a7344466c115abdcf533b73cd0b1ef31f270146510b506bf587264e1d64afb97c1a3328aaf088c2d4098d25a33e27a433c2b15b1db5c24072bc711619b15690c9613a4da8de24404740396a69abadf792d7c6721783f78e738fbdea5c2eef6ff1f4b6e49903ff888145a9c4c310e702fb23ea1df5b06f2c21afa9ce8ad451dc62adc716142a7b6050f11c4f0b62b8731d367fea8c41c57786af7aeb7721d44ed1e9ca542fb1f1a0833c53addfca73ade3d70bc272b56fbeccada18949db1b3e1b35a45e7a3759f6814ca6acc0539b1f0532b54bf1faa004194e6b2038a65aad03973300b8e3f60888a8c75898f0d2d1bebfe862fc9d6eff6e0fa245a3b6b5c7e585024cb5b2a2cf20207f09cd9b2a13d45396e3d16d1c2f044de4ffb8e0780b7d0a2542682ba16408e3e01f2e82bdc02eb8192da4588f25fe8a4f338c37f2f583d3fbe1a66946aabc511ab97722b2a608af68ee086446b9d13effd53ab39e1d8a4c4ed1b09ff6d631eb43c245710b49f0f5bdd55e704fa5928fe5ab9512c66018b3984f15576f7b1823371bfa361b4a29740ebb9a88a6764ee07aceec8e9c628af662eacbcf41ca288a383b925f84d2f61a0a8d511709f4da82c5249ded7730b541bcc934c04ec50198c5bd33f674da8497d8816b77dc387428ba0dc7caef33cf1a85131f71735c6a51f00c2b277a0f42e8bfb7720bd2111fdbf279249e0b4efa14d73c3c9220fa29f806c24609018009b8301c942f8b8a4dbdf8e385126eaa76bd7f10e0fbee35951bc72c388e2a4df958195a7657ab41a36a9f140ce08b8708dd19c56d5660a5d23fc3fdc20107419565b8a4629e671db7c6a3949a9feaed1a4cf5d4006322150d0cb1cde059a6bd448b929fdd000beb5e583a6127f42a8864241e68c5e73224af1fb489e9bdb7f923c90fb605d798e137893a51cc50c6e5ab64c2b799bfc8edb6874be37a99852f3951697a6ec35db55ae575946981cf76c6acffa49051a08a398446883485f07253a05fb17aa4ed7074aa67509184d3d6874caeedabe7d72d2a9178c5707f3d0c6a4e041155e5e9fa0ce53d682e00764bf90d3def6964ab564d7388d144984bef2606d649f1ac50eda7cb824f9e62481db5ae17aa54ed250cd6f46ab936213173dc2b08710a80ff0783003c00d3923c2ee42c58d23e6c6034e96ac33705deb14a46f03f1662dc56cfb5758467b378c8edc798b26e57056e873e36cf712fc5b3bf40b02fc6411d922763f10c69ad586523c769cefaca7e6414ce3e7868e3e4b558417d52c3c1540c31aefe5341c0dbb33bcd1eaab51f4c8254335243b2737ff7ce941352cb1cdf789a2bb65c859718b7107b88231a1a64998fa09ea8ba0675cbc06c84815d15e0f6321a1e2fdc9bfbe50826ecef7409e91f0593acc66186adcefc4b96074876525d260da46064530de2c803cc39d0e196b011844420cfc7b3d26c66049b8f07735885d8129726bebbc80131e2cf0a0a407151866d89b545123ccdb58e2f822230269a35910131832654018d623e28e27ddd6a59740d67274da27e17a4e4cbdd107d7f0fdce4e7d6112cac5e1d2c7ca883d77fc7bb37cb71b4f8d2a6f7b4469de28fbb45371955839d6f297cc0c010c1305227432b1e45f8d7a65e7be1c4445275c0077e6e5384486f6cbd365a42c01a22fadf7072fc1642c81d48a085c30c54876a391bd6e6de515e6c111b89e8532e3ef585a7dd833ddf3dd6fc9c0d27001b254ff8e7daffcfaf30fd2fe58aed47444705a652cfa7199a53f509d135a2f54ba2ca578fcefd93b24c937a600d4ea1073e3f14ad5888dafed93c1b196d47a7933e4b0bf7f9d98a519729991965a82be0a7fe910a1f9bccabae2e1ca1909449aff7b0e6fcedbd1b3919e8c419637cdb69f95d502bad5671b1c133be4f9274930ecc77e94f96dc3b679e989c8b54944e2f8967caf398ad2980210052b335671e29f9717f4b4a0ad52dbad2ae80bda20833c3ef66afb0f05076b5114b558531ca91c138d5287f2bf1d734058b8bd4b403b1b2aaa97242a55863fab9b2ae7570a59d70f1b054f4d9af8e0bb6e4e053f41a12c20fa86fea4715a3051eadc14b502970c0665877b346309644619e656a07f27f80391e376042e2b464893ead374eaf9c5178b4a4a51068f54d8ec2277bebc241cef7fda9d2807112a91b278db3d86a8080d96bca0ade1ff3b5e9b7a43c87610b2dceeba99fb4dfff1c58951e9bc3bd0cd7da18b039fc37c891b7550891049e33cefd4492c24e43c80815335b20abf22dc71f6bf58b12a97e9389378b8962552abedefc2e6f66a4ee390bffa027e49bc1870e40dd8abe6ce4492232358340715e9a4bf7ecd40050e86a8787"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)={0x0, ""/256, 0x0, 0x0}) r8 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r8, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r8, 0x81f8943c, &(0x7f0000050e40)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000002c0)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {0x0, r7}], 0x0, "3ebbbcb5d60c17"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000005fa40)={0x5, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {r6}], 0xff, "a87b66d79de5b7"}) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:06:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000700000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:14 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000030002"], 0x60}}, 0x0) 23:06:15 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) [ 604.786719][T22955] loop1: detected capacity change from 0 to 5 23:06:15 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) [ 604.891712][T22955] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 604.949054][T22955] loop1: detected capacity change from 0 to 5 [ 605.044538][T22955] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:15 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000200002"], 0x60}}, 0x0) 23:06:15 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fcntl$getown(r1, 0x9) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r4 = dup(r3) setsockopt$bt_rfcomm_RFCOMM_LM(r4, 0x12, 0x3, &(0x7f0000000040), 0x4) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x9, 0x20, 0x9, 0x0, 0x7, 0x4, 0x8, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6b89, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}, 0x4732, 0x8, 0xffff, 0x5, 0x100000001, 0x48, 0x5, 0x0, 0x3, 0x0, 0x3}, r2, 0xe, r4, 0x0) ioctl$BLKZEROOUT(r4, 0x127f, &(0x7f0000000040)={0xa6c5, 0x9}) r5 = socket$bt_cmtp(0x1f, 0x3, 0x5) mmap(&(0x7f0000012000/0x4000)=nil, 0x4000, 0x1, 0x40010, r5, 0xc5718000) r6 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x4c, 0x0, 0x0, 0x20, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r6, 0x0, 0x80006) ioctl$int_out(r0, 0x2, &(0x7f0000000000)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r6, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:06:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000900000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:15 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) 23:06:15 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b0001000003000500000000000a"], 0x60}}, 0x0) 23:06:15 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000017"], 0x60}}, 0x0) [ 605.793807][T22983] loop1: detected capacity change from 0 to 5 23:06:16 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) [ 605.901601][T22983] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:16 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000000)={0x6, 0x8}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r1, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x42000}, 0xc, &(0x7f0000000200)={&(0x7f0000000080)={0x158, 0x0, 0x200, 0x70bd2d, 0x25dfdbfc, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x3}, {0x6, 0x11, 0x20}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x3}, {0x6, 0x11, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x3}, {0x6, 0x11, 0x40}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x5576c9c4}, {0x6, 0x11, 0x7}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x8}, {0x6, 0x11, 0x1}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x7}, {0x6, 0x11, 0x1}}, {@pci={{0x8}, {0x11}}, {0x8}, {0x6, 0x11, 0x7}}]}, 0x158}, 0x1, 0x0, 0x0, 0x1}, 0x408c) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:06:16 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000020002"], 0x60}}, 0x0) [ 606.097021][T22983] loop1: detected capacity change from 0 to 5 23:06:16 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) [ 606.207212][T22983] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:16 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) 23:06:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000a00000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:16 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000030002"], 0x60}}, 0x0) 23:06:16 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000000)) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x0, 0x6, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}) r2 = dup(r1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x13, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x800, 0x2, 0x0, 0xb1f8a018c661eead, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x9, 0xffffffffffffffff, 0xb) r3 = syz_open_dev$media(&(0x7f0000000040), 0x4, 0x40101) sendfile(r3, r2, 0x0, 0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r2, 0x0) sendfile(0xffffffffffffffff, r2, &(0x7f0000000140)=0x2, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) write$binfmt_misc(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="73797a301b5d9316b2c1ab74cd722cf98c8a1cb55e57cb59db6af4867e28523aef2aae27016dc55e611b932ca17f5a3ba7ea2e14341981425ee0a5cffc29072ac6741e56b2c8fa064c666ee829f9ed2f6f253dd7dfbd99f5e9ac6a8c8e934afac9bad4799b8a1c2cb06f8cbc93467edb6993a3364a5ea9d3cd85967db353bdd44afc279fc66d2ba1dda69324a8e21d038a1eb7054f424378b040fd3fe5fb22aae51240e6cd23423591bdcf0522bd27eb293c95d0e25bd8d60e33160493fbdaff"], 0xc0) 23:06:17 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fcntl$getown(r1, 0x9) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r4 = dup(r3) setsockopt$bt_rfcomm_RFCOMM_LM(r4, 0x12, 0x3, &(0x7f0000000040), 0x4) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x9, 0x20, 0x9, 0x0, 0x7, 0x4, 0x8, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6b89, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}, 0x4732, 0x8, 0xffff, 0x5, 0x100000001, 0x48, 0x5, 0x0, 0x3, 0x0, 0x3}, r2, 0xe, r4, 0x0) ioctl$BLKZEROOUT(r4, 0x127f, &(0x7f0000000040)={0xa6c5, 0x9}) r5 = socket$bt_cmtp(0x1f, 0x3, 0x5) mmap(&(0x7f0000012000/0x4000)=nil, 0x4000, 0x1, 0x40010, r5, 0xc5718000) r6 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x4c, 0x0, 0x0, 0x20, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r6, 0x0, 0x80006) ioctl$int_out(r0, 0x2, &(0x7f0000000000)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r6, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:06:17 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) [ 606.933827][T23018] loop1: detected capacity change from 0 to 5 23:06:17 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000040002"], 0x60}}, 0x0) [ 607.044519][T23018] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:17 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="6ebb5bc665f23aff7a20303000003030302c300600000000000001000080b3000d50318386db9f354337f5aa0a420b1e89d656b030a726016d3cce77fa28fe127149c6e137e4d5e1ba1763fe4ad3d8c7dea11413fbed9cec51bcdff4ca3a0287647f7c4bb6bb86be778997156e000015a5471425dea15b7e8ffd366f569ed595d14b0e8749e644ca0a4fbec51a9ec09ab870467533bc94a8471baba2170e706e5dde8d648992575d1ae2aa200c11066b6dc7c35c0d5db17aabbeee0b46a01297f2293087f43708000000000000000000e8b7fafbdec4813fcce5f4c1bf9413538602d3b8fff31277d6bc880fa1bae503101230fa21fdec5dc68f44f1037f0c81c5a90a87caf16e2d362b50ce63a60556fdf5adc2732a8e1f9b693b6dfd3167970203a1ed1826acf1f8850137386408d01b691831f7412ee3d2f6f8faf72d7242d62eb4d55288a731e7a3f1b57c0940f54ef23160853e572f5348c71e7e678bbf1d949bcbfe66982b1d243d3a11d6d23230b85b4bbbc0961111bc16fe07c2a56814961b745e3ca047bfc68bd6aba88eea427fcb07b4ea123bc4637468035300612cbd511855869a3a2664"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) 23:06:17 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x18089}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) socket$alg(0x26, 0x5, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000040)={0x5, 0x3, 0x4, 0x20, 0x9, {0x77359400}, {0x3, 0x2, 0x8, 0x81, 0x20, 0xa8, "37a0ee84"}, 0x66, 0x3, @planes=&(0x7f0000000000)={0x200, 0x58, @mem_offset=0xfffffffe, 0x3}, 0xad02, 0x0, 0xffffffffffffffff}) landlock_add_rule$LANDLOCK_RULE_PATH_BENEATH(r1, 0x1, &(0x7f00000000c0)={0x84, r3}, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) flock(r2, 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:06:17 executing program 4: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="6ebb5bc665f23aff7a20303000003030302c300600000000000001000080b3000d50318386db9f354337f5aa0a420b1e89d656b030a726016d3cce77fa28fe127149c6e137e4d5e1ba1763fe4ad3d8c7dea11413fbed9cec51bcdff4ca3a0287647f7c4bb6bb86be778997156e000015a5471425dea15b7e8ffd366f569ed595d14b0e8749e644ca0a4fbec51a9ec09ab870467533bc94a8471baba2170e706e5dde8d648992575d1ae2aa200c11066b6dc7c35c0d5db17aabbeee0b46a01297f2293087f43708000000000000000000e8b7fafbdec4813fcce5f4c1bf9413538602d3b8fff31277d6bc880fa1bae503101230fa21fdec5dc68f44f1037f0c81c5a90a87caf16e2d362b50ce63a60556fdf5adc2732a8e1f9b693b6dfd3167970203a1ed1826acf1f8850137386408d01b691831f7412ee3d2f6f8faf72d7242d62eb4d55288a731e7a3f1b57c0940f54ef23160853e572f5348c71e7e678bbf1d949bcbfe66982b1d243d3a11d6d23230b85b4bbbc0961111bc16fe07c2a56814961b745e3ca047bfc68bd6aba88eea427fcb07b4ea123bc4637468035300612cbd511855869a3a2664"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) 23:06:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000c00000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:17 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000302"], 0x60}}, 0x0) [ 607.689377][T23042] loop1: detected capacity change from 0 to 5 23:06:18 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000002002"], 0x60}}, 0x0) 23:06:18 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) [ 607.801379][T23042] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 607.892954][T23042] loop1: detected capacity change from 0 to 5 [ 607.917364][T23042] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:18 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000202"], 0x60}}, 0x0) 23:06:18 executing program 4: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) 23:06:18 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fcntl$getown(r1, 0x9) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r4 = dup(r3) setsockopt$bt_rfcomm_RFCOMM_LM(r4, 0x12, 0x3, &(0x7f0000000040), 0x4) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x9, 0x20, 0x9, 0x0, 0x7, 0x4, 0x8, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6b89, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}, 0x4732, 0x8, 0xffff, 0x5, 0x100000001, 0x48, 0x5, 0x0, 0x3, 0x0, 0x3}, r2, 0xe, r4, 0x0) ioctl$BLKZEROOUT(r4, 0x127f, &(0x7f0000000040)={0xa6c5, 0x9}) r5 = socket$bt_cmtp(0x1f, 0x3, 0x5) mmap(&(0x7f0000012000/0x4000)=nil, 0x4000, 0x1, 0x40010, r5, 0xc5718000) r6 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x4c, 0x0, 0x0, 0x20, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r6, 0x0, 0x80006) ioctl$int_out(r0, 0x2, &(0x7f0000000000)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r6, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:06:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000d00000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:18 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) [ 608.515750][T23071] loop1: detected capacity change from 0 to 5 23:06:18 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000302"], 0x60}}, 0x0) [ 608.587283][T23071] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 608.713972][T23071] loop1: detected capacity change from 0 to 5 23:06:19 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r2, 0xc0709411, &(0x7f0000000040)={{0x0, 0x79, 0x3, 0xff, 0xd97b, 0xffffffff, 0x0, 0xcb5, 0x2, 0xfff, 0x8001, 0x72dd, 0x8000, 0x2, 0x10001}, 0x50, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:06:19 executing program 4: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="6ebb5bc665f23aff7a20303000003030302c300600000000000001000080b3000d50318386db9f354337f5aa0a420b1e89d656b030a726016d3cce77fa28fe127149c6e137e4d5e1ba1763fe4ad3d8c7dea11413fbed9cec51bcdff4ca3a0287647f7c4bb6bb86be778997156e000015a5471425dea15b7e8ffd366f569ed595d14b0e8749e644ca0a4fbec51a9ec09ab870467533bc94a8471baba2170e706e5dde8d648992575d1ae2aa200c11066b6dc7c35c0d5db17aabbeee0b46a01297f2293087f43708000000000000000000e8b7fafbdec4813fcce5f4c1bf9413538602d3b8fff31277d6bc880fa1bae503101230fa21fdec5dc68f44f1037f0c81c5a90a87caf16e2d362b50ce63a60556fdf5adc2732a8e1f9b693b6dfd3167970203a1ed1826acf1f8850137386408d01b691831f7412ee3d2f6f8faf72d7242d62eb4d55288a731e7a3f1b57c0940f54ef23160853e572f5348c71e7e678bbf1d949bcbfe66982b1d243d3a11d6d23230b85b4bbbc0961111bc16fe07c2a56814961b745e3ca047bfc68bd6aba88eea427fcb07b4ea123bc4637468035300612cbd511855869a3a2664"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) 23:06:19 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) [ 608.756633][T23071] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:19 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000402"], 0x60}}, 0x0) 23:06:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000f00000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:19 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x18089}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) socket$alg(0x26, 0x5, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000040)={0x5, 0x3, 0x4, 0x20, 0x9, {0x77359400}, {0x3, 0x2, 0x8, 0x81, 0x20, 0xa8, "37a0ee84"}, 0x66, 0x3, @planes=&(0x7f0000000000)={0x200, 0x58, @mem_offset=0xfffffffe, 0x3}, 0xad02, 0x0, 0xffffffffffffffff}) landlock_add_rule$LANDLOCK_RULE_PATH_BENEATH(r1, 0x1, &(0x7f00000000c0)={0x84, r3}, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) flock(r2, 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:06:19 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) 23:06:19 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b0001000003000500000000000a"], 0x60}}, 0x0) [ 609.380684][T23096] loop1: detected capacity change from 0 to 5 [ 609.497489][T23096] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 609.661525][T23096] loop1: detected capacity change from 0 to 5 [ 609.690230][T23096] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:20 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) 23:06:20 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000017"], 0x60}}, 0x0) 23:06:20 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="6ebb5bc665f23aff7a20303000003030302c300600000000000001000080b3000d50318386db9f354337f5aa0a420b1e89d656b030a726016d3cce77fa28fe127149c6e137e4d5e1ba1763fe4ad3d8c7dea11413fbed9cec51bcdff4ca3a0287647f7c4bb6bb86be778997156e000015a5471425dea15b7e8ffd366f569ed595d14b0e8749e644ca0a4fbec51a9ec09ab870467533bc94a8471baba2170e706e5dde8d648992575d1ae2aa200c11066b6dc7c35c0d5db17aabbeee0b46a01297f2293087f43708000000000000000000e8b7fafbdec4813fcce5f4c1bf9413538602d3b8fff31277d6bc880fa1bae503101230fa21fdec5dc68f44f1037f0c81c5a90a87caf16e2d362b50ce63a60556fdf5adc2732a8e1f9b693b6dfd3167970203a1ed1826acf1f8850137386408d01b691831f7412ee3d2f6f8faf72d7242d62eb4d55288a731e7a3f1b57c0940f54ef23160853e572f5348c71e7e678bbf1d949bcbfe66982b1d243d3a11d6d23230b85b4bbbc0961111bc16fe07c2a56814961b745e3ca047bfc68bd6aba88eea427fcb07b4ea123bc4637468035300612cbd511855869a3a2664"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) 23:06:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20b10f00000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:20 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b0001000003000500000000000a"], 0x60}}, 0x0) [ 610.118935][T23123] loop1: detected capacity change from 0 to 5 23:06:20 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) r2 = gettid() rt_sigqueueinfo(r2, 0x3c, &(0x7f0000000040)) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x2, 0xff, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x7, 0x3}}, r2, 0xc, 0xffffffffffffffff, 0x3) sendfile(r0, r1, 0x0, 0x80006) ioctl$F2FS_IOC_GET_PIN_FILE(r3, 0x8004f50e, &(0x7f0000000000)) clock_gettime(0x0, &(0x7f0000006f40)={0x0, 0x0}) recvmmsg$unix(r1, &(0x7f0000006d00)=[{{&(0x7f00000004c0)=@abs, 0x6e, &(0x7f00000009c0)=[{&(0x7f0000000540)=""/61, 0x3d}, {&(0x7f0000000580)=""/222, 0xde}, {&(0x7f0000000680)=""/212, 0xd4}, {&(0x7f0000000780)=""/169, 0xa9}, {&(0x7f0000000840)=""/231, 0xe7}, {&(0x7f0000000940)=""/121, 0x79}], 0x6}}, {{&(0x7f0000000a40), 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000ac0)=""/229, 0xe5}, {&(0x7f0000000bc0)=""/199, 0xc7}, {&(0x7f0000000cc0)=""/33, 0x21}], 0x3, &(0x7f0000000d40)=[@cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xd0}}, {{&(0x7f0000000e40)=@abs, 0x6e, &(0x7f00000011c0)=[{&(0x7f0000000ec0)=""/22, 0x16}, {&(0x7f0000000f00)=""/94, 0x5e}, {&(0x7f0000001040)=""/154, 0x9a}, {&(0x7f0000000f80)=""/29, 0x1d}, {&(0x7f0000001100)=""/143, 0x8f}], 0x5, &(0x7f0000000fc0)=[@cred={{0x1c}}], 0x20}}, {{&(0x7f0000001240), 0x6e, &(0x7f0000001500)=[{&(0x7f00000012c0)=""/20, 0x14}, {&(0x7f0000001300)}, {&(0x7f0000001340)=""/144, 0x90}, {&(0x7f0000001400)=""/196, 0xc4}], 0x4}}, {{&(0x7f0000001540), 0x6e, &(0x7f0000002a40)=[{&(0x7f00000015c0)=""/4096, 0x1000}, {&(0x7f00000025c0)=""/58, 0x3a}, {&(0x7f0000002600)=""/25, 0x19}, {&(0x7f0000002640)=""/100, 0x64}, {&(0x7f00000026c0)=""/232, 0xe8}, {&(0x7f00000027c0)=""/36, 0x24}, {&(0x7f0000002800)=""/156, 0x9c}, {&(0x7f00000028c0)=""/202, 0xca}, {&(0x7f00000029c0)=""/102, 0x66}], 0x9, &(0x7f0000002b00)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xd8}}, {{&(0x7f0000002c00), 0x6e, &(0x7f0000002ec0)=[{&(0x7f0000002c80)=""/56, 0x38}, {&(0x7f0000002cc0)=""/66, 0x42}, {&(0x7f0000002d40)=""/164, 0xa4}, {&(0x7f0000002e00)=""/84, 0x54}, {&(0x7f0000002e80)=""/40, 0x28}], 0x5, &(0x7f0000002f40)=[@cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x160}}, {{&(0x7f00000030c0), 0x6e, &(0x7f0000003180)=[{&(0x7f0000003140)=""/7, 0x7}], 0x1, &(0x7f00000031c0)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xc0}}, {{0x0, 0x0, &(0x7f0000005480)=[{&(0x7f0000003280)=""/10, 0xa}, {&(0x7f00000032c0)=""/4096, 0x1000}, {&(0x7f00000042c0)=""/208, 0xd0}, {&(0x7f00000043c0)=""/4096, 0x1000}, {&(0x7f00000053c0)=""/85, 0x55}, {&(0x7f0000005440)=""/22, 0x16}], 0x6, &(0x7f0000005500)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x158}}, {{&(0x7f0000005680)=@abs, 0x6e, &(0x7f0000006b40)=[{&(0x7f0000005700)=""/7, 0x7}, {&(0x7f0000005740)=""/209, 0xd1}, {&(0x7f0000005840)=""/4096, 0x1000}, {&(0x7f0000006840)=""/236, 0xec}, {&(0x7f0000006940)=""/9, 0x9}, {&(0x7f0000006980)=""/38, 0x26}, {&(0x7f00000069c0)=""/179, 0xb3}, {&(0x7f0000006a80)=""/170, 0xaa}], 0x8, &(0x7f0000006fc0)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c005df8664c877d970000000000000100000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x130}}], 0x9, 0x40, &(0x7f0000006f80)={r4, r5+10000000}) ptrace$peeksig(0x4209, r6, &(0x7f0000000100)={0x2, 0x0, 0x5}, &(0x7f0000000140)=[{}, {}, {}, {}, {}]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) write(r1, &(0x7f0000000440)="53e4ab76c0cd26f68252d3beb15af58fd3c100ea3559f34db0c748fc1fcced2c68077bec4521dee97c0e2f2d1e2ba63b6fb3442661e54ee262a36240f78d2a66b0f2baea6a3b", 0x46) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x14082, 0x116) [ 610.176081][T23123] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:20 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) [ 610.294089][T23123] loop1: detected capacity change from 0 to 5 23:06:20 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="6ebb5bc665f23aff7a20303000003030302c300600000000000001000080b3000d50318386db9f354337f5aa0a420b1e89d656b030a726016d3cce77fa28fe127149c6e137e4d5e1ba1763fe4ad3d8c7dea11413fbed9cec51bcdff4ca3a0287647f7c4bb6bb86be778997156e000015a5471425dea15b7e8ffd366f569ed595d14b0e8749e644ca0a4fbec51a9ec09ab870467533bc94a8471baba2170e706e5dde8d648992575d1ae2aa200c11066b6dc7c35c0d5db17aabbeee0b46a01297f2293087f43708000000000000000000e8b7fafbdec4813fcce5f4c1bf9413538602d3b8fff31277d6bc880fa1bae503101230fa21fdec5dc68f44f1037f0c81c5a90a87caf16e2d362b50ce63a60556fdf5adc2732a8e1f9b693b6dfd3167970203a1ed1826acf1f8850137386408d01b691831f7412ee3d2f6f8faf72d7242d62eb4d55288a731e7a3f1b57c0940f54ef23160853e572f5348c71e7e678bbf1d949bcbfe66982b1d243d3a11d6d23230b85b4bbbc0961111bc16fe07c2a56814961b745e3ca047bfc68bd6aba88eea427fcb07b4ea123bc4637468035300612cbd511855869a3a2664"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) 23:06:20 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000017"], 0x60}}, 0x0) [ 610.335654][T23123] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:20 executing program 4: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5cb445d11a3786595100ced0dc61ab58b3ce6c488aa0ebf") 23:06:20 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) io_setup(0x4dc, &(0x7f0000000000)=0x0) io_submit(r2, 0x0, 0xfffffffffffffffe) 23:06:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20201000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:20 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:06:20 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) 23:06:20 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0xf}}, 0x0) [ 610.713905][T23155] loop1: detected capacity change from 0 to 5 23:06:21 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) [ 610.876175][T23155] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:21 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0xc0}}, 0x0) [ 611.097035][T23155] loop1: detected capacity change from 0 to 5 [ 611.247018][T23155] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:21 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) 23:06:21 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x33fe0}}, 0x0) 23:06:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20001100000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:22 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) [ 611.903239][T23183] loop1: detected capacity change from 0 to 5 [ 611.997238][T23183] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 612.251582][T23183] loop1: detected capacity change from 0 to 5 [ 612.262121][T23183] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:22 executing program 4: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="6ebb5bc665f23aff7a20303000003030302c300600000000000001000080b3000d50318386db9f354337f5aa0a420b1e89d656b030a726016d3cce77fa28fe127149c6e137e4d5e1ba1763fe4ad3d8c7dea11413fbed9cec51bcdff4ca3a0287647f7c4bb6bb86be778997156e000015a5471425dea15b7e8ffd366f569ed595d14b0e8749e644ca0a4fbec51a9ec09ab870467533bc94a8471baba2170e706e5dde8d648992575d1ae2aa200c11066b6dc7c35c0d5db17aabbeee0b46a01297f2293087f43708000000000000000000e8b7fafbdec4813fcce5f4c1bf9413538602d3b8fff31277d6bc880fa1bae503101230fa21fdec5dc68f44f1037f0c81c5a90a87caf16e2d362b50ce63a60556fdf5adc2732a8e1f9b693b6dfd3167970203a1ed1826acf1f8850137386408d01b691831f7412ee3d2f6f8faf72d7242d62eb4d55288a731e7a3f1b57c0940f54ef23160853e572f5348c71e7e678bbf1d949bcbfe66982b1d243d3a11d6d23230b85b4bbbc0961111bc16fe07c2a56814961b745e3ca047bfc68bd6aba88eea427fcb07b4ea123bc4637468035300612cbd511855869a3a2664"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5cb445d11a3786595100ced0dc61ab58b3ce6c488aa0ebf") 23:06:23 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x40) ptrace$setregs(0xd, r2, 0x0, &(0x7f00000000c0)) r3 = openat(r1, &(0x7f0000000080)='./file0\x00', 0x500, 0x82) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x6, 0x20, 0x1f, 0x8, 0x0, 0x9, 0x240, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x3}, 0x208, 0x7, 0x0, 0x8, 0x7, 0x4f, 0xd4, 0x0, 0x60000000, 0x0, 0x70d}, r2, 0xe, r3, 0x2) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:06:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20001f00000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:23 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x200000e0}}, 0x0) 23:06:23 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) 23:06:23 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) [ 613.078340][T23210] loop1: detected capacity change from 0 to 5 23:06:23 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x7ffff000}}, 0x0) [ 613.226425][T23210] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:23 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) 23:06:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20002000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:23 executing program 4: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5cb445d11a3786595100ced0dc61ab58b3ce6c488aa0ebf") 23:06:23 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0xfffffdef}}, 0x0) [ 613.878360][T23227] loop1: detected capacity change from 0 to 5 [ 613.959517][T23227] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:24 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) r2 = dup(r0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x29a7, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x4e20, 0xf0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, {0xa, 0x4e24, 0x6, @loopback, 0xe2}, 0x8, [0x1, 0x101, 0x1, 0x5, 0x10001, 0x7fffffff, 0x1, 0x13a]}, 0x5c) r4 = fcntl$getown(r3, 0x9) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000300)={0x990000, 0x2284, 0x100, r1, 0x0, &(0x7f00000002c0)={0x990a68, 0x0, '\x00', @string=&(0x7f0000000200)=0x5}}) r6 = dup(r5) setsockopt$bt_rfcomm_RFCOMM_LM(r6, 0x12, 0x3, &(0x7f0000000040), 0x4) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x9, 0x20, 0x9, 0x0, 0x7, 0x4, 0x8, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x7, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}, 0x4732, 0x8, 0xffff, 0x5, 0x100000001, 0x48, 0x5, 0x0, 0x3, 0x0, 0x5}, r4, 0xe, r6, 0x0) ioctl$UI_SET_EVBIT(r6, 0x40045564, 0x13) getpeername(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000000)=0x80) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:06:24 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) [ 614.163591][T23227] loop1: detected capacity change from 0 to 5 [ 614.235634][T23227] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:24 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x2}, 0x0) 23:06:24 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) 23:06:24 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) 23:06:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20102000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:25 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x5}, 0x0) [ 615.018318][T23257] loop1: detected capacity change from 0 to 5 [ 615.083948][T23257] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:25 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) 23:06:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20003f00000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:25 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x7}, 0x0) 23:06:25 executing program 4: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5cb445d11a3786595100ced0dc61ab58b3ce6c488aa0ebf") 23:06:25 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x8}, 0x0) [ 615.615933][T23271] loop1: detected capacity change from 0 to 5 [ 615.648333][T23271] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 615.763113][T23271] loop1: detected capacity change from 0 to 5 [ 615.802797][T23271] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:26 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x80000, 0x0) r3 = fspick(r1, &(0x7f0000000180)='./file0\x00', 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = fcntl$getown(r4, 0x9) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r7 = dup(r6) setsockopt$bt_rfcomm_RFCOMM_LM(r7, 0x12, 0x3, &(0x7f0000000040), 0x4) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x9, 0x20, 0x9, 0x0, 0x7, 0x4, 0x8, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6b89, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}, 0x4732, 0x8, 0xffff, 0x5, 0x100000001, 0x48, 0x5, 0x0, 0x3, 0x0, 0x3}, r5, 0xe, r7, 0x0) r8 = syz_open_dev$radio(&(0x7f00000002c0), 0x0, 0x2) r9 = syz_open_dev$mouse(&(0x7f0000000440), 0x200, 0x10c00) io_submit(0x0, 0x4, &(0x7f0000000500)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x2, 0x2, r2, &(0x7f0000000080)="8cef55045941b17297acefb58d66f64863b1eb9d2660d9d1133b61fca63d9137e316e53b809ded8ddd02036109359941da9b42c4e0bf18688770d867078a1c62a92321fe6a3d3b86cddbcffb32373330468a66fbd94e3725cf0a7962fb0c20318c4316c80fd20b5983a7b6bdaaf3843ff5996e95037625be7aec75a5ff0944e69e76fd30b28f60d5a5225a38550f5a9c5d", 0x91, 0x9, 0x0, 0x0, r1}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x6, 0x101, r3, &(0x7f00000001c0)="d148ccb2a838756ae8c92590f2dbce8efe54f8a61439993e23fb52d8254bb599e9a53dfc19f171612a7b852ec990764ecdb9bbe3eef9462560193df8020061e3244b1c486865bed6c7f43eb3ca50a248ceb5120dbfbc8c755d528bb70f33560675ec115ea18f3df1e34b36f7eac781e138f92a79c79c3b0ccb8bcfa9a4d719a33987fe657fc1a28eeb8ad6aa8aaba403af4e3776af28ae4b", 0x98, 0x9, 0x0, 0x2, r7}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0xf7, r8, &(0x7f0000000300)="6310dd0c33447c4fe35bbd3907d8a23ece68792a6c583340f6f7ee08d6545e9f258d24f94266f0fec92c306a5538c3a9fd892b3ed1d3240822294a60e6b7341cf4451465114091dcedb9cba0bcaed35aa1a23e3de31aaa89acc6da8a8ce81d78ecda4c204da4a600d7b0f10482ed6a603933d79ee78df65a6153d9feb28bc32b2399323dc9a54cf926bbbe4dcb0f2a1e619d1151090dac47d089cd381568c76934ad8b8b75fd9a8c18e914c4a4d247b46d88da3a885ed52768d864cc997329698b0bd2b4cce89647575fce7ed91681e39f34ad7ccaf5a2b4bae2a61a21086fa033c767b7b3c4f91bc1c473cef08906832d52", 0xf2, 0x8, 0x0, 0x3, r1}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x4, r9, &(0x7f0000000480)="9acf830b1ff6c79f1717b0675aac14a60de654ff56021ceb7aa7d5ca65d16b69c27c2ac59760957b063f67fd669b1594", 0x30, 0xa26, 0x0, 0x1, r1}]) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:06:26 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) 23:06:26 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x9}, 0x0) 23:06:26 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) 23:06:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20004000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) [ 616.294603][T23295] loop1: detected capacity change from 0 to 5 23:06:26 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x17}, 0x0) [ 616.432186][T23295] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:26 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) 23:06:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20004800000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:27 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) 23:06:27 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x18}, 0x0) 23:06:27 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) [ 617.152193][T23313] loop1: detected capacity change from 0 to 5 [ 617.200883][T23313] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 617.323025][T23313] loop1: detected capacity change from 0 to 5 23:06:27 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) [ 617.466954][T23313] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:28 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) 23:06:28 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1a}, 0x0) 23:06:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20004c00000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:28 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xa) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) 23:06:28 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x20040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10004}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000007c0)=@IORING_OP_TIMEOUT={0xb, 0x1, 0x0, 0x0, 0x1, &(0x7f0000000780)={0x77359400}, 0x1, 0x1, 0xd750ad30a8c757ea}, 0x3) getsockopt$netrom_NETROM_T1(r3, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$sock_netrom_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x0, 0x6, [@null, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T1(r4, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$sock_netrom_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x0, 0x6, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}) sendfile(r3, r4, 0x0, 0x2000007fffffff) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000680), 0x105080, 0x0) sendmsg$can_raw(r5, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f00000006c0)=@can={{0x4, 0x1}, 0x2, 0x3, 0x0, 0x0, "dc0eb160b5faf653"}, 0x10}, 0x1, 0x0, 0x0, 0x20000000}, 0x4) ioctl$FIOCLEX(r0, 0x5451) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000000)=""/165, 0xa5}, {&(0x7f00000000c0)=""/197, 0xc5}, {&(0x7f0000001040)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/136, 0x88}, {&(0x7f0000000280)=""/157, 0x9d}, {&(0x7f0000000340)=""/198, 0xc6}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000440)=""/123, 0x7b}, {&(0x7f00000004c0)=""/227, 0xe3}], 0x9, 0x5, 0x1f) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:06:28 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x300}, 0x0) 23:06:28 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) [ 618.074779][T23343] loop1: detected capacity change from 0 to 5 23:06:28 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) 23:06:28 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) [ 618.149085][T23343] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 618.254518][T23343] loop1: detected capacity change from 0 to 5 [ 618.294043][T23343] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:28 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0xffffff1f}, 0x0) 23:06:28 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:06:28 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) 23:06:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20006000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:29 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1, 0x2}, 0x0) 23:06:29 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) r2 = gettid() rt_sigqueueinfo(r2, 0x3c, &(0x7f0000000040)) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getown(r3, 0x9) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x0, 0x8, 0x6, 0x4, 0x0, 0x6, 0x44220, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000000), 0xc}, 0x4000, 0x6, 0x8001, 0x5, 0x0, 0x7, 0xa607, 0x0, 0xeb, 0x0, 0x3}, r2, 0x4, r3, 0xa) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) [ 619.029053][T23380] loop1: detected capacity change from 0 to 5 [ 619.068999][T23380] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:29 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) 23:06:29 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1, 0x3}, 0x0) 23:06:29 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:06:29 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) [ 619.201670][T23380] loop1: detected capacity change from 0 to 5 [ 619.306686][T23380] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:29 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) 23:06:29 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1, 0x4}, 0x0) 23:06:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20006800000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) [ 619.746734][T23406] loop1: detected capacity change from 0 to 5 [ 619.761467][T23406] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:30 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) [ 619.863520][T23406] loop1: detected capacity change from 0 to 5 23:06:30 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:06:30 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x0, &(0x7f00004e8000/0x3000)=nil) [ 619.907184][T23406] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:30 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1, 0x300}, 0x0) 23:06:30 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)={0x2c, r4, 0x225, 0x0, 0x0, {{}, {@val={0x8, 0x3, r6}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random}], @NL80211_ATTR_DURATION={0x8, 0x57, 0x8007f}]}, 0x2c}}, 0x0) sendmsg$NL80211_CMD_JOIN_OCB(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, r2, 0x100, 0x70bd2a, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r6}, @void}}, [@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x985}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x1df}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4040}, 0x800) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:06:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20006c00000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:30 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x80000, 0x0) r3 = fspick(r1, &(0x7f0000000180)='./file0\x00', 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = fcntl$getown(r4, 0x9) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r7 = dup(r6) setsockopt$bt_rfcomm_RFCOMM_LM(r7, 0x12, 0x3, &(0x7f0000000040), 0x4) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x9, 0x20, 0x9, 0x0, 0x7, 0x4, 0x8, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6b89, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}, 0x4732, 0x8, 0xffff, 0x5, 0x100000001, 0x48, 0x5, 0x0, 0x3, 0x0, 0x3}, r5, 0xe, r7, 0x0) r8 = syz_open_dev$radio(&(0x7f00000002c0), 0x0, 0x2) r9 = syz_open_dev$mouse(&(0x7f0000000440), 0x200, 0x10c00) io_submit(0x0, 0x4, &(0x7f0000000500)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x2, 0x2, r2, &(0x7f0000000080)="8cef55045941b17297acefb58d66f64863b1eb9d2660d9d1133b61fca63d9137e316e53b809ded8ddd02036109359941da9b42c4e0bf18688770d867078a1c62a92321fe6a3d3b86cddbcffb32373330468a66fbd94e3725cf0a7962fb0c20318c4316c80fd20b5983a7b6bdaaf3843ff5996e95037625be7aec75a5ff0944e69e76fd30b28f60d5a5225a38550f5a9c5d", 0x91, 0x9, 0x0, 0x0, r1}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x6, 0x101, r3, &(0x7f00000001c0)="d148ccb2a838756ae8c92590f2dbce8efe54f8a61439993e23fb52d8254bb599e9a53dfc19f171612a7b852ec990764ecdb9bbe3eef9462560193df8020061e3244b1c486865bed6c7f43eb3ca50a248ceb5120dbfbc8c755d528bb70f33560675ec115ea18f3df1e34b36f7eac781e138f92a79c79c3b0ccb8bcfa9a4d719a33987fe657fc1a28eeb8ad6aa8aaba403af4e3776af28ae4b", 0x98, 0x9, 0x0, 0x2, r7}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0xf7, r8, &(0x7f0000000300)="6310dd0c33447c4fe35bbd3907d8a23ece68792a6c583340f6f7ee08d6545e9f258d24f94266f0fec92c306a5538c3a9fd892b3ed1d3240822294a60e6b7341cf4451465114091dcedb9cba0bcaed35aa1a23e3de31aaa89acc6da8a8ce81d78ecda4c204da4a600d7b0f10482ed6a603933d79ee78df65a6153d9feb28bc32b2399323dc9a54cf926bbbe4dcb0f2a1e619d1151090dac47d089cd381568c76934ad8b8b75fd9a8c18e914c4a4d247b46d88da3a885ed52768d864cc997329698b0bd2b4cce89647575fce7ed91681e39f34ad7ccaf5a2b4bae2a61a21086fa033c767b7b3c4f91bc1c473cef08906832d52", 0xf2, 0x8, 0x0, 0x3, r1}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x4, r9, &(0x7f0000000480)="9acf830b1ff6c79f1717b0675aac14a60de654ff56021ceb7aa7d5ca65d16b69c27c2ac59760957b063f67fd669b1594", 0x30, 0xa26, 0x0, 0x1, r1}]) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:06:30 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1, 0x2000}, 0x0) 23:06:30 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) [ 620.473299][T23437] loop1: detected capacity change from 0 to 5 23:06:30 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1, 0x34000}, 0x0) [ 620.527874][T23437] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:30 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) io_setup(0x4dc, &(0x7f0000000000)=0x0) io_submit(r2, 0x0, 0xfffffffffffffffe) [ 620.702431][T23437] loop1: detected capacity change from 0 to 5 [ 620.769449][T23437] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20007400000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:31 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:06:31 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1, 0x400300}, 0x0) [ 621.249476][T23463] loop1: detected capacity change from 0 to 5 [ 621.332508][T23463] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:31 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000400)=ANY=[], 0x1) setsockopt$sock_int(r2, 0x1, 0x200000010, &(0x7f00000000c0)=0x1, 0x4) write$binfmt_elf32(r1, &(0x7f0000000600)=ANY=[], 0x1) recvmmsg(r1, &(0x7f00000007c0)=[{{&(0x7f0000000000)=@ethernet={0x0, @link_local}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000100)=""/149, 0x95}, {&(0x7f0000000080)=""/19, 0x13}, {&(0x7f00000001c0)=""/153, 0x99}, {&(0x7f0000000280)=""/12, 0xc}], 0x4, &(0x7f0000000300)=""/110, 0x6e}, 0x30f}, {{&(0x7f0000000380)=@rc={0x1f, @fixed}, 0x80, &(0x7f0000000880)=[{&(0x7f0000001040)=""/4096, 0x1000}, {&(0x7f0000000400)=""/180, 0xb4}], 0x2, &(0x7f0000000500)=""/49, 0x31}, 0x79e8}, {{&(0x7f0000000600)=@l2={0x1f, 0x0, @fixed}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/28, 0x1c}, {&(0x7f0000000680)=""/38, 0x26}, {&(0x7f0000002040)=""/4096, 0x1000}], 0x3, &(0x7f0000000700)=""/147, 0x93}, 0x9be}], 0x3, 0x400000c1, 0x0) r3 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r3, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r3, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) [ 621.450824][T23463] loop1: detected capacity change from 0 to 5 [ 621.466040][T23463] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:31 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)={0x2c, r4, 0x225, 0x0, 0x0, {{}, {@val={0x8, 0x3, r6}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random}], @NL80211_ATTR_DURATION={0x8, 0x57, 0x8007f}]}, 0x2c}}, 0x0) sendmsg$NL80211_CMD_JOIN_OCB(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, r2, 0x100, 0x70bd2a, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r6}, @void}}, [@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x985}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x1df}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4040}, 0x800) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:06:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20007a00000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:31 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1, 0x1000000}, 0x0) 23:06:32 executing program 4: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5cb445d11a3786595100ced0dc61ab58b3ce6c488aa0ebf") [ 621.915439][T23487] loop1: detected capacity change from 0 to 5 23:06:32 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) [ 622.018435][T23487] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:32 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1, 0x2000000}, 0x0) [ 622.192709][T23487] loop1: detected capacity change from 0 to 5 23:06:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200fb100000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:32 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:06:32 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1, 0x3000000}, 0x0) [ 622.676962][T23512] loop1: detected capacity change from 0 to 5 [ 622.751426][T23512] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:33 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:06:33 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) io_setup(0x3, &(0x7f0000000140)=0x0) io_pgetevents(r2, 0x5, 0x5, &(0x7f00000004c0)=[{}, {}, {}, {}, {}], &(0x7f0000002680)={0x0, 0x3938700}, &(0x7f0000000380)={&(0x7f0000000000), 0x8}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = fcntl$getown(r3, 0x9) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r6 = dup(r5) setsockopt$bt_rfcomm_RFCOMM_LM(r6, 0x12, 0x3, &(0x7f0000000040), 0x4) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x9, 0x20, 0x9, 0x0, 0x7, 0x4, 0x8, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6b89, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}, 0x4732, 0x8, 0xffff, 0x5, 0x100000001, 0x48, 0x5, 0x0, 0x3, 0x0, 0x3}, r4, 0xe, r6, 0x0) io_submit(r2, 0x1, &(0x7f00000000c0)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x2, 0xf3ea, r1, &(0x7f0000000000)="4cf3892259395070ad00399804735906b1c47c888b7807824160949c45e8c6f1a815c28c119889ff0fdbde10d8b7ca477c25c87ea210d7c554484f4b2845d4aa68f016b697b2490251d6352d7087b9bccf12d5113782b46da5ea94a1cc9cc991b4ae1f", 0x63, 0x7, 0x0, 0x3, r6}]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(0xffffffffffffffff, 0x800442d4, &(0x7f0000000a40)=0x1) fcntl$dupfd(r1, 0x406, r0) 23:06:33 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) [ 622.892082][T23512] loop1: detected capacity change from 0 to 5 [ 622.924245][T23512] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:33 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:06:33 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1, 0x4000000}, 0x0) 23:06:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20c0ed00000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:33 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:06:33 executing program 0: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:06:33 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1, 0x20000000}, 0x0) [ 623.324956][T23543] loop1: detected capacity change from 0 to 5 [ 623.387855][T23543] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:33 executing program 0: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) [ 623.520560][T23543] loop1: detected capacity change from 0 to 5 23:06:33 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r2 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x101) r3 = syz_open_dev$usbfs(&(0x7f0000000340), 0x1ff, 0x0) ioctl$USBDEVFS_BULK(r3, 0x80045505, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r2, 0xc0205648, &(0x7f0000000080)={0xa20000, 0x5, 0x401, r3, 0x0, &(0x7f0000000040)={0x9909da, 0x9, '\x00', @value=0x4}}) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T1(r4, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f0000000180)={0x1, @pix={0xbf3, 0x2, 0x50313459, 0x6, 0x8, 0x5, 0x1, 0x5, 0x0, 0x0, 0x1, 0x6}}) ioctl$sock_netrom_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x0, 0x6, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}) tee(r4, r0, 0x400, 0x1) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) [ 623.570323][T23543] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:34 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1, 0xfbffffff}, 0x0) 23:06:34 executing program 0: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:06:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20fffe00000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) [ 624.010318][ T1196] ieee802154 phy0 wpan0: encryption failed: -22 [ 624.016655][ T1196] ieee802154 phy1 wpan1: encryption failed: -22 23:06:34 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, 0x0, 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) [ 624.318863][T23575] loop1: detected capacity change from 0 to 5 [ 624.392459][T23575] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:34 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:06:34 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1, 0xffffff7f}, 0x0) [ 624.501693][T23575] loop1: detected capacity change from 0 to 5 [ 624.513360][T23575] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:34 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:06:34 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1, 0xfffffffb}, 0x0) 23:06:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000ff00000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:34 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, 0x0, 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) [ 625.055684][T23601] loop1: detected capacity change from 0 to 5 23:06:35 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1, 0x40030000000000}, 0x0) [ 625.178999][T23601] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:35 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, 0x0, 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:06:35 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8214, 0xfffffffffffffffe, 0x4}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000), 0x10) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:06:35 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x0, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:06:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200fff00000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:35 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1, 0x100000000000000}, 0x0) 23:06:35 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r2 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x101) r3 = syz_open_dev$usbfs(&(0x7f0000000340), 0x1ff, 0x0) ioctl$USBDEVFS_BULK(r3, 0x80045505, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r2, 0xc0205648, &(0x7f0000000080)={0xa20000, 0x5, 0x401, r3, 0x0, &(0x7f0000000040)={0x9909da, 0x9, '\x00', @value=0x4}}) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T1(r4, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f0000000180)={0x1, @pix={0xbf3, 0x2, 0x50313459, 0x6, 0x8, 0x5, 0x1, 0x5, 0x0, 0x0, 0x1, 0x6}}) ioctl$sock_netrom_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x0, 0x6, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}) tee(r4, r0, 0x400, 0x1) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:06:35 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x0, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:06:35 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r2 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x101) r3 = syz_open_dev$usbfs(&(0x7f0000000340), 0x1ff, 0x0) ioctl$USBDEVFS_BULK(r3, 0x80045505, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r2, 0xc0205648, &(0x7f0000000080)={0xa20000, 0x5, 0x401, r3, 0x0, &(0x7f0000000040)={0x9909da, 0x9, '\x00', @value=0x4}}) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T1(r4, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f0000000180)={0x1, @pix={0xbf3, 0x2, 0x50313459, 0x6, 0x8, 0x5, 0x1, 0x5, 0x0, 0x0, 0x1, 0x6}}) ioctl$sock_netrom_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x0, 0x6, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}) tee(r4, r0, 0x400, 0x1) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) [ 625.700050][T23620] loop1: detected capacity change from 0 to 5 [ 625.734590][T23620] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 625.824697][T23620] loop1: detected capacity change from 0 to 5 [ 625.870126][T23620] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:36 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1, 0x200000000000000}, 0x0) 23:06:36 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x0, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:06:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20feff00000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:36 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1, 0x300000000000000}, 0x0) 23:06:36 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) [ 626.628703][T23647] loop1: detected capacity change from 0 to 5 [ 626.653427][T23647] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 626.741448][T23647] loop1: detected capacity change from 0 to 5 [ 626.772685][T23647] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:37 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:06:37 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r2 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x101) r3 = syz_open_dev$usbfs(&(0x7f0000000340), 0x1ff, 0x0) ioctl$USBDEVFS_BULK(r3, 0x80045505, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r2, 0xc0205648, &(0x7f0000000080)={0xa20000, 0x5, 0x401, r3, 0x0, &(0x7f0000000040)={0x9909da, 0x9, '\x00', @value=0x4}}) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T1(r4, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f0000000180)={0x1, @pix={0xbf3, 0x2, 0x50313459, 0x6, 0x8, 0x5, 0x1, 0x5, 0x0, 0x0, 0x1, 0x6}}) ioctl$sock_netrom_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x0, 0x6, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}) tee(r4, r0, 0x400, 0x1) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:06:37 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r2 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x101) r3 = syz_open_dev$usbfs(&(0x7f0000000340), 0x1ff, 0x0) ioctl$USBDEVFS_BULK(r3, 0x80045505, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r2, 0xc0205648, &(0x7f0000000080)={0xa20000, 0x5, 0x401, r3, 0x0, &(0x7f0000000040)={0x9909da, 0x9, '\x00', @value=0x4}}) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T1(r4, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f0000000180)={0x1, @pix={0xbf3, 0x2, 0x50313459, 0x6, 0x8, 0x5, 0x1, 0x5, 0x0, 0x0, 0x1, 0x6}}) ioctl$sock_netrom_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x0, 0x6, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}) tee(r4, r0, 0x400, 0x1) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:06:37 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1, 0x400000000000000}, 0x0) 23:06:37 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:06:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000002000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) [ 627.105414][T23672] loop1: detected capacity change from 0 to 5 23:06:37 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:06:37 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1, 0x2000000000000000}, 0x0) [ 627.249233][T23672] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 627.570483][T23672] loop1: detected capacity change from 0 to 5 [ 627.661743][T23672] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:38 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1, 0xfbffffff00000000}, 0x0) 23:06:38 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(0x0, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:06:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000040000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:38 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) r2 = syz_mount_image$udf(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x7, &(0x7f0000000300)=[{&(0x7f0000001040)="4ec05e91834f3130819bd70e11e21bdff6f0ee6c40d31b8070f302f306acbce2cf2bdae2bce94159087cca7422eedfa9eddafce8c547286f1b8a2714a8360ec28d5338d06c883323f063a2550ebdd36438e567438a809e1dd52185703733c817e5479bef7e406bab5df46abbfc85c46015f03f376b90979f3f704ab39d275751f364f791e7ac091a26ab01c0e35ac424b24278ad95683067a7dd81950ac8e1f5a574d6d60e3eefe241e86fc5d578fe30efe857b359052fb1ff778f62a151231636d8ab87eaf5a6054876d574ebf2bea804186c56db3f0c84203c3c5496355de28dfb043093461f15c5ee4241980abaf1b473a4a133dbed8fe7fcf90c1a8ebcaf4584d4726dd6e48c375d92695bccecb4e0e008c73a1522cb504ac82b29a366b39565359f1c4586bc43b6909f3c43e7f5dc21023674bb5abbed0a153bcbd8a91aad7c4e940296c4ae1f91faecfbb536d54d0711b285f7ff1b4764a71b6f5bfb6c0faeee955d43f1cb74ec9a3a7b0179f5ab2acecf0165044d37166de33f022d9bac454fda314d66bc8210c5f4bfe5b39b91bcda1b7e2db1ecc87a36038deb107309c794145da2fecbd0d423a5d9f494d8deab4206abec45ef3602dd33029c22c40a502275ba2f96ed4fcc59af5a333b0caef78370060af5f1873ac4a5a2c167c8a995e1d47183800d1c0451a18280c9eb2de996e42b60450b84248ab8f21f81cfacdc03547d8b293da8320391488231eb811ace399ee92b28f430acba0c7ccc205b5a29d94fd90daec03b4289c7f273828625c76bd42ace2f5e8bbc1573bc8d65e4519302ed5a0e15fafb83bda4852665f4552e9dab0e959d1c168d6f2d13088595ac999502b62781b71e73b8fd8a3af25cfd1a2f6878c361be77dfa0e637e44921860c8ab843bf0dc9018b90d11fac1a75a92e152259bc8146aa246e2bcea741efca8d46a4b250a24f6bd044c161504958700b1f95fcbfd4ec55455bd8a20b7a1f7a9bc1461798a3e4a1bedab9c6fd37b449878d0552cfd65e997ff7d7b2842e71a5886a1c0f241c9d88fba7ff66e5190a2243773ca2ea27ea9e9a5b6a63766f6004bfa4231a4287f3f4e95f31f14f71b7038f5c5aac3d28b43794a5e36b9868c42ca2b92f44ef739ecaa498adca25d039c8b105185b5d2deafc90d8bf25d5017d8a555bb2f33f931da1cc551f2eae41d888f2c6dddbeaf512f4079e4b60346be9c8c89c73909acdfbae80e93c19c7e9669e73d3ab258278cb804a9c5c643dd058929d3774ee3507184f171ce3ce2dc06a23bd814613ffad17df3d56687a395996c43d30abe608dc134196202362a3f549017c123ea3ce9807f7863f9fbdcd5ff74705696286c734c0878fc05d5198b7a4ee499d264b64d0b95284fedce662a97d0424b8da6b0e51e6238e3fdc8a4d16eb4cc10798cefbed96d38c889210d9eee19f36a0193b6dbafc0e437450ff3b551aa30a6b916809788ad127ecfc53b559c1da784a8cf19a8df50ee7efd81e78465f479ca9c3243676ae637046591492ce661a9d228899687a323b9d1259881003ea136e81bbf7fec4b8a859bf74a1fd5a1edbdc705207189228158550207d4cb586b80267859eb88ffda7698c66093a23438f77c3adb8d342b40e09128fcfe6c4f620fd7261431d9393d4648ad971331112fd25abdc5529faa89b9ce2db8edf2dafc561e93e408425f3a0b1c4332ce738a1e2967ec8662585b77bb084c9daaf295d12776ee126e886aba02776f7419ab93eb17802e1e6582dd244e2551d8901d853ab19461297ed55fb0b92ba0d84cc3de0789365b9e8714b5866174deae359325fedbecc9cd80f5a10416a1c165b795bcfb6645182290bed1948abe0b3fa8b6aa348677e9d5bc7f8267506bea15d4de9ece7b2b8b8e740d4ffa90a6fad3e2e9df1a992d9c473c05319cc970876d0f77108aab8929bfe7ef2b9a2078bb0c312b55dae37371d9030cdcabdbb68bcb9e510e1287131ac7512565aa23f16568bda73ebf494901e0ae6be3f45e7c93765d0644e4b7baf65a1d63b34602984b887b20b9a05c40386c74b3beeb039e74210fac9f67861d479d90e7fd37489eeddfa154ed615b642a34bdff10501180ce807aa07bbfb49eb5c172d00d5c2bd0b44240205dcfb32bf15e094700d0f9a4ad056e2989c90dbc42d1a740096922bb51cb17a153f5c8ad10987817843dea5b60ab742517a65562152640cd0e19f01c76eae131d4918538a9ce7f9c4409e4788c715a4086ec70142e9abadae1cb5b5e349ef733836adef4a87b4d5d6a88b329d7f862d103c284aab15312ebd625c41e807b2251214121549faa57608c4e08e04de661dd390d6f8c428b71d25dcb1ac9386340044577ed13555e3ecc0bacae8982ae859408e89171d29878518fadd5841524868bb78bdcd37a764668fe38e1f9e25b6e1d1e67675160a9f5a7351730159658fc68082f8dfe77331680b273c00eff7181e59dd4ed863fa778e94ff0f14a7dccfcba028b96daa2e7aaac1d4394d967c7736140202a60f143edb3c0ca9f176d8af84925dfd7a1905b13f67a148565fe204ea1bf7d6db53382e0d38f3f3626f90b9e0a063f1d338473aeab7700916f909096851cec21a3571f515cb0922f46411c8edf7b4880e13dad601a9b9ae6fc367152d53b1c913a933f8002d3cc0d81c80d9b98cfdfbf4e784248b3efecc795743800ef4c9786398720593905170c142fe69d0c11cf854951fefaf449be26f4ef1d31eec2c09378a1d96b8eb6ac53995d758854be92063db90e9da9ee592e5ce114ab97065304f683526571f32eb19cf62376c3f7f1ead92a73b6d24300cdbbd134a9fa8a9f32a8c5c8588c3ad6653577ad18b0a4e72def66de135cdd9e6d84c0cad341aeca369d34c05b6df21febd061d2f83d019c7052dd65f79c9ed45913487d3797b0abfd2f4f3133113db2a36345af852c030ae187e9f181f133a0b004b763bc19c9bacdd304f753bbf7a2d145a1e0b0e454c01823016056622dba46cc4bbf46089888f4c3b2d4ed7983be5638c74e12a6cb03b9b1c31b471430be277e2d3c32a33f2541c464b90f46cde0094e706579e580d1d0300806ccad32f98f88857a2723f891d3a3e41cc9dcbf950c5b93d640c549a1b54be3ff26c60779c63b91c0468c27334cc780dbea63dfb267aec81375cce837b794a0eac2e1b00c0f0f8367f0bfc1678e2d54ac56149d6dda062f1138ff6267b28806f4846428d96ff7d3fd4121993658f077ef2fa30aa32282b947568acd8b9da1037b2959a6e409ce3bcfe006a478fde10cc30d3ca3dee9ff6c34d54fb73eaa745255c1f5850dc1a2d4c7851300f091112f62dac1f224eb3dc1b42dbe95608560cabfa3610f9c7c491d254201147f311966ef14272cbcd1a45743f86be8702a952ed6db678e0924546915efd22428b8fd34b3eec65366e52089cb4638d25c68c648135486576f4f99df06fa86d1a285274f59538d3f523fd0a50449926c7973115144375577969142dce6bb7bd1dadc487b63f1fa9214fb9e392d69166bd671b509c98fda50a747ebe6d8f2c2646e713ec4fa13c808bc103ef62074027f46b0d02c5f909fc2c462b913610ffbb005d0646162734b007c72cd6d6c51ffc3af64020f15890dfc28f0139754ee6cddd272210378ed2c7868810fe1b293e8088f521854c395503d719abb24063f5fdee9e7604cbae1fccbfa33395ffd8829fa3edff7ef42cfa8606fb9ac08a505cc78cc0dca31261da570eb7cde1c155253ad84d20e7f6e8ba30b85c02a119edbb917e59f69d651f8192a216c79f3ee41f2ed05a0a2eeb6b51267136bac9435d51fe3902f7dcdabdf5c3938b4e18a9feb4f56f9d58687a5cb7147762e7b8ffb1ce21b614d25f63ebdbb13dddf6890ff8d767f9b8caf53b27822b8c98328da7bd0983badaae67e09105dca59e5b85150be7394349e7935919746c1884495a91d546c9452fa94fce62c5034df1ff69f542659ad6551b45388388ab4c6a8049da3f879330066e4ddf98968b063d7c8271d21c6948567130bc65aad2887681467e262654f86bcb6b4bad832be1777b9dc5cf5a1b79171ee64c11f1ad63be21736a11f2150533f57e71ee5ca4b92e262f35f2fc348067d11455a7fc4998aa9a8ae0c2bf6cc9b65eed18c9b2f71e5753c6ef6de82f7b259f1cf98577d16ebd44141790142e37e16d005b988a74742413d50b1e46a807900ea2d710cdee8a571c206cc90ffbe98033c659bcce83e191a85cf8866f55246066c0cc1a63bc43822387e70c1b1af3898c1534288db999dea0cf420b4a2f4a463e309c29f67bd09f3c4bf4be79026195bedd2991ec6a8f158f9a9f2bfb0e617644bd9243ba3f6d611ecdd4ad0082489bdcd284572ca9fb064e131f6ca545fa4b560ae6dd3da00085fbe9129df863505c43c1d1f9e635938b65e34dbe4e1bbf066d906555a9af710c09b1aec58b5a797f5e340e81c1f8748f95f839890d2c0c4553e6d702cd1f34ba689b7e1cc0da5ca27708a2276f82d2a8a9b5b41e424862eb3caa276ecd8910ca099429e46ad7cdf2296aca18513775a25243ec9a2fb81c3760622c561f906f0fe59e2568e5d368e4332104b168dca55838de769203e84909682aae14ed87dfe433c149b317eeaf1bfdccdf4dac06d30a21626c073bec75fdb77881864ffef054a7e42c940a8431412318ed92ec89061fb7e54aa9b3e89fbafe383ae0a564cc77ce8e4b6e4db22233d6a8a96ef5f71d63ea2ec6ac15f93b139118fa0783b9422e93f6d029f05f1fa9b2379becb9e33f5b0b11f5fad73bac38f09cdb4665feb9dce6f7b99488944a68553bf32b58f7a17176fef4136062b095c496b7962d0e63f5d86f37c11d3d337a93337f6d8ed45db13dd96d9b850930ced3346d4cf9f7f853ef27dbda723bb32d568757aa99ae018c68cf648300e4efebd8767bbbc5b5f69716bc55deb034eb11b5d25089fbd8be963e1b91229c663b39f889c800fb01873fe219a035ffcd9fa7f781f3610b0bde32aa222e32e293134e37f651571f1bc4171e39f2813672cee3fd13110bfac3230429b303733c111440e4fa29bb8077e0234024af5aa49d68d38057f5096387f674d3c715bac4721288f4a2c20d2a387a40ebd23ae2c70882c729c64087c01d97e3fdd5011b583aa65ed94f6192678a827ba700cf6ffd39d06b161a2dc8b0f41448768622b4a2e90b8f26e87fad6ac658bf3e4bacf596a8fd8c6849eee4402914b208f8dcdd0617898a857a10bc0e8e5a599b4f7766fed6667490a52d54828d835e373ce62af6324120bdbcdc015a0bbb0a3e1695efde7a634d1fe6f83cb43a448b8f4f46620bbc7a3ef78cd41ea830922631bc3751fcf909b3419bb13782cda930f59637e37d61b8db521eefc1eb1cd6e8c6d307990aaf863db8010fa28e94be165b0bd3223952aa2e452a6a309b6ad308a24f1be947a4f64861e8ac929726cf1901b6b6b342eea6d1fd2f6be290436b29351d7a2da8738d0f54d3f06f14fd439ca357da76ce3c053a40aa4c8f85b1713fc72a690b9f8a7bc977c7e24d1b6eaa3a61f2a983579df3cfa350fad32c7d6be3d7c2f47066c51de138d05675a5872943ee05f7c1eed1bb8fa56250719d8257a7a9d921cc3c26c13cc12166caa04dea656a904a4ea1ab0e57106beb92533c696955f0d06ebe419b975cb1e735f8fb7c3109322af5518e0f27e4d77d254a182f1dfbc71063a03f360e7276f962f305e1cfff9f57bc5b2dc7dce7afe8ab2f7b219857d171aa1e31", 0x1000, 0x5}, {&(0x7f0000000080)="eda83eb82a57077df99b5fb434bdd558852bd4d3b0ea835724645f0095b36508590011233372b84f83ddeed22ae9a7931e66b132a2ecb580e2969e52f19177ee6e76154c644f5dc0bcc2c405a52b108bd81562d595d810e89c20034e51b54653a8b59bf2ca9ea51db4ca5fc4a08363c4", 0x70, 0x4}, {&(0x7f0000000100)="20c070742698595e5b22f13faaec7db8e2794d1184fbdd81ad20c8151628e7beca7199e455e5ea118e3565557daaf47906e3849a8c22b3ce5423c992663aff4787721624713e339c876785e0ef78", 0x4e, 0x1f}, {&(0x7f0000000180), 0x0, 0x4}, {&(0x7f00000001c0)="27c09d4f1b7770d2bbbd4e5ecb3816d7a4167b29c9bb88823308f14d5e7c1f77055693c1a1578115036a38b2d958d53efb67dd5f524ccb40ac23952bf7e6554d1a3681e147ba46ac70710f9c10bb231a13f640d1635becd5b45b959b8031ce5a856fb158361f8984626b753d4e5b486a85691638bde8bc41b37d94c4573de953fd590d47fa7bc61548b9a549ef706ea9b7116392cb662db88150b026b158eb0eb3e64a13fd2c4870331a89931694a114c48f3cc791", 0xb5, 0x23}, {&(0x7f0000000280)="5c2519262c6f88a2e5756bf17ef1bc6b6df19eb5fbcfacd98ea17570c200752d80e6b5930482ad", 0x27, 0x3efd}, {&(0x7f00000002c0)="bd57e47b41b9756c116019f34b5ca2", 0xf, 0x1}], 0x60, &(0x7f0000000740)=ANY=[@ANYBLOB='uid=ignore,bs=00000000000000002048,uid=forget,gid=', @ANYRESDEC=0xee01, @ANYBLOB="2c6c617374626c6f636b3d30303030303030303030303030303030313032342c7569643dfeb376a41e125d00197f426bc491092b92c3d2bb8a3fba0b8233ec6136e5dfd5d2e638a761776b80d12617e09c79351ece712f91e796d6a62cba15a49ba547219385cb236a3c030f68415b7b53a8a6aeaf83eaa03ed01ed48bc321582d0336c7f2", @ANYRESDEC, @ANYBLOB=',\x00']) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000440)) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:06:38 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1, 0xffffff7f00000000}, 0x0) [ 628.245024][T23702] loop1: detected capacity change from 0 to 5 [ 628.320218][T23702] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:38 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) [ 628.416002][T23702] loop1: detected capacity change from 0 to 5 [ 628.452782][T23709] loop3: detected capacity change from 0 to 62 23:06:38 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r2 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x101) r3 = syz_open_dev$usbfs(&(0x7f0000000340), 0x1ff, 0x0) ioctl$USBDEVFS_BULK(r3, 0x80045505, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r2, 0xc0205648, &(0x7f0000000080)={0xa20000, 0x5, 0x401, r3, 0x0, &(0x7f0000000040)={0x9909da, 0x9, '\x00', @value=0x4}}) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T1(r4, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f0000000180)={0x1, @pix={0xbf3, 0x2, 0x50313459, 0x6, 0x8, 0x5, 0x1, 0x5, 0x0, 0x0, 0x1, 0x6}}) ioctl$sock_netrom_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x0, 0x6, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}) tee(r4, r0, 0x400, 0x1) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) [ 628.493194][T23702] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000080000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:38 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1, 0x0, 0x2}, 0x0) 23:06:38 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(0x0, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) [ 628.716988][T23709] loop3: detected capacity change from 0 to 62 [ 628.872499][T23734] loop1: detected capacity change from 0 to 5 23:06:39 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1, 0x0, 0x3}, 0x0) [ 629.011872][T23734] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 629.178928][T23734] loop1: detected capacity change from 0 to 5 [ 629.242279][T23734] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:39 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(0x0, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:06:39 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000041c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xd4}, 0x8, 0x0, 0x80000000, 0x0, 0x2}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x30, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$usbfs(&(0x7f0000000340), 0x1ff, 0x0) ioctl$USBDEVFS_BULK(r2, 0x80045505, 0x0) write(r2, &(0x7f0000000000)="2bbf6b2df93eb2c7f56bca0c5f40d13999d4db5cc8f50441fe37a7a096ca0720eaae668001041a153728c3e1a9fdeac328d12fd30b2f55b6f6a21e8f93a2832399032dfa36fa460cabc67264d3f13c420a8f7f8861a53a563fb0d8cf072002fd15c012c9df", 0x65) r3 = socket$pppl2tp(0x18, 0x1, 0x1) write(r3, &(0x7f0000000080)="52eb5b452c4d97089b445071a242101591e2d8df8d6b1186f106bf86ff49afb250ef77af93c0bb4f6334e1da04e72a45502401217243826eb3bdf82b25c2212b0c9f2df46101f7bd7632023cc5c31360d3a781cfeb40a6c04acfcf567172bae74064dbb38b726b7e4fc3db5c87003bf4d175a1f8ec141018f5fcedc0b49fd7efc44f4131a2d123b20d534ab3d85b1ab30a6d33d4f22bdd6c008a9372a1401d0353ca9266dd9bcdea0d88d7217e54fa2c0dc2757b66dc161e40b76793ff96e5ef", 0xc0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:06:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20ffffe0000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:39 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1, 0x0, 0x4}, 0x0) 23:06:39 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) io_setup(0x3, &(0x7f0000000140)=0x0) io_pgetevents(r2, 0x5, 0x5, &(0x7f00000004c0)=[{}, {}, {}, {}, {}], &(0x7f0000002680)={0x0, 0x3938700}, &(0x7f0000000380)={&(0x7f0000000000), 0x8}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = fcntl$getown(r3, 0x9) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r6 = dup(r5) setsockopt$bt_rfcomm_RFCOMM_LM(r6, 0x12, 0x3, &(0x7f0000000040), 0x4) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x9, 0x20, 0x9, 0x0, 0x7, 0x4, 0x8, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6b89, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}, 0x4732, 0x8, 0xffff, 0x5, 0x100000001, 0x48, 0x5, 0x0, 0x3, 0x0, 0x3}, r4, 0xe, r6, 0x0) io_submit(r2, 0x1, &(0x7f00000000c0)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x2, 0xf3ea, r1, &(0x7f0000000000)="4cf3892259395070ad00399804735906b1c47c888b7807824160949c45e8c6f1a815c28c119889ff0fdbde10d8b7ca477c25c87ea210d7c554484f4b2845d4aa68f016b697b2490251d6352d7087b9bccf12d5113782b46da5ea94a1cc9cc991b4ae1f", 0x63, 0x7, 0x0, 0x3, r6}]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(0xffffffffffffffff, 0x800442d4, &(0x7f0000000a40)=0x1) fcntl$dupfd(r1, 0x406, r0) 23:06:39 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getown(r2, 0x9) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) [ 629.540883][T23760] loop1: detected capacity change from 0 to 5 [ 629.564481][T23760] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:39 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1, 0x0, 0x300}, 0x0) 23:06:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000010100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:40 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1, 0x0, 0x2000}, 0x0) 23:06:40 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) [ 630.219080][T23778] loop1: detected capacity change from 0 to 5 23:06:40 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1, 0x0, 0x34000}, 0x0) [ 630.264055][T23778] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 630.370062][T23778] loop1: detected capacity change from 0 to 5 [ 630.403689][T23778] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:40 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="6ebb5bc665f23aff7a20303000003030302c300600000000000001000080b3000d50318386db9f354337f5aa0a420b1e89d656b030a726016d3cce77fa28fe127149c6e137e4d5e1ba1763fe4ad3d8c7dea11413fbed9cec51bcdff4ca3a0287647f7c4bb6bb86be778997156e000015a5471425dea15b7e8ffd366f569ed595d14b0e8749e644ca0a4fbec51a9ec09ab870467533bc94a8471baba2170e706e5dde8d648992575d1ae2aa200c11066b6dc7c35c0d5db17aabbeee0b46a01297f2293087f43708000000000000000000e8b7fafbdec4813fcce5f4c1bf9413538602d3b8fff31277d6bc880fa1bae503101230fa21fdec5dc68f44f1037f0c81c5a90a87caf16e2d362b50ce63a60556fdf5adc2732a8e1f9b693b6dfd3167970203a1ed1826acf1f8850137386408d01b691831f7412ee3d2f6f8faf72d7242d62eb4d55288a731e7a3f1b57c0940f54ef23160853e572f5348c71e7e678bbf1d949bcbfe66982b1d243d3a11d6d23230b85b4bbbc0961111bc16fe07c2a56814961b745e3ca047bfc68bd6aba88eea427fcb07b4ea123bc4637468035300612cbd511855869a3a2664"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x0, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5cb445d11a3786595100ced0dc61ab58b3ce6c488aa0ebf") 23:06:40 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1, 0x0, 0x400300}, 0x0) 23:06:40 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:06:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000020100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:40 executing program 4: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5cb445d11a3786595100ced0dc61ab58b3ce6c488aa0ebf") 23:06:40 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) [ 630.813176][T23805] loop1: detected capacity change from 0 to 5 23:06:41 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1, 0x0, 0x1000000}, 0x0) [ 630.890241][T23805] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 631.123025][T23805] loop1: detected capacity change from 0 to 5 [ 631.179183][T23805] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:41 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1, 0x0, 0x2000000}, 0x0) 23:06:41 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x0, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5cb445d11a3786595100ced0dc61ab58b3ce6c488aa0ebf") 23:06:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000030100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:41 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:06:41 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:06:41 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1, 0x0, 0x3000000}, 0x0) [ 631.560865][T23834] loop1: detected capacity change from 0 to 5 [ 631.599979][T23834] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 631.710947][T23834] loop1: detected capacity change from 0 to 5 [ 631.721708][T23834] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:42 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1, 0x0, 0x4000000}, 0x0) 23:06:42 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x4000010, 0xffffffffffffffff, 0x72673000) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB="31953d", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r2, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r2, &(0x7f0000004200)={0x50, 0x0, r3}, 0x50) write$FUSE_GETXATTR(r1, &(0x7f0000000000)={0x18, 0xfffffffffffffff5, r3, {0x4}}, 0x18) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:06:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000040100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:42 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x0, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5cb445d11a3786595100ced0dc61ab58b3ce6c488aa0ebf") 23:06:42 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:06:42 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) [ 632.101948][T23858] loop1: detected capacity change from 0 to 5 23:06:42 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1, 0x0, 0x20000000}, 0x0) [ 632.147975][T23858] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 632.261039][T23858] loop1: detected capacity change from 0 to 5 [ 632.358499][T23858] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:42 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1, 0x0, 0xfbffffff}, 0x0) 23:06:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000050100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:43 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="6ebb5bc665f23aff7a20303000003030302c300600000000000001000080b3000d50318386db9f354337f5aa0a420b1e89d656b030a726016d3cce77fa28fe127149c6e137e4d5e1ba1763fe4ad3d8c7dea11413fbed9cec51bcdff4ca3a0287647f7c4bb6bb86be778997156e000015a5471425dea15b7e8ffd366f569ed595d14b0e8749e644ca0a4fbec51a9ec09ab870467533bc94a8471baba2170e706e5dde8d648992575d1ae2aa200c11066b6dc7c35c0d5db17aabbeee0b46a01297f2293087f43708000000000000000000e8b7fafbdec4813fcce5f4c1bf9413538602d3b8fff31277d6bc880fa1bae503101230fa21fdec5dc68f44f1037f0c81c5a90a87caf16e2d362b50ce63a60556fdf5adc2732a8e1f9b693b6dfd3167970203a1ed1826acf1f8850137386408d01b691831f7412ee3d2f6f8faf72d7242d62eb4d55288a731e7a3f1b57c0940f54ef23160853e572f5348c71e7e678bbf1d949bcbfe66982b1d243d3a11d6d23230b85b4bbbc0961111bc16fe07c2a56814961b745e3ca047bfc68bd6aba88eea427fcb07b4ea123bc4637468035300612cbd511855869a3a2664"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 23:06:43 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:06:43 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1, 0x0, 0xffffff7f}, 0x0) [ 632.922732][T23887] loop1: detected capacity change from 0 to 5 23:06:43 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000b2e000/0x2000)=nil) [ 632.995834][T23887] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:43 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f00002ef000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x10778000) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x48800, 0x0) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="2321202e2f66696c653020285d0aec9676aafc2ed7fa0e12f19127e4af829dac694698a0f901d7b4de55cc684cb49df28d67403d04252f06660cc4cf863806a73c8bbe38189633877915b91f3dfd45c294ad5af84e4ef50d846a8dc595526344039e5875b230f4d5ee1407cdb70ac00a01f1bc30663b9c7e7158d28f99787e6a5e6cc9934d41f73f6483d2b43273e0b1f2bc86a15ad94f8fac76ac8204954f01cd561622a8cc5f0bdc8a170c7ae20cfb6aaac5131ad4072a9600934fcd55be2e8781411d9892e8239400ffdb8b1630d7fc7d5cf8af8621f98ba9d5"], 0xab) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:06:43 executing program 4: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5cb445d11a3786595100ced0dc61ab58b3ce6c488aa0ebf") [ 633.088761][T23887] loop1: detected capacity change from 0 to 5 [ 633.109575][T23887] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:43 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1, 0x0, 0xfffffffb}, 0x0) 23:06:43 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) 23:06:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000060100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:43 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1, 0x0, 0x40030000000000}, 0x0) 23:06:43 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) [ 633.640104][T23918] loop1: detected capacity change from 0 to 5 23:06:44 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) [ 633.800430][T23918] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:44 executing program 4: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5cb445d11a3786595100ced0dc61ab58b3ce6c488aa0ebf") 23:06:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000070100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:44 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1, 0x0, 0x100000000000000}, 0x0) 23:06:44 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) [ 634.226085][T23936] loop1: detected capacity change from 0 to 5 [ 634.350231][T23936] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 634.434870][T23936] loop1: detected capacity change from 0 to 5 [ 634.504134][T23936] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:45 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) ioctl$RTC_VL_CLR(r1, 0x7014) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_BALANCE_CTL(r2, 0x40049421, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:06:45 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1, 0x0, 0x200000000000000}, 0x0) 23:06:45 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:06:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000080100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:45 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) 23:06:45 executing program 4: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5cb445d11a3786595100ced0dc61ab58b3ce6c488aa0ebf") [ 634.957215][T23963] loop1: detected capacity change from 0 to 5 23:06:45 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r2, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) [ 635.038720][T23963] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:45 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1, 0x0, 0x300000000000000}, 0x0) [ 635.274405][T23963] loop1: detected capacity change from 0 to 5 [ 635.417921][T23963] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000090100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:45 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1, 0x0, 0x400000000000000}, 0x0) 23:06:46 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) 23:06:46 executing program 4: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5cb445d11a3786595100ced0dc61ab58b3ce6c488aa0ebf") [ 635.948606][T23987] loop1: detected capacity change from 0 to 5 [ 636.012195][T23987] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 636.180120][T23987] loop1: detected capacity change from 0 to 5 [ 636.210543][T23987] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:46 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1, 0x0, 0x2000000000000000}, 0x0) 23:06:46 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:06:46 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) 23:06:46 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000000340), 0x1ff, 0x0) dup(r2) ioctl$USBDEVFS_BULK(r3, 0x80045505, 0x0) ioctl$BTRFS_IOC_SCRUB(r3, 0xc400941b, &(0x7f0000000000)={0x0, 0xa89, 0x70b, 0x1}) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r4 = syz_open_dev$usbfs(&(0x7f0000000340), 0x1ff, 0x0) ioctl$USBDEVFS_BULK(r4, 0x80045505, 0x0) ioctl$USBDEVFS_IOCTL(r4, 0xc0105512, &(0x7f0000000400)=@usbdevfs_disconnect={0x8001}) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:06:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000a0100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:47 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) ioctl$RTC_VL_CLR(r1, 0x7014) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$BTRFS_IOC_BALANCE_CTL(r2, 0x40049421, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) [ 636.849282][T24015] loop1: detected capacity change from 0 to 5 23:06:47 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1, 0x0, 0xfbffffff00000000}, 0x0) [ 636.923010][T24015] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:47 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="6ebb5bc665f23aff7a20303000003030302c300600000000000001000080b3000d50318386db9f354337f5aa0a420b1e89d656b030a726016d3cce77fa28fe127149c6e137e4d5e1ba1763fe4ad3d8c7dea11413fbed9cec51bcdff4ca3a0287647f7c4bb6bb86be778997156e000015a5471425dea15b7e8ffd366f569ed595d14b0e8749e644ca0a4fbec51a9ec09ab870467533bc94a8471baba2170e706e5dde8d648992575d1ae2aa200c11066b6dc7c35c0d5db17aabbeee0b46a01297f2293087f43708000000000000000000e8b7fafbdec4813fcce5f4c1bf9413538602d3b8fff31277d6bc880fa1bae503101230fa21fdec5dc68f44f1037f0c81c5a90a87caf16e2d362b50ce63a60556fdf5adc2732a8e1f9b693b6dfd3167970203a1ed1826acf1f8850137386408d01b691831f7412ee3d2f6f8faf72d7242d62eb4d55288a731e7a3f1b57c0940f54ef23160853e572f5348c71e7e678bbf1d949bcbfe66982b1d243d3a11d6d23230b85b4bbbc0961111bc16fe07c2a56814961b745e3ca047bfc68bd6aba88eea427fcb07b4ea123bc4637468035300612cbd511855869a3a2664"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) [ 637.049918][T24015] loop1: detected capacity change from 0 to 5 [ 637.062092][T24015] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000c0100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:47 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1, 0x0, 0xffffff7f00000000}, 0x0) 23:06:47 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) [ 637.860645][T24044] loop1: detected capacity change from 0 to 5 23:06:48 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) [ 637.931272][T24044] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:48 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x0) 23:06:48 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) [ 638.092562][T24044] loop1: detected capacity change from 0 to 5 [ 638.156437][T24044] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:48 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1, 0x0, 0x0, 0x2}, 0x0) 23:06:48 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x8, 0x9, 0x8, 0x8, 0x0, 0x4, 0x10, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1ed0c18b, 0x2, @perf_bp={&(0x7f0000000080)}, 0x4000, 0x89, 0x9, 0x1, 0xcb7b3a4, 0x6, 0x1c6, 0x0, 0x1, 0x0, 0x3}, 0x0, 0x4, r2, 0x2) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) socket(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r5, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="3800000024000b0e000000000000000000000000558d933e0e79a7478576f8f4128ae37d67b32aa19e94252efc8a81857f050152c82f", @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100686866000c00020008000400fcffffff"], 0x38}}, 0x0) bind$can_j1939(r1, &(0x7f0000000000)={0x1d, r5, 0x0, {0x0, 0x1, 0x3}}, 0x18) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:06:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000d0100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:48 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000000340), 0x1ff, 0x0) dup(r2) ioctl$USBDEVFS_BULK(r3, 0x80045505, 0x0) ioctl$BTRFS_IOC_SCRUB(r3, 0xc400941b, &(0x7f0000000000)={0x0, 0xa89, 0x70b, 0x1}) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r4 = syz_open_dev$usbfs(&(0x7f0000000340), 0x1ff, 0x0) ioctl$USBDEVFS_BULK(r4, 0x80045505, 0x0) ioctl$USBDEVFS_IOCTL(r4, 0xc0105512, &(0x7f0000000400)=@usbdevfs_disconnect={0x8001}) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:06:48 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) 23:06:48 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1, 0x0, 0x0, 0x3}, 0x0) 23:06:48 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) [ 638.718461][T24071] loop1: detected capacity change from 0 to 5 [ 638.773531][T24071] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 638.961544][T24071] loop1: detected capacity change from 0 to 5 [ 639.009065][T24069] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 23:06:49 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) [ 639.064595][T24067] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 23:06:49 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1, 0x0, 0x0, 0x4}, 0x0) 23:06:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000f0100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:49 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) 23:06:49 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1, 0x0, 0x0, 0x300}, 0x0) [ 639.657557][T24098] loop1: detected capacity change from 0 to 5 [ 639.809342][T24098] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 639.899844][T24106] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 639.921121][T24067] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 23:06:50 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) [ 639.950565][T24098] loop1: detected capacity change from 0 to 5 [ 640.005764][T24098] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:50 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:06:50 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:06:50 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1, 0x0, 0x0, 0x2000}, 0x0) 23:06:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000100100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:50 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) 23:06:50 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000000), 0x2, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = fcntl$getown(r3, 0x9) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r6 = dup(r5) setsockopt$bt_rfcomm_RFCOMM_LM(r6, 0x12, 0x3, &(0x7f0000000040), 0x4) r7 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x9, 0x20, 0x9, 0x0, 0x7, 0x4, 0x8, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6b89, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}, 0x4732, 0x8, 0xffff, 0x5, 0x100000001, 0x48, 0x5, 0x0, 0x3, 0x0, 0x3}, r4, 0xe, r6, 0x0) ioctl$BLKZEROOUT(r6, 0x127f, &(0x7f0000000040)={0x6, 0x2}) ioctl$FIOCLEX(r2, 0x5451) io_pgetevents(0x0, 0x5, 0x5, &(0x7f00000004c0)=[{}, {}, {}, {}, {}], &(0x7f0000002680)={0x0, 0x3938700}, &(0x7f0000000380)={&(0x7f0000000000), 0x8}) r8 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) io_submit(0x0, 0x6, &(0x7f00000005c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x3, 0x1, r7, &(0x7f0000000080)="86e8bde813297acadf29", 0xa, 0x8, 0x0, 0x3, r6}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x6, 0x7, r5, &(0x7f0000000140)="5ebadd4697", 0x5, 0x2, 0x0, 0x2}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x7, r2, &(0x7f00000001c0)="d47039da95b6d6f66e3f0c9737268d02222898059bca783a2a78c6e162211239252d0b95a8163b6fed39011f5f808db2d8ba79f08146869cf1575fe088b924aeb9869ba0ad5cf11b89d64820d6df95e4169a30e1514d25e6f76a", 0x5a, 0x3, 0x0, 0x2, r8}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2, 0x3, r5, &(0x7f0000000340)="c0a185fcd60eebd1744f50985eb34e1bdd6ae65ad394b1d77ffc0ff87c7fd71255035c62138f71f732051f9a29c80feaa57f3c231514fec65a02b030b5b9ce575176d9515a2140c36b98034b0b638c7c0934350ca4fb18c6640b93d380949ddfe384267c1fb52c4c7326d6b058a0f3d0c0713e112b6f8ace74f0cef7f542f861ac76832543ce4752cb693bd08c1fff0e54195aa57083a3883d51ad31", 0x9c, 0x6, 0x0, 0x1, r6}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x3, 0x20, r9, &(0x7f0000000480)="8d10ba577e06f08f97853eab7468520dcc37c13d6c9e17f17b4f6646b20de47d6cb85e9e78e0e85e8195939f56a0cbb5af6ca492f8df8dbb5d00a0f23e2c91932013a379dce37d53857394e337ffeb618c2fd74a", 0x54, 0x4, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x1, r0, &(0x7f0000000540)="cecba0cf0c0731a8415468fb0ecd069a2227cea46b37a584e41f8d102bef224c4cc87ce7aa0e67bf0d261716916da4f2a9d83df6befd", 0x36, 0xdd, 0x0, 0x2, r6}]) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) [ 640.445560][T24127] loop1: detected capacity change from 0 to 5 [ 640.541408][T24127] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:50 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1, 0x0, 0x0, 0x34000}, 0x0) [ 640.709218][T24127] loop1: detected capacity change from 0 to 5 23:06:50 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) [ 640.782927][T24127] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000110100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:51 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1, 0x0, 0x0, 0x400300}, 0x0) 23:06:51 executing program 2: shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) 23:06:51 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) [ 641.348387][T24152] loop1: detected capacity change from 0 to 5 [ 641.417323][T24152] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:51 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1, 0x0, 0x0, 0x1000000}, 0x0) 23:06:51 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:06:51 executing program 2: shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) 23:06:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000001f0100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:52 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) [ 641.940454][T24170] loop1: detected capacity change from 0 to 5 23:06:52 executing program 2: shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) [ 642.045319][T24170] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:52 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_netrom_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x1, @default, @netrom={'nr', 0x0}, 0x9, 'syz0\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x6, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}) ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000000)={0x0, 0xfff, 0x101}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:06:52 executing program 2: shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) 23:06:52 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1, 0x0, 0x0, 0x3000000}, 0x0) [ 642.259950][T24170] loop1: detected capacity change from 0 to 5 23:06:52 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) [ 642.313651][T24170] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:52 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:06:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000200100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:52 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) [ 642.864701][T24198] loop1: detected capacity change from 0 to 5 23:06:53 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x8, 0x9, 0x8, 0x8, 0x0, 0x4, 0x10, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1ed0c18b, 0x2, @perf_bp={&(0x7f0000000080)}, 0x4000, 0x89, 0x9, 0x1, 0xcb7b3a4, 0x6, 0x1c6, 0x0, 0x1, 0x0, 0x3}, 0x0, 0x4, r2, 0x2) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) socket(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r5, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="3800000024000b0e000000000000000000000000558d933e0e79a7478576f8f4128ae37d67b32aa19e94252efc8a81857f050152c82f", @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100686866000c00020008000400fcffffff"], 0x38}}, 0x0) bind$can_j1939(r1, &(0x7f0000000000)={0x1d, r5, 0x0, {0x0, 0x1, 0x3}}, 0x18) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) [ 642.960877][T24198] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 643.151020][T24198] loop1: detected capacity change from 0 to 5 [ 643.204268][T24198] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:53 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 23:06:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000010200100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:53 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:06:53 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000), 0x48842, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:06:53 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1, 0x0, 0x0, 0xfbffffff}, 0x0) [ 643.700933][T24213] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 643.737317][T24222] loop1: detected capacity change from 0 to 5 [ 643.780525][T24217] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 643.816856][T24222] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 643.911098][T24222] loop1: detected capacity change from 0 to 5 [ 643.969097][T24222] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:54 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) 23:06:54 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_netrom_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x1, @default, @netrom={'nr', 0x0}, 0x9, 'syz0\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x6, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}) ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000000)={0x0, 0xfff, 0x101}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:06:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20982b59270100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:54 executing program 4: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) 23:06:54 executing program 3: ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={0x0, @tipc=@nameseq={0x1e, 0x1, 0x2, {0x41, 0x1}}, @isdn={0x22, 0x3, 0x6, 0xb1, 0x75}, @qipcrtr={0x2a, 0x3, 0x4000}, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)='geneve1\x00', 0x10000, 0x2, 0x5}) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_netrom_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x1, @default, @netrom={'nr', 0x0}, 0x9, 'syz0\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x6, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) [ 644.452119][T24247] loop1: detected capacity change from 0 to 5 [ 644.499647][T24247] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:54 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}, 0x1, 0x0, 0x0, 0xfffffffb}, 0x0) [ 644.682601][T24247] loop1: detected capacity change from 0 to 5 [ 644.763963][T24247] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:55 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:06:55 executing program 4: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) 23:06:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003f0100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:55 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x2) [ 645.301776][T24275] loop1: detected capacity change from 0 to 5 23:06:55 executing program 4: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) [ 645.448282][T24275] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 645.603006][T24275] loop1: detected capacity change from 0 to 5 [ 645.665856][T24275] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:55 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x3) 23:06:55 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f00002ef000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x10778000) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x48800, 0x0) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="2321202e2f66696c653020285d0aec9676aafc2ed7fa0e12f19127e4af829dac694698a0f901d7b4de55cc684cb49df28d67403d04252f06660cc4cf863806a73c8bbe38189633877915b91f3dfd45c294ad5af84e4ef50d846a8dc595526344039e5875b230f4d5ee1407cdb70ac00a01f1bc30663b9c7e7158d28f99787e6a5e6cc9934d41f73f6483d2b43273e0b1f2bc86a15ad94f8fac76ac8204954f01cd561622a8cc5f0bdc8a170c7ae20cfb6aaac5131ad4072a9600934fcd55be2e8781411d9892e8239400ffdb8b1630d7fc7d5cf8af8621f98ba9d5"], 0xab) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:06:56 executing program 4: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) 23:06:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000480100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:56 executing program 3: r0 = socket(0x10, 0x2, 0x3) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000040), 0x6e, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/233, 0xe9}, {&(0x7f00000001c0)=""/180, 0xb4}, {&(0x7f0000000280)=""/165, 0xa5}, {&(0x7f0000000340)=""/94, 0x5e}], 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000002c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000005ed19507000000cb186cc4105c7b4f41689e957f81b41ec094dba3240d177eb46204e0840f12e65e0b372312e98566"], 0xe8}, 0x121) stat(&(0x7f0000000400)='./file3\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000003c0)='./bus\x00', &(0x7f0000000540)='system.posix_acl_access\x00', &(0x7f00000008c0)={{}, {}, [{0x2, 0x3}], {}, [{}, {0x8, 0x3, r3}]}, 0x3c, 0x0) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000600)={{}, {0x1, 0x1}, [{0x2, 0x0, r1}, {0x2, 0x0, 0xee01}, {0x2, 0x1, r2}], {0x4, 0x2}, [{0x8, 0x0, r3}, {0x8, 0x1, r4}], {0x10, 0x3}, {0x20, 0x6}}, 0x4c, 0x3) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r6 = dup(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r5, r6, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r6, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r5, 0x5451) syz_read_part_table(0x7, 0x2, &(0x7f0000000840)=[{&(0x7f0000000440)="db55ff92c28505c478d2b5c9236f488f7e05ecb20d8955a850e5c516ec401683b6233a3f15b19a96de9e97d9184add53b292b00da22b6369b07fcd0059415aaad3ce10fa8758e5471b5bf92e80ff2da9f64b64f498c13372ac71c21d8a2de6fb9436667914ab74155d0f54c86700dd9a81b002", 0x73, 0xcc3}, {&(0x7f00000007c0)="55a4cd7d5a179d560205d6c1c3fdf5bc7e5556f8eeb4785864bdff046c5306606b162dff72488869752498eabb875b1218ef091ecbfba66de5c426d36ae2482525ae71542ece9ad3c4521c6ebd75f43969", 0x51, 0x6}]) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:06:56 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:06:56 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x4) 23:06:56 executing program 4: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) [ 646.183417][T24302] loop1: detected capacity change from 0 to 5 [ 646.245153][T24298] loop3: detected capacity change from 0 to 12 [ 646.352307][T24298] Dev loop3: unable to read RDB block 12 [ 646.358251][T24298] loop3: unable to read partition table [ 646.364631][T24302] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:56 executing program 4: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$6lowpan_control(0xffffffffffffffff, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) [ 646.438864][T24302] loop1: detected capacity change from 0 to 5 [ 646.458726][T24302] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:56 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x300) [ 646.523329][T24298] loop3: partition table beyond EOD, truncated [ 646.529852][T24298] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 23:06:56 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:06:56 executing program 4: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$6lowpan_control(0xffffffffffffffff, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) 23:06:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004c0100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) [ 647.106824][T24337] loop1: detected capacity change from 0 to 5 [ 647.157689][T24337] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 647.354806][T24301] loop3: detected capacity change from 0 to 12 [ 647.419651][T24337] loop1: detected capacity change from 0 to 5 [ 647.430669][ T2976] Dev loop3: unable to read RDB block 12 [ 647.436798][ T2976] loop3: unable to read partition table [ 647.455214][ T2976] loop3: partition table beyond EOD, truncated [ 647.468431][T24337] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 647.481057][T24301] Dev loop3: unable to read RDB block 12 [ 647.487025][T24301] loop3: unable to read partition table [ 647.500733][T24301] loop3: partition table beyond EOD, truncated [ 647.507776][T24301] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 23:06:57 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000280)=""/203, 0xcb) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) r2 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x3, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) shmat(r3, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f00004e8000/0x3000)=nil) shmat(r2, &(0x7f0000be4000/0x2000)=nil, 0x3000) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000b2e000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x2100200, &(0x7f0000000000)="611b", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a8cfb5c94d418b000bc47629d5d5da95ef3b76aa22de448dbd2af2b94bc332534f297186bd1eec78752e731343c3a2fb651a891926d5a3e4e96c6984ec4a931dc262048db5f35c82d88e5939954bacf491c6039209ea90893b6aecaceb7e9eca5cd1121c0cf7754df8d740d069a64f1ad29994c63c8a8901a72eb440e1481cd64a67c1f3f4722c929d70f9c12af2d4df168c4bc9d34f5e975b8b883682be08901e3834d5cb445d11a3786595100ced0dc61ab58b3ce6c488aa0ebf") 23:06:57 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x2000) 23:06:57 executing program 4: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$6lowpan_control(0xffffffffffffffff, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) [ 647.545945][ T2976] Dev loop3: unable to read RDB block 12 [ 647.552032][ T2976] loop3: unable to read partition table [ 647.596116][ T2976] loop3: partition table beyond EOD, truncated 23:06:58 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:06:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000600100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:58 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:06:58 executing program 4: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) 23:06:58 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x34000) [ 648.012667][T24362] loop1: detected capacity change from 0 to 5 [ 648.214872][T24362] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:58 executing program 4: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) [ 648.493734][T24362] loop1: detected capacity change from 0 to 5 23:06:58 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x400300) [ 648.667078][T24362] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:58 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getown(r2, 0x9) 23:06:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000680100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:06:59 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r1, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:06:59 executing program 4: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) 23:06:59 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x1000000) [ 649.299017][T24400] loop1: detected capacity change from 0 to 5 [ 649.398140][T24400] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 649.560858][T24400] loop1: detected capacity change from 0 to 5 [ 649.605661][T24400] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:06:59 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffe}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) vmsplice(r2, &(0x7f0000000100)=[{&(0x7f0000000000)="adf4c1c1320f60ad26f1398933a6069c4812ae507d7222f6007554692f5abce03cc4e867ef55857aca76c05a6b6dbc5357b7c9017ea6845b9e9f793c3211769269f59e64417fc5983b775038ea380ecbb566e8792e33169765cef0ad374c8a3e0e68fa3e1c24420985190765976abeb4c31d05ba1d0eb9ed576c6585fb8eff22bc384c7b91e981fff7abaa491781559efa85b5ce060cd0cb3c923e750b9b3d65fd0be9cb04e4d1ee37fcbf10dce92cc6cca7f65c1e08d6769811e1f587acbc52b435f98e12bb15b6258b6c40c668604c88573bd4c9374b60fd113622073288eaf5625453e0ef926db6b1613484e5568b0108901741d0d8d5d8", 0xf9}], 0x1, 0x6) mremap(&(0x7f0000106000/0x2000)=nil, 0x2000, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) 23:06:59 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r1, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:06:59 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x2000000) 23:06:59 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) 23:07:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006c0100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:07:00 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getown(r2, 0x9) 23:07:00 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x3000000) 23:07:00 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) [ 650.061954][T24425] loop1: detected capacity change from 0 to 5 [ 650.138795][T24425] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:07:00 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x4000000) [ 650.224767][T24425] loop1: detected capacity change from 0 to 5 23:07:00 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r1, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) [ 650.301867][T24425] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:07:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000740100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:07:00 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) [ 650.769353][T24454] loop1: detected capacity change from 0 to 5 [ 650.812535][T24454] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 650.895636][T24454] loop1: detected capacity change from 0 to 5 [ 650.915384][T24454] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:07:01 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x0, 0x6, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}) dup2(r0, 0xffffffffffffffff) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r2, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r1, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:07:01 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x20000000) 23:07:01 executing program 4: perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) 23:07:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000007a0100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:07:01 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x10, r1, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:07:01 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getown(r2, 0x9) 23:07:01 executing program 4: perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) 23:07:01 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}}, 0xfbffffff) [ 651.307847][T24473] loop1: detected capacity change from 0 to 5 [ 651.415840][T24473] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 651.631886][T24473] loop1: detected capacity change from 0 to 5 23:07:02 executing program 4: perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) 23:07:02 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}}, 0xffffff7f) 23:07:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20ffffff8c0100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:07:02 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x10, r1, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) [ 652.284707][T24503] loop1: detected capacity change from 0 to 5 [ 652.352332][T24503] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 652.459242][T24503] loop1: detected capacity change from 0 to 5 [ 652.510705][T24503] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:07:03 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)={0x2, [0x0, 0x0]}, &(0x7f0000000040)=0xc) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000080)={r2, 0xd4c}, &(0x7f00000000c0)=0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) r4 = signalfd4(r0, &(0x7f0000000100)={[0x9]}, 0x8, 0x800) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000140)={r3, @in={{0x2, 0x4e21, @multicast1}}, 0x4, 0x6ab3}, 0x90) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:07:03 executing program 4: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) 23:07:03 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}}, 0xfffffffb) 23:07:03 executing program 2: perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) 23:07:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20ffffff970100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:07:03 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x10, r1, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) [ 653.010857][T24525] loop1: detected capacity change from 0 to 5 23:07:03 executing program 4: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) [ 653.140762][T24525] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:07:03 executing program 2: perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) 23:07:03 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x40030000000000) [ 653.290722][T24525] loop1: detected capacity change from 0 to 5 [ 653.403705][T24525] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:07:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2027592b980100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:07:03 executing program 4: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) 23:07:03 executing program 2: perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) [ 653.742945][T24549] loop1: detected capacity change from 0 to 5 [ 653.787056][T24549] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 653.892997][T24549] loop1: detected capacity change from 0 to 5 [ 653.998493][T24549] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:07:04 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:07:04 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x100000000000000) 23:07:04 executing program 4: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) 23:07:04 executing program 2: perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$6lowpan_control(0xffffffffffffffff, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) 23:07:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000fb10100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:07:04 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x5, 0x80, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x41c1, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0x2, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) [ 654.322227][T24574] loop1: detected capacity change from 0 to 5 23:07:04 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x200000000000000) 23:07:04 executing program 4: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) [ 654.459699][T24574] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:07:04 executing program 2: perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$6lowpan_control(0xffffffffffffffff, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) [ 654.650518][T24574] loop1: detected capacity change from 0 to 5 [ 654.707794][T24574] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:07:05 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) 23:07:05 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x300000000000000) 23:07:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000edc00100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:07:05 executing program 4: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) 23:07:05 executing program 2: perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$6lowpan_control(0xffffffffffffffff, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) 23:07:05 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x400000000000000) [ 655.099050][T24604] loop1: detected capacity change from 0 to 5 [ 655.131349][T24604] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:07:05 executing program 4: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(0xffffffffffffffff, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) 23:07:05 executing program 2: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) [ 655.276653][T24604] loop1: detected capacity change from 0 to 5 [ 655.379453][T24604] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:07:05 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000040)=0x100000001) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 23:07:05 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}}, 0x2000000000000000) 23:07:05 executing program 4: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(0xffffffffffffffff, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) 23:07:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20f14e8ac30100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:07:05 executing program 2: r0 = openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) 23:07:05 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) [ 655.808795][T24633] loop1: detected capacity change from 0 to 5 [ 655.826861][T24633] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:07:06 executing program 4: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(0xffffffffffffffff, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) 23:07:06 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}}, 0xfbffffff00000000) [ 655.939622][T24633] loop1: detected capacity change from 0 to 5 [ 656.009399][T24633] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 23:07:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20c38a4ef10100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b04", 0x66, 0x400}, {&(0x7f0000010200)="05000000000000000000000000000000000000000401", 0x16, 0x560}], 0x0, &(0x7f00000002c0)=ANY=[]) 23:07:06 executing program 2: r0 = openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000380)='disconnect aa:aa:aa:aa:aa:10 0', 0x1e) 23:07:06 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff0200130002000000e0bfffff00000000030006000000000002004e23e0000001000000000000002402000100f8beffff0000001b00010000030005000000000002"], 0x60}}, 0xffffff7f00000000) 23:07:06 executing program 4: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$6lowpan_control(r0, 0x0, 0x0) [ 656.500130][T24660] loop1: detected capacity change from 0 to 5 [ 656.559407][T24660] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 656.677948][T24660] loop1: detected capacity change from 0 to 5 [ 656.713159][T24660] EXT4-fs (loop1): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 687.656020][ T1196] ieee802154 phy0 wpan0: encryption failed: -22 [ 687.662406][ T1196] ieee802154 phy1 wpan1: encryption failed: -22 [ 752.430256][ T1196] ieee802154 phy0 wpan0: encryption failed: -22 [ 752.436605][ T1196] ieee802154 phy1 wpan1: encryption failed: -22 [ 813.436864][ T1196] ieee802154 phy0 wpan0: encryption failed: -22 [ 813.443210][ T1196] ieee802154 phy1 wpan1: encryption failed: -22 [ 824.983793][ C1] rcu: INFO: rcu_preempt self-detected stall on CPU [ 824.990421][ C1] rcu: 1-....: (10499 ticks this GP) idle=0ef/1/0x4000000000000000 softirq=52370/52370 fqs=4114 [ 825.002515][ C1] (t=10501 jiffies g=99153 q=41030) [ 825.008241][ C1] NMI backtrace for cpu 1 [ 825.012558][ C1] CPU: 1 PID: 24638 Comm: syz-executor.3 Not tainted 5.15.0-rc5-next-20211018-syzkaller #0 [ 825.022526][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 825.032573][ C1] Call Trace: [ 825.035844][ C1] [ 825.038688][ C1] dump_stack_lvl+0xcd/0x134 [ 825.043284][ C1] nmi_cpu_backtrace.cold+0x47/0x144 [ 825.048591][ C1] ? lapic_can_unplug_cpu+0x80/0x80 [ 825.053859][ C1] nmi_trigger_cpumask_backtrace+0x1ae/0x220 [ 825.059903][ C1] rcu_dump_cpu_stacks+0x25e/0x3f0 [ 825.065175][ C1] rcu_sched_clock_irq.cold+0x9d/0x746 [ 825.070709][ C1] ? find_held_lock+0x2d/0x110 [ 825.075483][ C1] ? rcutree_dead_cpu+0x30/0x30 [ 825.080341][ C1] ? tick_sched_timer+0x2b/0x2d0 [ 825.085364][ C1] ? lock_downgrade+0x6e0/0x6e0 [ 825.090234][ C1] update_process_times+0x16d/0x200 [ 825.095470][ C1] tick_sched_handle+0x9b/0x180 [ 825.100326][ C1] tick_sched_timer+0x1b0/0x2d0 [ 825.105179][ C1] ? get_cpu_iowait_time_us+0x3f0/0x3f0 [ 825.110723][ C1] __hrtimer_run_queues+0x1c0/0xe50 [ 825.115927][ C1] ? hrtimer_sleeper_start_expires+0x80/0x80 [ 825.121900][ C1] ? ktime_get_update_offsets_now+0x3eb/0x5c0 [ 825.127983][ C1] hrtimer_interrupt+0x31c/0x790 [ 825.132936][ C1] __sysvec_apic_timer_interrupt+0x146/0x530 [ 825.138914][ C1] sysvec_apic_timer_interrupt+0x8e/0xc0 [ 825.144555][ C1] [ 825.147475][ C1] [ 825.150393][ C1] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 825.156365][ C1] RIP: 0010:lock_acquire+0x1ef/0x510 [ 825.161672][ C1] Code: dc a5 7e 83 f8 01 0f 85 b4 02 00 00 9c 58 f6 c4 02 0f 85 9f 02 00 00 48 83 7c 24 08 00 74 01 fb 48 b8 00 00 00 00 00 fc ff df <48> 01 c3 48 c7 03 00 00 00 00 48 c7 43 08 00 00 00 00 48 8b 84 24 [ 825.181271][ C1] RSP: 0018:ffffc900115af3a0 EFLAGS: 00000206 [ 825.187326][ C1] RAX: dffffc0000000000 RBX: 1ffff920022b5e76 RCX: ffffffff815c4b4f [ 825.195288][ C1] RDX: 1ffff1100edeb14c RSI: 0000000000000000 RDI: 0000000000000000 [ 825.203247][ C1] RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffff8ff47a17 [ 825.211215][ C1] R10: fffffbfff1fe8f42 R11: 0000000000000001 R12: 0000000000000000 [ 825.219173][ C1] R13: 0000000000000000 R14: ffffffff8bcc63a0 R15: 0000000000000000 [ 825.227141][ C1] ? __lock_acquire+0x162f/0x54a0 [ 825.232168][ C1] ? lock_release+0x720/0x720 [ 825.236837][ C1] ? lock_chain_count+0x20/0x20 [ 825.241692][ C1] fs_reclaim_acquire+0xd2/0x160 [ 825.246696][ C1] ? fs_reclaim_acquire+0xb2/0x160 [ 825.251802][ C1] prepare_alloc_pages+0x15c/0x570 [ 825.256942][ C1] __alloc_pages+0x12f/0x500 [ 825.261528][ C1] ? __alloc_pages_slowpath.constprop.0+0x2290/0x2290 [ 825.268285][ C1] ? lockdep_hardirqs_on+0x79/0x100 [ 825.273480][ C1] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 825.279637][ C1] ? alloc_pages+0xfe/0x300 [ 825.284137][ C1] ? alloc_pages+0x2ac/0x300 [ 825.288734][ C1] alloc_pages+0x1a7/0x300 [ 825.293162][ C1] folio_alloc+0x1c/0x70 [ 825.297408][ C1] filemap_alloc_folio+0x8e/0xb0 [ 825.302445][ C1] page_cache_ra_unbounded+0x36a/0x940 [ 825.307924][ C1] ? read_pages+0xf90/0xf90 [ 825.312450][ C1] ondemand_readahead+0x594/0x1090 [ 825.317568][ C1] page_cache_async_ra+0x2e1/0x3f0 [ 825.322686][ C1] filemap_fault+0xbc9/0x26d0 [ 825.327366][ C1] ? read_cache_page_gfp+0x30/0x30 [ 825.332486][ C1] __do_fault+0x10d/0x4d0 [ 825.336882][ C1] __handle_mm_fault+0x28e8/0x5120 [ 825.341997][ C1] ? vm_iomap_memory+0x190/0x190 [ 825.346954][ C1] handle_mm_fault+0x1c8/0x790 [ 825.351716][ C1] __get_user_pages+0x522/0xfb0 [ 825.356568][ C1] ? __gup_device_huge+0x3e0/0x3e0 [ 825.361705][ C1] populate_vma_page_range+0x24d/0x330 [ 825.367162][ C1] __mm_populate+0x1ea/0x3e0 [ 825.371748][ C1] ? faultin_vma_page_range+0x300/0x300 [ 825.377294][ C1] ? up_write+0x148/0x470 [ 825.381620][ C1] vm_mmap_pgoff+0x20e/0x290 [ 825.386261][ C1] ? randomize_stack_top+0x100/0x100 [ 825.391543][ C1] ? __fget_files+0x23d/0x3e0 [ 825.396218][ C1] ksys_mmap_pgoff+0x49f/0x620 [ 825.400981][ C1] ? mlock_future_check+0x120/0x120 [ 825.406177][ C1] ? syscall_enter_from_user_mode+0x21/0x70 [ 825.412072][ C1] do_syscall_64+0x35/0xb0 [ 825.416480][ C1] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 825.422367][ C1] RIP: 0033:0x7fd4cadc5a39 [ 825.426771][ C1] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 825.446371][ C1] RSP: 002b:00007fd4c833b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 825.454775][ C1] RAX: ffffffffffffffda RBX: 00007fd4caec8f60 RCX: 00007fd4cadc5a39 [ 825.462739][ C1] RDX: 0000000001000002 RSI: 0000000000b36000 RDI: 0000000020000000 [ 825.470712][ C1] RBP: 00007fd4cae1fc5f R08: 0000000000000004 R09: 0000000000000000 [ 825.478676][ C1] R10: 0000000000028011 R11: 0000000000000246 R12: 0000000000000000 [ 825.486647][ C1] R13: 00007fff2cdc8a3f R14: 00007fd4c833b300 R15: 0000000000022000 [ 825.494627][ C1]